{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T07:55:21Z","timestamp":1649145321076},"reference-count":16,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2011]]},"DOI":"10.1587\/transfun.e94.a.383","type":"journal-article","created":{"date-parts":[[2011,1,4]],"date-time":"2011-01-04T06:07:47Z","timestamp":1294121267000},"page":"383-391","source":"Crossref","is-referenced-by-count":1,"title":["Fast Verification of Hash Chains with Reduced Storage"],"prefix":"10.1587","volume":"E94-A","author":[{"given":"Dae Hyun","family":"YUM","sequence":"first","affiliation":[{"name":"Department of Electronic and Electrical Engineering, POSTECH"}]},{"given":"Jin Seok","family":"KIM","sequence":"additional","affiliation":[{"name":"Department of Electronic and Electrical Engineering, POSTECH"}]},{"given":"Pil Joong","family":"LEE","sequence":"additional","affiliation":[{"name":"Department of Electronic and Electrical Engineering, POSTECH"}]},{"given":"Sung Je","family":"HONG","sequence":"additional","affiliation":[{"name":"Department of Electronic and Electrical Engineering, POSTECH"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] R.J. Anderson, C. Manifavas, and C. Sutherland, “Netcard — A practical electronic-cash system,” Security Protocols Workshop, Lect. Notes Comput. Sci., vol.1189, pp.49-57, Springer, 1996."},{"key":"2","unstructured":"[2] R.L. Rivest and A. Shamir, “PayWord and MicroMint: Two simple micropayment schemes,” Security Protocols Workshop, Lect. Notes Comput. Sci., vol.1189, pp.69-87, Springer, 1996."},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] N. Haller, “The S\/KEY one-time password system,” RFC 1760, Internet Engineering Task Force, 1995.","DOI":"10.17487\/rfc1760"},{"key":"4","unstructured":"[4] A. Perrig, R. Canetti, D.X. Song, and J.D. Tygar, “Efficient and secure source authentication for multicast,” NDSS 2001, The Internet Society, 2001."},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] A. Perrig, R. Canetti, J.D. Tygar, and D.X. Song, “Efficient authentication and signing of multicast streams over lossy channels,” IEEE Symposium on Security and Privacy, pp.56-73, IEEE Computer Society, 2000.","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] Y.C. Hu, A. Perrig, and D.B. Johnson, “Ariadne: A secure on-demand routing protocol for ad hoc networks,” Wirel. Netw., vol.11, no.1-2, pp.21-38, 2005.","DOI":"10.1007\/s11276-004-4744-y"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48390-X_17"},{"key":"8","unstructured":"[8] D. Coppersmith and M. Jakobsson, “Almost optimal hash sequence traversal,” Financial Cryptography 2002, Lect. Notes Comput. Sci., vol.2357, pp.102-119, Springer, 2002."},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] M. Jakobsson, “Fractal hash sequence representation and traversal,” IEEE International Symposium on Information Theory, pp.437-444, IEEE, 2002.","DOI":"10.1109\/ISIT.2002.1023709"},{"key":"10","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/978-3-540-45203-4_7","volume":"2846","author":"KIM S-R","year":"2003","ISSN":"http:\/\/id.crossref.org\/issn\/0302-9743","issn-type":"print"},{"key":"11","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1007\/978-3-540-45126-6_20","volume":"2742","author":"SELLA Y","year":"2003","ISSN":"http:\/\/id.crossref.org\/issn\/0302-9743","issn-type":"print"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00862-7_22"},{"key":"13","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/978-3-540-24660-2_26","volume":"2964","author":"FISCHLIN M","year":"2004","ISSN":"http:\/\/id.crossref.org\/issn\/0302-9743","issn-type":"print"},{"key":"14","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/978-3-540-24582-7_31","volume":"2904","author":"FISCHLIN M","year":"2003","ISSN":"http:\/\/id.crossref.org\/issn\/0302-9743","issn-type":"print"},{"key":"15","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1007\/978-3-642-11925-5_26","volume":"5985","author":"YUM DAE HYUN","year":"2010","ISSN":"http:\/\/id.crossref.org\/issn\/0302-9743","issn-type":"print"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] M. Bellare and P. Rogaway, “Random oracles are practical: A paradigm for designing efficient protocols,” ACM Conference on Computer and Communications Security, pp.62-73, 1993.","DOI":"10.1145\/168588.168596"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transfun\/E94.A\/1\/E94.A_1_383\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T05:46:12Z","timestamp":1619415972000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transfun\/E94.A\/1\/E94.A_1_383\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.e94.a.383","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}