{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:36Z","timestamp":1738777236920,"version":"3.37.0"},"reference-count":13,"publisher":"Academy Publisher","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.11.3113-3119","type":"journal-article","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T01:56:03Z","timestamp":1414979763000},"source":"Crossref","is-referenced-by-count":0,"title":["Broadcast Encryption Based on Bidirectional Remote Authentication Scheme"],"prefix":"10.4304","volume":"9","author":[{"given":"Lihua","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xichang","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Haiquan","family":"Fan","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[1969,12,31]]},"reference":[{"issue":"5","key":"ref1","first-page":"893","article-title":"YiChuan Jiang, ShiYong Zhang, YiPing Zhong. Mobile AD hoc network security review","volume":"33","author":"Ping","year":"2005","unstructured":"[1] Ping YI, YiChuan Jiang, ShiYong Zhang, YiPing Zhong. Mobile AD hoc network security review, The Acta of Electronica Sinica, 2005, 33 (5) pp. 893-899","journal-title":"The Acta of Electronica Sinica"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"issue":"11","key":"ref3","first-page":"2519","volume":"85-B","author":"Chen","year":"2002","unstructured":"[3] C. M. Chen, W. C. Ku, Stolen-verifier attack on two new strong-password authentication protocol, IEICE Transactions on Communications, 2002, E85-B (11) pp. 2519-2521.","journal-title":"E","ISSN":"https:\/\/id.crossref.org\/issn\/1046-8021","issn-type":"print"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/30.826377"},{"issue":"11","key":"ref5","first-page":"2519","volume":"85-B","author":"Chen","year":"2002","unstructured":"[5] C. M. Chen, W. C. Ku, Stolen-verifier attack on two new strong-password authentication protocol, IEICE Transactions on Communications, 2002, E85-B (11) pp. 2519-2521.","journal-title":"E","ISSN":"https:\/\/id.crossref.org\/issn\/1046-8021","issn-type":"print"},{"key":"ref6","first-page":"200","article-title":"Identity-based broadcast encryption with constant size ciphertexts and private keys","volume":"4833","author":"Delerabl\u00e9e","year":"2007","unstructured":"[6] Delerabl\u00e9e C. Identity-based broadcast encryption with constant size ciphertexts and private keys, Advances in Cryptology-ASIA CRYPT, Malaysia, 2007, 4833 pp. 200-215.","journal-title":"Advances in Cryptology-ASIA CRYPT Malaysia"},{"key":"ref7","first-page":"1619","volume-title":"Identity-based broadcast encryption protocol for Ad Hoc networks","author":"Zhang","year":"2009","unstructured":"[7] Zhang L Y, Hu Y P, Mu N B. Identity-based broadcast encryption protocol for Ad Hoc networks, IEEE Computer Society, Chengdu: China, 2009 pp. 1619-1623."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"issue":"11","key":"ref11","first-page":"2519","volume":"85-B","author":"Chen","year":"2002","unstructured":"[12] C. M. Chen, W. C. Ku. Stolen-verifier attack on two new strong-password authentication protocols, IEICE Transactions on Communications, 2002, E85-B (11) pp. 2519-2521.","journal-title":"E","ISSN":"https:\/\/id.crossref.org\/issn\/1046-8021","issn-type":"print"},{"key":"ref12","first-page":"1","article-title":"New Identity-Based Threshold Broadcast Encryption for Ad Hoc Networks.","volume-title":"6th International Conference on Wireless Communications Networking and Mobile Computing","author":"Zhang","year":"2010","unstructured":"[14] Zhang L Y, Hu Y P, Mu N B. New Identity-Based Threshold Broadcast Encryption for Ad Hoc Networks. 6th International Conference on Wireless Communications Networking and Mobile Computing. 2010 pp. 1-4"},{"volume-title":"M Young The Technical Writer s Handbook","year":"1989","key":"ref13","unstructured":"[15] M. Young, The Technical Writer's Handbook. Mill Valley, CA: University Science, 1989"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:08:39Z","timestamp":1738775319000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1969,12,31]]},"references-count":13,"journal-issue":{"issue":"11","published-online":{"date-parts":[[1969,12,31]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.11.3113-3119","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[1969,12,31]]}}}