{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:42:38Z","timestamp":1730292158362,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/rait.2018.8388999","type":"proceedings-article","created":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T15:25:44Z","timestamp":1529940344000},"page":"1-5","source":"Crossref","is-referenced-by-count":9,"title":["Design of ECC based authenticated group key agreement protocol using self-certified public keys"],"prefix":"10.1109","author":[{"given":"Shalini","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Abhimanyu","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Nitin","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.03.008"},{"key":"ref11","first-page":"254","article-title":"An e cient secure authenticated group key exchange algorithm for large and dynamic groups","author":"alves-foss","year":"2000","journal-title":"23 rd National Information Systems Security Conference"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.31"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36231-2_18"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2014.6919818"},{"key":"ref16","first-page":"417","article-title":"Use of elliptic curves in cryptography","author":"miller","year":"1985","journal-title":"Theory and Application of Cryptographic Techniques"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"ref4","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","volume":"84","author":"shamir","year":"1984","journal-title":"Crynto"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_42"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/BF01389745"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.04.002"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2375-5"},{"key":"ref7","first-page":"25","article-title":"Finite field arithmetic","author":"hankerson","year":"2004","journal-title":"Guide to Elliptic Curve Cryptography"},{"key":"ref2","first-page":"588","article-title":"Elliptic curve based dynamic contributory group key agreement protocol for secure group communication over ad-hoc networks","volume":"17","author":"naresh","year":"2015","journal-title":"IJ Network Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2015.7275902"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2016.06.038"}],"event":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","start":{"date-parts":[[2018,3,15]]},"location":"Dhanbad","end":{"date-parts":[[2018,3,17]]}},"container-title":["2018 4th International Conference on Recent Advances in Information Technology (RAIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8376941\/8388962\/08388999.pdf?arnumber=8388999","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,30]],"date-time":"2018-07-30T14:35:23Z","timestamp":1532961323000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8388999\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/rait.2018.8388999","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}