{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:35:56Z","timestamp":1761676556623,"version":"3.37.3"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61101088 and 71402070"],"award-info":[{"award-number":["61101088 and 71402070"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Opening Project of Key Lab of Information Network Security of Ministry of Public Security","award":["(C16604)"],"award-info":[{"award-number":["(C16604)"]}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"crossref","award":["(BK20161099)"],"award-info":[{"award-number":["(BK20161099)"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Science Foundation","award":["(Award SaTC No.: 1527795)"],"award-info":[{"award-number":["(Award SaTC No.: 1527795)"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1109\/tvt.2017.2757500","type":"journal-article","created":{"date-parts":[[2017,9,28]],"date-time":"2017-09-28T18:12:30Z","timestamp":1506622350000},"page":"1726-1739","source":"Crossref","is-referenced-by-count":6,"title":["Non-interactive Identity-Based Underwater Data Transmission With Anonymity and Zero Knowledge"],"prefix":"10.1109","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0303-2521","authenticated-orcid":false,"given":"Changsheng","family":"Wan","sequence":"first","affiliation":[]},{"given":"Vir Virander","family":"Phoha","sequence":"additional","affiliation":[]},{"given":"Yuzhe","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Aiqun","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"PBC library manual 0.5.11","year":"2006","author":"lynn","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144598347011"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.80"},{"key":"ref32","first-page":"213","article-title":"Identity-based encryption from the Weil pairing","author":"bonehand","year":"0","journal-title":"Proc Adv Cryptol"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1109\/TPDS.2013.43","article-title":"Secure and efficient data transmission for cluster-based wireless sensor networks","volume":"25","author":"lu","year":"2014","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.06.014"},{"key":"ref37","first-page":"1","article-title":"Pairing-based cryptographic protocols: A survey","author":"dutta","year":"2004","journal-title":"IACR Cryptology ePrint"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39927-8_28"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2617"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/sec.507"},{"year":"2013","key":"ref40","article-title":"Openssl-1.0.1e.tar.gz"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2014.6990362"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7402261"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7402258"},{"key":"ref14","first-page":"1838","article-title":"Secure underwater acoustic communication based on a robust key generation scheme","author":"liu","year":"0","journal-title":"Proc 9th IEEE Int Conf Signal Process"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2008.444"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.559"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/398610"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2008.016198"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462093"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34390-2_19"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1967","DOI":"10.3390\/s120201967","article-title":"Secure cooperation of autonomous mobile sensors using an underwater acoustic network","volume":"12","author":"caiti","year":"2012","journal-title":"SENSORS"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/OCEANS-Genova.2015.7271735"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7588231"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6818"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1087.2013.01208"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5280"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2012.049068"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7402257"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2011.0641"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7321969"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/s121115133"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2013.6754963"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7402259"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3283-z"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2015.09.07"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.7840\/kics.2014.39B.6.360"},{"key":"ref25","first-page":"28","article-title":"Data encryption and authentication mechanism based on block cipher mode for underwater acoustic sensor networks","author":"kim","year":"0","journal-title":"Proc 2012 Int Conf Inf Sci Technol"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/25\/8290782\/08052557.pdf?arnumber=8052557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:26:36Z","timestamp":1642004796000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8052557\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":40,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2017.2757500","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"type":"print","value":"0018-9545"},{"type":"electronic","value":"1939-9359"}],"subject":[],"published":{"date-parts":[[2018,2]]}}}