{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:10:58Z","timestamp":1729660258651,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/lcn.2012.6423691","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T16:27:47Z","timestamp":1360340867000},"page":"93-101","source":"Crossref","is-referenced-by-count":1,"title":["Multi-resolution elliptic curve digital signature"],"prefix":"10.1109","author":[{"given":"P.","family":"Chuchaisri","sequence":"first","affiliation":[]},{"given":"R. E.","family":"Newman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/WASA.2007.27"},{"key":"17","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/3-540-45353-9_11","article-title":"Formal security proofs for a signature scheme with partial message recovery","volume":"2020","author":"brown","year":"2001","journal-title":"CT-RSA Ser Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1007\/978-3-642-17401-8_23"},{"key":"15","volume":"1","author":"code","year":"2004","journal-title":"Certicom's Bulletin of Security and Cryptography"},{"year":"2009","author":"brown","journal-title":"SEC 1 Elliptic curve cryptography","key":"16"},{"year":"2009","author":"gallagher","journal-title":"FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Digital Signature Standard (DSS)","key":"13"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1017\/CBO9780511546570"},{"key":"11","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/978-3-642-15031-9_4","article-title":"A high speed coprocessor for elliptic curve scalar multiplications over","volume":"6225","author":"guillermin","year":"2010","journal-title":"CHES Ser Lecture Notes in Computer Science"},{"year":"2003","author":"washington","journal-title":"Elliptic Curves Number Theory and Cryptography","key":"12"},{"key":"21","first-page":"1182","article-title":"Threshold signcryption scheme based on elliptic curve cryptosystem and verifiable secret sharing","volume":"2","author":"changgen","year":"2005","journal-title":"Wireless Communications Networking and Mobile Computing 2005 Proceedings 2005 International Conference on"},{"key":"20","first-page":"129","article-title":"A new secure authentication scheme based threshold ECDSA for wireless sensor network","author":"wang","year":"2006","journal-title":"Security and Management"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1016\/S0164-1212(99)00080-1"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1109\/ICIS.2007.89"},{"key":"24","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/11422778_9","article-title":"ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I)","volume":"3462","author":"ertaul","year":"2005","journal-title":"NETWORKING Ser Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1145\/359168.359176"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1145\/381677.381696"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.4018\/978-1-59140-345-6.ch012"},{"key":"28","first-page":"241","article-title":"Digital multisignatures","author":"boyd","year":"1989","journal-title":"Cryptography and Coding"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1016\/S0167-4048(03)00507-8"},{"year":"2004","author":"hankerson","journal-title":"Guide to Elliptic Curve Cryptography","key":"3"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1007\/3-540-39799-X_31"},{"key":"10","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","article-title":"Comparing elliptic curve cryptography and RSA on 8-bit CPUs","author":"gura","year":"2004","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2004"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"7","first-page":"29","article-title":"ShortPK: A short-term public key scheme for broadcast authentication in sensor networks","volume":"6","author":"ronghua wang","year":"2009","journal-title":"ACM Trans Sensor Netw"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/1325651.1325652"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/1288107.1288118"},{"key":"4","first-page":"105","article-title":"Postal revenue collection in the digital age","author":"pintsov","year":"2000","journal-title":"Proceedings of Financial Cryptography"},{"year":"2000","author":"lopez","journal-title":"An overview of Elliptic Curve Cryptography","key":"9"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.4108\/icst.collaboratecom.2010.55"}],"event":{"name":"2012 37th Annual IEEE Conference on Local Computer Networks (LCN 2012)","start":{"date-parts":[[2012,10,22]]},"location":"Clearwater, FL","end":{"date-parts":[[2012,10,25]]}},"container-title":["37th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6413535\/6423567\/06423691.pdf?arnumber=6423691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T03:12:59Z","timestamp":1498014779000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6423691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/lcn.2012.6423691","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}