{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:29Z","timestamp":1750308929496,"version":"3.41.0"},"reference-count":5,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2004,7,1]],"date-time":"2004-07-01T00:00:00Z","timestamp":1088640000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2004,7]]},"abstract":"<jats:p>An identity-based conference key distribution protocol based on SBIBD was proposed by Chung et al. in 2002 [1]. However, this protocol suffers several problems. Consequently, participants cannot correctly authenticate one another and cannot calculate the same conference key. This study investigates these problems and proposes an improved protocol also based on SBIBD.<\/jats:p>","DOI":"10.1145\/1035834.1035841","type":"journal-article","created":{"date-parts":[[2005,1,26]],"date-time":"2005-01-26T16:49:14Z","timestamp":1106758154000},"page":"58-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Improved conference key distribution protocol based on a symmetric balanced incomplete block design"],"prefix":"10.1145","volume":"38","author":[{"given":"Tian-Fu","family":"Lee","sequence":"first","affiliation":[{"name":"National Cheng Kung University, Tainan, Taiwan"}]},{"given":"Tzonelih","family":"Hwang","sequence":"additional","affiliation":[{"name":"National Cheng Kung University, Tainan, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2004,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(01)00240-X"},{"volume-title":"C. K. Wong, A conference key distribution system, IEEE Trans. Inform. Theory, 28","year":"1982","author":"Ingemarsson I.","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","first-page":"175","volume-title":"Identity-based conference key distribution system, Proc. of Crypto'87","volume":"293","author":"Koyama K.","year":"1987"},{"key":"e_1_2_1_4_1","unstructured":"C. Liu Block designs Introduction to Combinatorial Mathematics McGraw-Hill New York 1968.  C. Liu Block designs Introduction to Combinatorial Mathematics McGraw-Hill New York 1968."},{"issue":"3","key":"e_1_2_1_5_1","first-page":"430","article-title":"A load balancing algorithm in distributed computing systems, J. Korea Inform","volume":"20","author":"Ryou J.","year":"1993","journal-title":"Sci. Soc."}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1035834.1035841","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1035834.1035841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:36:48Z","timestamp":1750282608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1035834.1035841"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,7]]},"references-count":5,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2004,7]]}},"alternative-id":["10.1145\/1035834.1035841"],"URL":"https:\/\/doi.org\/10.1145\/1035834.1035841","relation":{},"ISSN":["0163-5980"],"issn-type":[{"type":"print","value":"0163-5980"}],"subject":[],"published":{"date-parts":[[2004,7]]},"assertion":[{"value":"2004-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}