{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T11:40:22Z","timestamp":1712317222654},"reference-count":18,"publisher":"World Scientific Pub Co Pte Ltd","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Parallel Process. Lett."],"published-print":{"date-parts":[[2011,3]]},"abstract":"<jats:p>In this article, we proposed a batch verification scheme for multiple proxy signatures to reduce the proxy signature verification time. The proposed scheme is not only efficient because it does not verify each individual proxy signature separately, but also secure because it can detect forged multiple proxy signatures without failure.<\/jats:p>","DOI":"10.1142\/s0129626411000084","type":"journal-article","created":{"date-parts":[[2011,3,24]],"date-time":"2011-03-24T01:21:22Z","timestamp":1300929682000},"page":"77-84","source":"Crossref","is-referenced-by-count":5,"title":["A BATCH VERIFICATION FOR MULTIPLE PROXY SIGNATURE"],"prefix":"10.1142","volume":"21","author":[{"given":"SHIANG-FENG","family":"TZENG","sequence":"first","affiliation":[{"name":"Department of Information Management, Chaoyang University of Technology, 168 Gifeng E. Rd., Wufeng, Taichung County, Taiwan 413, R.O.C."}]},{"given":"CHENG-CHI","family":"LEE","sequence":"additional","affiliation":[{"name":"Department of Library and Information Science, Fu Jen Catholic University, 510 Jhongjheng Rd., Sinjhuang City, Taipei County 24205, Taiwan, R.O.C."},{"name":"Department of Photonics and Communication Engineering, Asia University, No. 500, Lioufeng Raod, Wufeng Shiang, Taichung, Taiwan, R. O. C."}]},{"given":"MIN-SHIANG","family":"HWANG","sequence":"additional","affiliation":[{"name":"Department of Management Information Systems, National Chung Hsing University, 250 Kuo Kuang Road, 402 Taichung, Taiwan, R.O.C."}]}],"member":"219","published-online":{"date-parts":[[2011,11,21]]},"reference":[{"key":"rf2","first-page":"312","volume":"4","author":"Das M. L.","journal-title":"International Journal of Network Security"},{"key":"rf3","first-page":"264","volume":"9","author":"Das M. L.","journal-title":"International Journal of Network Security"},{"key":"rf4","doi-asserted-by":"publisher","DOI":"10.1049\/el:19980620"},{"key":"rf5","doi-asserted-by":"publisher","DOI":"10.1049\/el:19980833"},{"key":"rf6","doi-asserted-by":"publisher","DOI":"10.1049\/el:19941398"},{"key":"rf7","first-page":"1","volume":"11","author":"Hwang M. S.","journal-title":"International Journal of Informatica"},{"key":"rf8","doi-asserted-by":"crossref","first-page":"287","DOI":"10.3923\/jas.2001.287.288","volume":"1","author":"Hwang Min-Shiang","journal-title":"Pakistan Journal of Applied Sciences"},{"key":"rf10","first-page":"15","volume":"11","author":"Hwang Min-Shiang","journal-title":"Informatica"},{"key":"rf11","first-page":"8","volume":"9","author":"Kim K.","journal-title":"International Journal of Network Security"},{"key":"rf14","first-page":"43","volume":"2","author":"Lu Eric Jui-Lin","journal-title":"International Journal of Network Security"},{"key":"rf15","first-page":"1338","volume":"79","author":"Mambo M.","journal-title":"IEICE Trans. Fundamentals"},{"key":"rf18","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00220-1"},{"key":"rf19","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(02)00367-8"},{"key":"rf21","first-page":"175","volume":"7","author":"Tan Zuo-Wen","journal-title":"International Journal of Network Security"},{"key":"rf23","first-page":"214","volume":"9","author":"Verma G. K.","journal-title":"International Journal of Network Security"},{"key":"rf24","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2011.04.03"},{"key":"rf25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2005.03.085"},{"key":"rf26","doi-asserted-by":"publisher","DOI":"10.1049\/el:20000422"}],"container-title":["Parallel Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129626411000084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T11:12:21Z","timestamp":1712315541000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129626411000084"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3]]},"references-count":18,"journal-issue":{"issue":"01","published-online":{"date-parts":[[2011,11,21]]},"published-print":{"date-parts":[[2011,3]]}},"alternative-id":["10.1142\/S0129626411000084"],"URL":"https:\/\/doi.org\/10.1142\/s0129626411000084","relation":{},"ISSN":["0129-6264","1793-642X"],"issn-type":[{"value":"0129-6264","type":"print"},{"value":"1793-642X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,3]]}}}