{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T02:36:51Z","timestamp":1769913411628,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,26]]},"DOI":"10.1145\/2393216.2393310","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"562-568","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["An ECC based public key infrastructure usable for mobile applications"],"prefix":"10.1145","author":[{"given":"Sangram","family":"Ray","sequence":"first","affiliation":[{"name":"Indian School of Mines, Dhanbad, Jharkhand, India"}]},{"given":"G. P.","family":"Biswas","sequence":"additional","affiliation":[{"name":"Indian School of Mines, Dhanbad, Jharkhand, India"}]}],"member":"320","published-online":{"date-parts":[[2012,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.02.010"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2005.10.004"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(03)00188-9"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of the First International Workshop for Asian PKI. 1 (Korea","author":"Lee J.","year":"2001","unstructured":"Lee , J. , Lee Y. and Song , J . 2001. Wireless PKI Technology in Korea . In Proc. of the First International Workshop for Asian PKI. 1 (Korea , 2001 ), 145--158. Lee, J., Lee Y. and Song, J. 2001. Wireless PKI Technology in Korea. In Proc. of the First International Workshop for Asian PKI. 1 (Korea, 2001), 145--158."},{"key":"e_1_3_2_1_5_1","volume-title":"Wireless Application Protocol - Wireless Public Key Infrastructure. WAP-217-WPKI (Apr","year":"2001","unstructured":"OMA. 2001. Wireless Application Protocol - Wireless Public Key Infrastructure. WAP-217-WPKI (Apr . 2001 ). OMA. 2001. Wireless Application Protocol - Wireless Public Key Infrastructure. WAP-217-WPKI (Apr. 2001)."},{"key":"e_1_3_2_1_6_1","volume-title":"Wireless Application Protocol Architecture Specification. WAP-210-WAPArch (Jul","year":"2001","unstructured":"OMA. 2001. Wireless Application Protocol Architecture Specification. WAP-210-WAPArch (Jul . 2001 ). OMA. 2001. Wireless Application Protocol Architecture Specification. WAP-210-WAPArch (Jul. 2001)."},{"key":"e_1_3_2_1_7_1","volume-title":"Wireless Transport Layer Security. WAP-261-WTLS (Apr","year":"2001","unstructured":"OMA. 2001. Wireless Transport Layer Security. WAP-261-WTLS (Apr . 2001 ). OMA. 2001. Wireless Transport Layer Security. WAP-261-WTLS (Apr. 2001)."},{"key":"e_1_3_2_1_8_1","volume-title":"Wireless Application Protocol WAP2.0 Technical White Paper. (Apr","year":"2001","unstructured":"OMA. 2001. Wireless Application Protocol WAP2.0 Technical White Paper. (Apr . 2001 ). OMA. 2001. Wireless Application Protocol WAP2.0 Technical White Paper. (Apr. 2001)."},{"key":"e_1_3_2_1_9_1","volume-title":"WAP Certificate and CRL. WAP-211-X.509 (Mar","year":"2000","unstructured":"OMA. 2000. WAP Certificate and CRL. WAP-211-X.509 (Mar . 2000 ). OMA. 2000. WAP Certificate and CRL. WAP-211-X.509 (Mar. 2000)."},{"key":"e_1_3_2_1_10_1","unstructured":"RSA Laboratories. 2000. PKCS#10: Certification Request Syntax Standard. (2000).  RSA Laboratories. 2000. PKCS#10: Certification Request Syntax Standard . (2000)."},{"key":"e_1_3_2_1_11_1","volume-title":"IETF Network Working Group (June","author":"Myers M.","year":"1999","unstructured":"Myers , M. , Ankney , R. , Malpani , A. , Galperin , S. and Adams , C . 1999. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol -- OCSP: IETF RFC2560 . IETF Network Working Group (June , 1999 ). Myers, M., Ankney, R., Malpani, A., Galperin, S. and Adams, C. 1999. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol -- OCSP: IETF RFC2560. IETF Network Working Group (June, 1999)."},{"key":"e_1_3_2_1_12_1","unstructured":"Frier A. Karlton P. and Kocher P. 1996. The SSL 3.0 Protocol. Netscape Communications Corp. (Nov. 1996).  Frier A. Karlton P. and Kocher P. 1996. The SSL 3.0 Protocol. Netscape Communications Corp . (Nov. 1996)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Admas C. Farrell S. Kause T. and Mononen T. 2005. Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP): IETF RFC 2510. IETF Network working Group (Sep 2005).  Admas C. Farrell S. Kause T. and Mononen T. 2005. Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP): IETF RFC 2510 . IETF Network working Group (Sep 2005).","DOI":"10.17487\/rfc4210"},{"key":"e_1_3_2_1_14_1","volume-title":"IETF Network Working Group (March","author":"Myers M.","year":"1999","unstructured":"Myers , M. , Adams , C. , Solo , D. and Kemp , D . 1999. Internet X.509 Certificate Request Message Format: IETF RFC2511 . IETF Network Working Group (March , 1999 ). Myers, M., Adams, C., Solo, D. and Kemp, D. 1999. Internet X.509 Certificate Request Message Format: IETF RFC2511. IETF Network Working Group (March, 1999)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES-1.2008.66"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.10.014"},{"key":"e_1_3_2_1_17_1","unstructured":"Weise J. 2001. Public Key Infrastructure Overview. Sun PSSM Global Security Practice. Sun Blue Prints#8482;. (2001).  Weise J. 2001. Public Key Infrastructure Overview . Sun PSSM Global Security Practice. Sun Blue Prints#8482;. (2001)."},{"key":"e_1_3_2_1_18_1","volume-title":"Cryptography and Network Security: Principles and Practices","author":"Stallings W.","year":"2009","unstructured":"Stallings , W. 2009. Cryptography and Network Security: Principles and Practices . Prentice Hall . 4 th Edition, 420--430 ( 2009 ). Stallings, W. 2009. Cryptography and Network Security: Principles and Practices. Prentice Hall. 4th Edition, 420--430 (2009).","edition":"4"},{"key":"e_1_3_2_1_19_1","unstructured":"Hankerson D. Menezes A. and Vanstone S. 2004. Guide to elliptic curve cryptography. Springer-Verlag New York USA (2004).   Hankerson D. Menezes A. and Vanstone S. 2004. Guide to elliptic curve cryptography . Springer-Verlag New York USA (2004)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. of Advances in Cryptology-CRYPTO, 85","author":"Miller V.","year":"1985","unstructured":"Miller , V. 1985 . Use of elliptic curves in cryptography . In Proc. of Advances in Cryptology-CRYPTO, 85 , LNCS 218 (1985), 417--426. Miller, V. 1985. Use of elliptic curves in cryptography. In Proc. of Advances in Cryptology-CRYPTO, 85, LNCS 218 (1985), 417--426."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Dang Q. Santesson S. Moriarty K. Brown D. and Polk T. 2010. Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA. RFC 5758 (January 2010).  Dang Q. Santesson S. Moriarty K. Brown D. and Polk T. 2010. Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA . RFC 5758 (January 2010).","DOI":"10.17487\/rfc5758"},{"key":"#cr-split#-e_1_3_2_1_24_1.1","doi-asserted-by":"crossref","unstructured":"Islam S. H. and Biswas G. P. 2011. Design of improved password authentication and update scheme based on elliptic curve cryptography. Mathematical and Computer Modeling (2011) doi:10.1016\/j.mcm.2011.07.001 in press. 10.1016\/j.mcm.2011.07.001","DOI":"10.1016\/j.mcm.2011.07.001"},{"key":"#cr-split#-e_1_3_2_1_24_1.2","doi-asserted-by":"crossref","unstructured":"Islam S. H. and Biswas G. P. 2011. Design of improved password authentication and update scheme based on elliptic curve cryptography. Mathematical and Computer Modeling (2011) doi:10.1016\/j.mcm.2011.07.001 in press.","DOI":"10.1016\/j.mcm.2011.07.001"},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. of 1st International Conference on Recent Trends in Information Systems (ReTIS-11)","author":"Ray S.","year":"2011","unstructured":"Ray S. and Biswas , G. P . 2011. Design of a Mobile-PKI for using mobile phones in various applications . In Proc. of 1st International Conference on Recent Trends in Information Systems (ReTIS-11) , (Jadavpur University, Kolkata , 2011 ), IEEE Xplore. 297--302, 2011, DOI: 10.1109\/ReTIS.2011.6146885. 10.1109\/ReTIS.2011.6146885 Ray S. and Biswas, G. P. 2011. Design of a Mobile-PKI for using mobile phones in various applications. In Proc. of 1st International Conference on Recent Trends in Information Systems (ReTIS-11), (Jadavpur University, Kolkata, 2011), IEEE Xplore. 297--302, 2011, DOI: 10.1109\/ReTIS.2011.6146885."},{"key":"e_1_3_2_1_26_1","volume-title":"Introduction to Public Key Technology and the Federal PKI Infrastructure","year":"2001","unstructured":"2001. Introduction to Public Key Technology and the Federal PKI Infrastructure . National Institute of Standards and Technology ( 26th Feb , 2001 ). 2001. Introduction to Public Key Technology and the Federal PKI Infrastructure. National Institute of Standards and Technology (26th Feb, 2001)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Polk W. Housley R. and Bassham L. 2002. Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3279 (April 2002).  Polk W. Housley R. and Bassham L. 2002. Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile . RFC 3279 (April 2002).","DOI":"10.17487\/rfc3280"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Schaad J. Kaliski B. and Housley R. 2005. Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 4055.  Schaad J. Kaliski B. and Housley R. 2005. Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile . RFC 4055.","DOI":"10.17487\/rfc4055"}],"event":{"name":"CCSEIT '12: The Second International Conference on Computational Science, Engineering","location":"Coimbatore UNK India","acronym":"CCSEIT '12","sponsor":["Avinashilingam University Avinashilingam University"]},"container-title":["Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393310","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393216.2393310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:52Z","timestamp":1750239292000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393310"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":29,"alternative-id":["10.1145\/2393216.2393310","10.1145\/2393216"],"URL":"https:\/\/doi.org\/10.1145\/2393216.2393310","relation":{},"subject":[],"published":{"date-parts":[[2012,10,26]]},"assertion":[{"value":"2012-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}