{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T19:10:08Z","timestamp":1755976208339,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,20]]},"DOI":"10.1145\/3633624.3633626","type":"proceedings-article","created":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T06:38:38Z","timestamp":1706510318000},"page":"9-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["CL-SML: Secure Certificateless Signature with Message Linkages for IoT-Based Fog Computing Environments"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3657-3241","authenticated-orcid":false,"given":"Han-Yu","family":"Lin","sequence":"first","affiliation":[{"name":"National Taiwan Ocean University, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7833-7688","authenticated-orcid":false,"given":"Tung-Tso","family":"Tsai","sequence":"additional","affiliation":[{"name":"National Taiwan Ocean University, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6727-5429","authenticated-orcid":false,"given":"Pei-Yih","family":"Ting","sequence":"additional","affiliation":[{"name":"National Taiwan Ocean University, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4093-918X","authenticated-orcid":false,"given":"Po-Cheng","family":"Chan","sequence":"additional","affiliation":[{"name":"National Taiwan Ocean University, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2024,1,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIST54437.2022.9945718"},{"issue":"1","key":"e_1_3_2_1_2_1","first-page":"7","article-title":"Computer vision-based IoT architecture for post COVID-19 preventive measures","volume":"14","author":"Akib A","year":"2023","unstructured":"A Akib, K. Nur, S. Saha, J. F. Srabonee and M. F. Mridha, \u201cComputer vision-based IoT architecture for post COVID-19 preventive measures,\u201d Journal of Advances in Information Technology, Vol. 14, No. 1, 2023, pp. 7-19.","journal-title":"Journal of Advances in Information Technology"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1266997"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASIANCON55314.2022.9909100"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISOCC.2015.7401727"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49244-5"},{"key":"e_1_3_2_1_8_1","first-page":"T-22","article-title":"New directions in cryptography","author":"Diffie W.","year":"1976","unstructured":"W. Diffie and M. Hellman, \u201cNew directions in cryptography,\u201d IEEE Transactions on Information Theory, Vol. IT-22, No. 6, 1976, pp. 644-654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"e_1_3_2_1_9_1","first-page":"T-31","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","author":"ElGamal T.","year":"1985","unstructured":"T. ElGamal, \u201cA public key cryptosystem and a signature scheme based on discrete logarithms,\u201d IEEE Transactions on Information Theory, Vol. IT-31, No. 4, 1985, pp. 469-472.","journal-title":"IEEE Transactions on Information Theory"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770231.1770261"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11599371_2"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWAMTIP53232.2021.9673712"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CONIT55038.2022.9847879"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC52510.2021.9620853"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2939204"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3288523"},{"issue":"1","key":"e_1_3_2_1_17_1","first-page":"77","article-title":"The new collective signature schemes based on two hard problems using Schnorr's signature standard","volume":"14","author":"Kim T. N.","year":"2023","unstructured":"T. N. Kim, D. H. Ngoc, N. H. L. Viet and N. A. Moldovyan, \u201cThe new collective signature schemes based on two hard problems using Schnorr's signature standard,\u201d Journal of Advances in Information Technology, Vol. 14, No. 1, 2023, pp. 77-84.","journal-title":"Journal of Advances in Information Technology"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11586821_2"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1145-3"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASID.2019.8924991"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1266994"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148864"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/ios.INF1227"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0315-8"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3055148"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/STI56238.2022.10103231"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_28_1","first-page":"47","volume-title":"Advances in Cryptology \u2212 CRYPTO\u201984","author":"Shamir A.","year":"1984","unstructured":"A. Shamir, \u201cIdentity-based cryptosystems and signature schemes,\u201d Advances in Cryptology \u2212 CRYPTO\u201984, Springer-Verlag, 1984, pp. 47-53."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845396"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASID52932.2021.9651720"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767280"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/IoT-SIU.2018.8519920"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2011.0004"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2014.04.004"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27800-9_18"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767480_20"}],"event":{"name":"BDSIC 2023: 2023 5th International Conference on Big-data Service and Intelligent Computation","acronym":"BDSIC 2023","location":"Singapore Singapore"},"container-title":["Proceedings of the 2023 5th International Conference on Big-data Service and Intelligent Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3633624.3633626","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3633624.3633626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:37:58Z","timestamp":1755974278000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3633624.3633626"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,20]]},"references-count":36,"alternative-id":["10.1145\/3633624.3633626","10.1145\/3633624"],"URL":"https:\/\/doi.org\/10.1145\/3633624.3633626","relation":{},"subject":[],"published":{"date-parts":[[2023,10,20]]},"assertion":[{"value":"2024-01-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}