{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:51:20Z","timestamp":1729641080241,"version":"3.28.0"},"reference-count":6,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/chinagrid.2010.52","type":"proceedings-article","created":{"date-parts":[[2010,9,8]],"date-time":"2010-09-08T16:20:02Z","timestamp":1283962802000},"page":"267-270","source":"Crossref","is-referenced-by-count":0,"title":["Certificateless-Signature-Based Authenticated Key Agreement Protocol for Grid"],"prefix":"10.1109","author":[{"given":"Ming","family":"Chen","sequence":"first","affiliation":[]},{"given":"Kaigui","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Changze","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zhongfu","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"213","article-title":"Identity-based encryption from the Weil pairing","volume":"2139","author":"boneh","year":"2001","journal-title":"Advances in Cryptology-Crypto'98"},{"key":"ref3","article-title":"Toward efficient certificateless signcryption from (and without) bilinear pairings","volume":"34","author":"barreto","year":"2008","journal-title":"SBSE"},{"journal-title":"Information technology - Security techniques - Entity authentication mechanisms Part 3 Entity authentication mechanisms using a public key algorithm","year":"1993","key":"ref6"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1007\/978-3-540-73489-5_5","article-title":"Certificateless public key encryption in the selective-ID security model (without random oracles)","volume":"4575","author":"park","year":"2007","journal-title":"Proc Pairing-Based Cryptography (Pairing'2007)"},{"key":"ref2","first-page":"321","article-title":"Certificateless-Based Two-Party Authenticated Key Agreement Protocol","volume":"20","author":"hou","year":"2009","journal-title":"Journal of Software"},{"key":"ref1","first-page":"342","article-title":"Efficient certificateless authentication and key Agreement (CL-AK) for Grid computing","volume":"7","author":"wang","year":"2008","journal-title":"International Journal of Network Security"}],"event":{"name":"2010 Fifth Chinagrid Annual Conference (ChinaGrid)","start":{"date-parts":[[2010,7,16]]},"location":"Guangzhou, TBD, China","end":{"date-parts":[[2010,7,18]]}},"container-title":["2010 Fifth Annual ChinaGrid Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5562735\/5562862\/05562867.pdf?arnumber=5562867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T09:49:23Z","timestamp":1497865763000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5562867\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/chinagrid.2010.52","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}