{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:33:29Z","timestamp":1730273609635,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/isecs.2008.216","type":"proceedings-article","created":{"date-parts":[[2008,8,27]],"date-time":"2008-08-27T23:35:14Z","timestamp":1219880114000},"page":"540-544","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network"],"prefix":"10.1109","author":[{"given":"Tang","family":"Hong","sequence":"first","affiliation":[]},{"given":"Zhu","family":"Liehuang","sequence":"additional","affiliation":[]},{"given":"Cao","family":"Yuanda","sequence":"additional","affiliation":[]},{"given":"Wang","family":"Dazhen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"15"},{"journal-title":"ID-based one round authenticated tripartite key agreement protocol with pairings","year":"0","author":"zhang","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1049\/el:20020387"},{"key":"12","first-page":"262","article-title":"a new two-party identity-based authenticated key agreement","volume":"3376","author":"mccullagh","year":"2005","journal-title":"LNCS"},{"key":"3","first-page":"205","article-title":"extending joux protocol to multi party key agreement","volume":"2904","author":"barua","year":"2003","journal-title":"LNCS"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984337"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/238168.238182"},{"key":"10","first-page":"47","article-title":"identity-based cryptosystems and signature schemes","volume":"196","author":"shamir","year":"1984","journal-title":"LNCS"},{"key":"7","first-page":"385","article-title":"protocol for tripartite di_e-hellman. in proceedings of ants","volume":"4","author":"joux","year":"1838","journal-title":"LNCS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022595222606"},{"key":"5","first-page":"357","article-title":"an efficient tree-based group applied cryptography and network security key agreement using bilinear map","volume":"2846","author":"lee","year":"2003","journal-title":"LNCS"},{"key":"4","first-page":"101","article-title":"dynamic group key agreement in tree-based setting","volume":"3574","author":"dutta","year":"2005","journal-title":"LNCS"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0314-9"},{"year":"0","key":"8"}],"event":{"name":"2008 International Symposium on Electronic Commerce and Security","start":{"date-parts":[[2008,8,3]]},"location":"Guangzhou City, China","end":{"date-parts":[[2008,8,5]]}},"container-title":["2008 International Symposium on Electronic Commerce and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4606003\/4606004\/04606124.pdf?arnumber=4606124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T15:27:30Z","timestamp":1489678050000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4606124\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isecs.2008.216","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}