{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:26:11Z","timestamp":1738819571817,"version":"3.37.0"},"reference-count":15,"publisher":"Academy Publisher","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.7.8.1272-1279","type":"journal-article","created":{"date-parts":[[2012,9,3]],"date-time":"2012-09-03T09:02:08Z","timestamp":1346662928000},"source":"Crossref","is-referenced-by-count":1,"title":["A Light-Weight Rainbow Signature Scheme for WSN"],"prefix":"10.4304","volume":"7","author":[{"given":"Min","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jie","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhengping","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qiao-yan","family":"Wen","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2012,8,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.3.1.65-77"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053287"},{"issue":"no. 4","key":"ref5","first-page":"652","article-title":"Study on Secret Key Management Project of WSN Based on ECC","volume":"7","author":"Liu","year":"2012","journal-title":"Journal of Networks"},{"key":"ref6","first-page":"103","article-title":"On the security of UOV","volume-title":"Proceedings of the First International Conference on Symbolic Computation and Cryptology","author":"Faugere","year":"2008"},{"key":"ref7","first-page":"266","article-title":"I-invertible Cycles for Multivariate Quadratic Public Key Cryptography","volume-title":"In processings of Public Key Cryptography, LNCS","volume":"4450","author":"Ding","year":"2007"},{"key":"ref8","first-page":"1","article-title":"Efficient signature schemes based on birational permutations","volume-title":"Proceedings of Crypo 1993, LNCS","volume":"773","author":"Shamir","year":"1993"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2006.012471"},{"key":"ref10","article-title":"Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks","volume-title":"Proc. IEEE Globecom Taipei","author":"Melo","year":"2002"},{"key":"ref11","first-page":"128","volume-title":"Computers and Intractability, a Guide to the Theory of NP-Completeness","author":"Garey","year":"1979"},{"key":"ref12","first-page":"33","article-title":"Hidden field equcation (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms","volume-title":"Proceedings of Eurocrypt 1996, LNCS","volume":"1070","author":"Patarin","year":"1996"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_27"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/780506.780516"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2006.012471"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:13:57Z","timestamp":1738775637000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,1]]},"references-count":15,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2012,8,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.7.8.1272-1279","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2012,8,1]]}}}