{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:25:58Z","timestamp":1738819558814,"version":"3.37.0"},"reference-count":3,"publisher":"Academy Publisher","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.6.10.1459-1465","type":"journal-article","created":{"date-parts":[[2011,9,30]],"date-time":"2011-09-30T16:15:06Z","timestamp":1317399306000},"source":"Crossref","is-referenced-by-count":2,"title":["Proxy re-signature Scheme Based on Quadratic Residues"],"prefix":"10.4304","volume":"6","author":[{"given":"Yuqiao","family":"Deng","sequence":"first","affiliation":[]},{"given":"Ge","family":"Song","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2011,10,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102161"},{"key":"ref2","first-page":"260","article-title":"Proxy Re-signatures in the Standard Model. ISC 2008","volume":"5222","author":"Sherman","year":"2008","journal-title":"LNCS"},{"key":"ref3","first-page":"55","volume-title":"Modern Cryptography: Theory and Practice.","author":"Mao","year":"2004"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:11:11Z","timestamp":1738775471000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,1]]},"references-count":3,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2011,10,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.6.10.1459-1465","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2011,10,1]]}}}