{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T08:18:35Z","timestamp":1758701915122,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/wcins.2010.5541826","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T11:51:40Z","timestamp":1281441100000},"page":"486-490","source":"Crossref","is-referenced-by-count":2,"title":["An efficient unlinkable secret handshake protocol without ROM"],"prefix":"10.1109","author":[{"family":"Zhao Guoan","sequence":"first","affiliation":[]},{"family":"Tan Canghai","sequence":"additional","affiliation":[]},{"family":"Ren Yongjun","sequence":"additional","affiliation":[]},{"family":"Fang Liming","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/11779360_21"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79263-5_23"},{"key":"ref10","article-title":"The BB 1 identity-based cryptosystem: A standard for encryption and key encapsulation","author":"boyen","year":"2006","journal-title":"Submitted to IEEE 1363 3"},{"key":"ref6","article-title":"Unlinkable secret handshakes and key-privacy in group key management scheme","author":"jarecki","year":"2007","journal-title":"Proc ACNS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030105"},{"key":"ref8","article-title":"Secret handshakes with dynamic and fuzzy matching","author":"ateniese","year":"2007","journal-title":"Proceedings of the 14th Annual Network and Distributed System Security Symposium NDSS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2009.081880"},{"key":"ref2","first-page":"293","article-title":"Secret handshakes from CA-oblivious encryption","volume":"3329","author":"castelluccia","year":"2004","journal-title":"ASIACRYPT"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79263-5_14"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199336"}],"event":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS)","start":{"date-parts":[[2010,6,25]]},"location":"Beijing, China","end":{"date-parts":[[2010,6,27]]}},"container-title":["2010 IEEE International Conference on Wireless Communications, Networking and Information Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5524730\/5541718\/05541826.pdf?arnumber=5541826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T17:01:13Z","timestamp":1489856473000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5541826\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/wcins.2010.5541826","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}