{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:17Z","timestamp":1738777217499,"version":"3.37.0"},"reference-count":6,"publisher":"Academy Publisher","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.6.1648-1655","type":"journal-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T02:59:48Z","timestamp":1402369188000},"source":"Crossref","is-referenced-by-count":0,"title":["Design and Development of Decision Support System for Equipping Farm Machines"],"prefix":"10.4304","volume":"9","author":[{"given":"Ying","family":"Wang","sequence":"first","affiliation":[]},{"given":"Fenfen","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhuolin","family":"Yan","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,6,9]]},"reference":[{"key":"ref1","first-page":"61","article-title":"Public key broadcast encryption for stateless receivers","volume-title":"Digital Rights Management Workshop","author":"Dodis","year":"2002","unstructured":"[6] Y. Dodis and N. Fazio, \"Public key broadcast encryption for stateless receivers,\" in Digital Rights Management Workshop, 2002, pp. 61\u201380."},{"key":"ref2","first-page":"211","article-title":"A fully collusion resistant broadcast, trace, and revoke system","volume-title":"ACM Conference on Computer and Communications Security","author":"Boneh","year":"2006","unstructured":"[12] D. Boneh and B. Waters, \"A fully collusion resistant broadcast, trace, and revoke system,\" in ACM Conference on Computer and Communications Security, 2006, pp. 211\u2013220."},{"issue":"no. 3","key":"ref3","first-page":"401","article-title":"Public key broadcast encryption schemes with shorter transmissions","volume":"54","author":"Park","year":"2008","unstructured":"[15] J. H. Park, H. J. Kim, H.-M. Sung, and D. H. Lee, \"Public key broadcast encryption schemes with shorter transmissions,\" TBC, vol. 54, no. 3, pp. 401\u2013411, 2008.","journal-title":"TBC"},{"key":"ref4","first-page":"428","article-title":"Efficient identity-based key encapsulation to multiple parties","volume-title":"IMA Int Conf","author":"Barbosa","year":"2005","unstructured":"[19] M. Barbosa and P. Farshim, \"Efficient identity-based key encapsulation to multiple parties,\" in IMA Int. Conf., 2005, pp. 428\u2013441."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2009.01.017"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2011.03.003"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:06:45Z","timestamp":1738775205000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,9]]},"references-count":6,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2014,6,9]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.6.1648-1655","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,6,9]]}}}