{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T00:43:09Z","timestamp":1706056989628},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2013,4,3]],"date-time":"2013-04-03T00:00:00Z","timestamp":1364947200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s00607-013-0321-5","type":"journal-article","created":{"date-parts":[[2013,4,2]],"date-time":"2013-04-02T04:32:17Z","timestamp":1364877137000},"page":"843-853","source":"Crossref","is-referenced-by-count":32,"title":["Identity-based deniable authentication for ad hoc networks"],"prefix":"10.1007","volume":"96","author":[{"given":"Fagen","family":"Li","sequence":"first","affiliation":[]},{"given":"Pan","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Chunhua","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,4,3]]},"reference":[{"issue":"3","key":"321_CR1","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1109\/TWC.2006.1611091","volume":"5","author":"X Tian","year":"2006","unstructured":"Tian X, Fang Y, Ideguchi T (2006) MATS: multichannel time-spread scheduling in mobile ad hoc networks. IEEE Trans Wireless Commun 5(3):612\u2013621","journal-title":"IEEE Trans Wireless Commun"},{"issue":"10","key":"321_CR2","doi-asserted-by":"crossref","first-page":"2534","DOI":"10.1016\/j.comcom.2008.03.018","volume":"31","author":"CT Li","year":"2008","unstructured":"Li CT, Hwang MS, Liu CY (2008) An electronic voting protocol with deniable authentication for mobile ad hoc networks. Computer Commun 31(10):2534\u20132540","journal-title":"Computer Commun"},{"issue":"3","key":"321_CR3","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"Boneh D, Franklin M (2003) Identity-based encryption from the weil pairing. SIAM J Computing 32(3):586\u2013615","journal-title":"SIAM J Computing"},{"issue":"2","key":"321_CR4","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1109\/SURV.2011.020211.00045","volume":"14","author":"S Zhao","year":"2012","unstructured":"Zhao S, Aggarwal A, Frost R, Bai X (2012) A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun Surveys Tutorials 14(2):380\u2013400","journal-title":"IEEE Commun Surveys Tutorials"},{"issue":"5","key":"321_CR5","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1049\/el:20047017","volume":"41","author":"Y Shi","year":"2005","unstructured":"Shi Y, Li J (2005) Identity-based deniable authentication protocol. Electron Lett 41(5):241\u2013242","journal-title":"Electron Lett"},{"key":"321_CR6","first-page":"388","volume":"2005","author":"T Cao","year":"2005","unstructured":"Cao T, Lin D, Xue R (2005) An efficient ID-based deniable authentication protocol from pairings. Proc AINA 2005:388\u2013391","journal-title":"Proc AINA"},{"key":"321_CR7","unstructured":"Chou JS, Chen Y, Huang JC (2006) A ID-based deniable authentication protocol on pairings. Cryptology ePrint Archive. Report 2006\/335"},{"key":"321_CR8","first-page":"1008","volume":"4706","author":"MH Lim","year":"2007","unstructured":"Lim MH, Lee S, Park Y, Lee H (2007) An enhanced ID-based deniable authentication protocol on pairings. Proc ICCSA LNCS 4706:1008\u20131017","journal-title":"Proc ICCSA LNCS"},{"key":"321_CR9","first-page":"87","volume":"2008","author":"MH Lim","year":"2008","unstructured":"Lim MH, Lee S, Lee H (2008) Cryptanalysis on improved Chou et al\u2019.s ID-based deniable authentication protocol. Proc ICISS 2008:87\u201393","journal-title":"Proc ICISS"},{"key":"321_CR10","first-page":"18","volume":"2567","author":"JC Cha","year":"2003","unstructured":"Cha JC, Cheon JH (2003) An identity-based signature from gap Diffie-Hellman groups. Proc. PKC 2003 LNCS 2567:18\u201330","journal-title":"Proc. PKC 2003 LNCS"},{"issue":"3","key":"321_CR11","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361\u2013396","journal-title":"J Cryptol"},{"key":"321_CR12","unstructured":"Scott M (2007) Efficient implementation of crytographic pairings. http:\/\/ecrypt-ss07.rhul.ac.uk\/Slides\/Thursday\/mscott-samos07.pdf"},{"issue":"1","key":"321_CR13","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/WCL.2012.120211.110130","volume":"1","author":"ACF Chan","year":"2012","unstructured":"Chan ACF (2012) Distributed private key generation for identity based cryptosystems in ad hoc networks. IEEE Wireless Commun Lett 1(1):46\u201348","journal-title":"IEEE Wireless Commun Lett"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-013-0321-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-013-0321-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-013-0321-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T14:30:26Z","timestamp":1559140226000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-013-0321-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,3]]},"references-count":13,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["321"],"URL":"https:\/\/doi.org\/10.1007\/s00607-013-0321-5","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,3]]}}}