{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:48:36Z","timestamp":1770220116529,"version":"3.49.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/iwcmc.2014.6906520","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T10:59:25Z","timestamp":1412074765000},"page":"1167-1171","source":"Crossref","is-referenced-by-count":4,"title":["Authentic and confidential policy distribution in software defined wireless network"],"prefix":"10.1109","author":[{"given":"Huaqun","family":"Wang","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1007\/978-3-642-40041-4_26","article-title":"Practical multilinear maps over the integers","volume":"8042","author":"coron","year":"2013","journal-title":"CRYPTO 2013 Part I LNCS"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010003"},{"key":"13","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1007\/978-3-642-40041-4_27","article-title":"Full domain Hash from (leveled) multilinear maps and identity-based aggregate signatures","volume":"8042","author":"hohenberger","year":"2013","journal-title":"CRYPTO 2013 Part I LNCS"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_28"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/518\/10210"},{"key":"12","author":"garg","year":"0","journal-title":"Candidate Multilinear Maps from Ideal Lattices"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342450"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/2500468.2500473"},{"key":"10","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1090\/conm\/324\/05731","article-title":"Applications of multilinear forms to cryptography","volume":"324","author":"boneh","year":"2003","journal-title":"Contemporary Mathematics"},{"key":"7","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","article-title":"Identity-based encryption from the Weil pairing","volume":"2139","author":"boneh","year":"2001","journal-title":"CRYPTO 2001 LNCS"},{"key":"6","author":"kerner","year":"2013","journal-title":"Is SDN Secure?"},{"key":"5","author":"sorensen","year":"2012","journal-title":"Security Implications of Software-defined Networks"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"9","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","article-title":"Short signatures from theWeil pairing","volume":"2248","author":"boneh","year":"2001","journal-title":"Asiacrypt'2001 LNCS2248"},{"key":"8","first-page":"1234","article-title":"New explicit conditions of elliptic curve traces for FR-reduction","volume":"5","author":"miyaji","year":"2001","journal-title":"IEICE Transactions Fundamentals"}],"event":{"name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","location":"Nicosia, Cyprus","start":{"date-parts":[[2014,8,4]]},"end":{"date-parts":[[2014,8,8]]}},"container-title":["2014 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6895209\/6906315\/06906520.pdf?arnumber=6906520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T08:07:26Z","timestamp":1650269246000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6906520\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2014.6906520","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}