{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:51Z","timestamp":1750307751986,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,1,31]],"date-time":"2008-01-31T00:00:00Z","timestamp":1201737600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of Information and Communication, Korea (MIC)","award":["IITA-2006-C1090-0603-0040"],"award-info":[{"award-number":["IITA-2006-C1090-0603-0040"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,1,31]]},"DOI":"10.1145\/1352793.1352898","type":"proceedings-article","created":{"date-parts":[[2008,3,25]],"date-time":"2008-03-25T15:57:23Z","timestamp":1206460643000},"page":"501-505","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An efficient scheme for secure group communication in mobile wireless sensor networks"],"prefix":"10.1145","author":[{"given":"Nahar","family":"Sultana","sequence":"first","affiliation":[{"name":"Kyung Hee University, Geonggi-Do, Korea"}]},{"given":"Eui-Nam","family":"Huh","sequence":"additional","affiliation":[{"name":"Kyung Hee University, Geonggi-Do, Korea"}]}],"member":"320","published-online":{"date-parts":[[2008,1,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"e_1_3_2_1_2_1","first-page":"165","volume-title":"1294 of LNCS","author":"Zheng Y.","year":"1997","unstructured":"Y. Zheng , \" Digital Signcryption or how to achieve cost(signature & encryption)&Lt;&Lt;cost(signature)+cost(encryption)\" in Advances in cryptology, Crypto'97, Vol. 1294 of LNCS , pages 165 -- 179 , Springer-Verlag , 1997 . Y. Zheng, \"Digital Signcryption or how to achieve cost(signature & encryption)&Lt;&Lt;cost(signature)+cost(encryption)\" in Advances in cryptology, Crypto'97, Vol. 1294 of LNCS, pages 165--179, Springer-Verlag, 1997."},{"key":"e_1_3_2_1_3_1","volume-title":"Advances in Cryptology","author":"Boneh D.","year":"2001","unstructured":"D. Boneh , M. Franklin , \" Identity based Encryption from the Weil Pairing \", in Advances in Cryptology , 2001 . D. Boneh, M. Franklin, \"Identity based Encryption from the Weil Pairing\", in Advances in Cryptology, 2001."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.39"},{"key":"e_1_3_2_1_5_1","volume-title":"UMass tech report","author":"Dahill B.","year":"2002","unstructured":"B. Dahill , B. N. Levine , \"ARAN : A secure routing protocol for Ad-hoc Networks \", UMass tech report 2002 . B. Dahill, B. N. Levine, \"ARAN: A secure routing protocol for Ad-hoc Networks\", UMass tech report 2002."},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE Symposium on Security and Privacy","author":"Markle R.","year":"1980","unstructured":"R. Markle , \"Protocols for public key cryptosystems \", IEEE Symposium on Security and Privacy , 1980 . R. Markle, \"Protocols for public key cryptosystems\", IEEE Symposium on Security and Privacy, 1980."},{"key":"e_1_3_2_1_7_1","unstructured":"A. Shamir \"Identity based cryptosystems and signature schemes\" Advances in Cryptology- Proceedings of Crypto'84.   A. Shamir \"Identity based cryptosystems and signature schemes\" Advances in Cryptology- Proceedings of Crypto'84."},{"key":"e_1_3_2_1_8_1","first-page":"403","volume-title":"Dong Hoon Lee, \"Signcryption Schemes with forward Secrecy\" WISA","author":"Jung Hee Yun","year":"2001","unstructured":"Hee Yun Jung , Dong Hoon Lee, \"Signcryption Schemes with forward Secrecy\" WISA 2001 , vol. 2 , pp. 403 -- 475 . Hee Yun Jung, Dong Hoon Lee, \"Signcryption Schemes with forward Secrecy\" WISA 2001, vol.2, pp.403--475."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/313239.313282"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/509506.509514"},{"key":"e_1_3_2_1_11_1","volume-title":"Hawaii Int'l Conference on System Science","author":"Heinzelman W. R.","year":"2000","unstructured":"W. R. Heinzelman , A. Chandrakasan , H. Balakrishnan , \"Energy-efficient communication protocol for wireless micro sensor networks : In Hawaii Int'l Conference on System Science , 2000 . W. R. Heinzelman, A. Chandrakasan, H. Balakrishnan, \"Energy-efficient communication protocol for wireless micro sensor networks: In Hawaii Int'l Conference on System Science, 2000."},{"key":"e_1_3_2_1_12_1","article-title":"Intrusion tolerant routing for wireless sensor networks","author":"Deng J.","year":"2005","unstructured":"J. Deng , R. Han , S. Mishra , \" Intrusion tolerant routing for wireless sensor networks \" Elsevier Journal on Computer Communications, Special Issue on Dependable Wireless Sensor Network , 2005 J. Deng, R. Han, S. Mishra, \"Intrusion tolerant routing for wireless sensor networks\" Elsevier Journal on Computer Communications, Special Issue on Dependable Wireless Sensor Network, 2005","journal-title":"Elsevier Journal on Computer Communications, Special Issue on Dependable Wireless Sensor Network"}],"event":{"name":"ICUIMC08: The Second International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGMOD ACM Special Interest Group on Management of Data"],"location":"Suwon Korea","acronym":"ICUIMC08"},"container-title":["Proceedings of the 2nd international conference on Ubiquitous information management and communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1352793.1352898","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1352793.1352898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:39:15Z","timestamp":1750253955000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1352793.1352898"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,31]]},"references-count":12,"alternative-id":["10.1145\/1352793.1352898","10.1145\/1352793"],"URL":"https:\/\/doi.org\/10.1145\/1352793.1352898","relation":{},"subject":[],"published":{"date-parts":[[2008,1,31]]},"assertion":[{"value":"2008-01-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}