{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T19:30:34Z","timestamp":1710271834627},"reference-count":28,"publisher":"Wiley","issue":"17","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":195,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm. Networks"],"published-print":{"date-parts":[[2015,11,25]]},"DOI":"10.1002\/sec.1226","type":"journal-article","created":{"date-parts":[[2015,2,18]],"date-time":"2015-02-18T05:57:07Z","timestamp":1424239027000},"page":"2992-3001","source":"Crossref","is-referenced-by-count":2,"title":["Identity-based universal re-encryption for mixnets"],"prefix":"10.1002","volume":"8","author":[{"given":"Habib Allah","family":"Yajam","sequence":"first","affiliation":[{"name":"Electrical Engineering Department, Electronics Research Institute; Sharif University of Technology; Tehran Iran"}]},{"given":"Javad","family":"Mohajeri","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, Electronics Research Institute; Sharif University of Technology; Tehran Iran"}]},{"given":"Mahmoud","family":"Salmasizadeh","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, Electronics Research Institute; Sharif University of Technology; Tehran Iran"}]}],"member":"311","published-online":{"date-parts":[[2015,2,18]]},"reference":[{"key":"10.1002\/sec.1226-BIB0001|sec1226-cit-0001","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","article-title":"Untraceable electronic mail, return addresses, and digital pseudonyms","volume":"24","author":"Chaum","year":"1981","journal-title":"Communications of the ACM"},{"key":"10.1002\/sec.1226-BIB0002|sec1226-cit-0002","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1016\/j.comcom.2009.11.009","article-title":"Survey on anonymous communications in computer networks","volume":"33","author":"Ren","year":"2010","journal-title":"Computer Communications"},{"key":"10.1002\/sec.1226-BIB0003|sec1226-cit-0003","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1002\/sec.78","article-title":"A survey of anonymity in wireless communication systems","volume":"2","author":"Chen","year":"2009","journal-title":"Security and Communication Networks"},{"issue":"2","key":"10.1002\/sec.1226-BIB0004|sec1226-cit-0004","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1002\/sec.978","article-title":"A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept","volume":"8","author":"Mohammadpourfard","year":"2014","journal-title":"Security and Communication Networks"},{"key":"10.1002\/sec.1226-BIB0005|sec1226-cit-0005","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1002\/sec.625","article-title":"ALPP: anonymous and location privacy preserving scheme for mobile IPv6 heterogeneous networks","volume":"6","author":"Taha","year":"2013","journal-title":"Security and Communication Networks"},{"key":"10.1002\/sec.1226-BIB0006|sec1226-cit-0006","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1016\/j.comcom.2004.12.011","article-title":"Technical challenges of network anonymity","volume":"29","author":"Kesdogan","year":"2006","journal-title":"Computer Communications"},{"key":"10.1002\/sec.1226-BIB0007|sec1226-cit-0007","unstructured":"Park C Itoh K Kurosawa K Efficient anonymous channel and all\/nothing election scheme Advances in Cryptology 1994"},{"key":"10.1002\/sec.1226-BIB0008|sec1226-cit-0008","doi-asserted-by":"crossref","unstructured":"Ogata W Kurosawa K Sako K Takatani K Fault tolerant anonymous channel Proceedings of the First International Conference on Information and communications security 1997 440 444","DOI":"10.1007\/BFb0028500"},{"key":"10.1002\/sec.1226-BIB0009|sec1226-cit-0009","doi-asserted-by":"crossref","first-page":"2142","DOI":"10.1109\/JPROC.2006.889687","article-title":"A survey on mix networks and their secure applications","volume":"94","author":"Sampigethaya","year":"2006","journal-title":"Proceedings of the IEEE"},{"key":"10.1002\/sec.1226-BIB0010|sec1226-cit-0010","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/978-3-540-24660-2_14","volume-title":"Topics in Cryptology-CT-RSA 2004","author":"Golle","year":"2004"},{"key":"10.1002\/sec.1226-BIB0011|sec1226-cit-0011","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-642-04434-2_4","volume-title":"Security and Privacy in Mobile Information and Communication Systems","author":"Jung","year":"2009"},{"key":"10.1002\/sec.1226-BIB0012|sec1226-cit-0012","doi-asserted-by":"crossref","first-page":"2790","DOI":"10.1016\/j.comcom.2007.12.009","article-title":"A mechanism to enforce privacy in vehicle-to-infrastructure communication","volume":"31","author":"Cencioni","year":"2008","journal-title":"Computer Communications"},{"key":"10.1002\/sec.1226-BIB0013|sec1226-cit-0013","first-page":"381","article-title":"RFID security and privacy: a research survey, selected areas in communications","volume":"24","author":"Juels","year":"2006","journal-title":"IEEE Journal on"},{"key":"10.1002\/sec.1226-BIB0014|sec1226-cit-0014","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1016\/j.jnca.2012.05.005","article-title":"Practical Internet voting system","volume":"36","author":"Yi","year":"2013","journal-title":"Journal of Network and Computer Applications"},{"key":"10.1002\/sec.1226-BIB0015|sec1226-cit-0015","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","volume":"196","author":"Shamir","year":"1985"},{"key":"10.1002\/sec.1226-BIB0016|sec1226-cit-0016","first-page":"213","volume-title":"Advances in Cryptology - CRYPTO","volume":"2001.2139","author":"Boneh","year":"2001"},{"key":"10.1002\/sec.1226-BIB0017|sec1226-cit-0017","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1007\/11761679_27","volume-title":"Advances in Cryptology-EUROCRYPT 2006","author":"Gentry","year":"2006"},{"key":"10.1002\/sec.1226-BIB0018|sec1226-cit-0018","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1016\/j.compeleceng.2009.02.002","article-title":"Identity-based mix: anonymous communications without public key certificates","volume":"35","author":"Zhong","year":"2009","journal-title":"Computers & Electrical Engineering"},{"key":"10.1002\/sec.1226-BIB0019|sec1226-cit-0019","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1016\/j.comcom.2010.05.013","article-title":"TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks","volume":"34","author":"Oliveira","year":"2011","journal-title":"Computer Communications"},{"key":"10.1002\/sec.1226-BIB0020|sec1226-cit-0020","doi-asserted-by":"crossref","unstructured":"2Baek J Byon YJ Hableel E Al-Qutayri M Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online\/offline identity-based signature Security and Communication Networks 2014","DOI":"10.1109\/3PGCIC.2013.61"},{"key":"10.1002\/sec.1226-BIB0021|sec1226-cit-0021","doi-asserted-by":"crossref","unstructured":"Lu R Lin X Shen X SPRING: a social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks 2010","DOI":"10.1109\/INFCOM.2010.5462161"},{"key":"10.1002\/sec.1226-BIB0022|sec1226-cit-0022","unstructured":"Bellovin SM Cheswick WR Privacy-enhanced searches using encrypted bloom filters 2007"},{"key":"10.1002\/sec.1226-BIB0023|sec1226-cit-0023","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/11423409_6","volume-title":"Privacy Enhancing Technologies","author":"Fairbrother","year":"2005"},{"key":"10.1002\/sec.1226-BIB0024|sec1226-cit-0024","doi-asserted-by":"crossref","unstructured":"Ateniese G Camenisch J de Medeiros B Untraceable RFID tags via insubvertible encryption Proceedings of the 12th ACM conference on Computer and communications security Springer-Verlag Berlin, Heidelberg 2005","DOI":"10.1145\/1102120.1102134"},{"key":"10.1002\/sec.1226-BIB0025|sec1226-cit-0025","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1007\/11836810_4","volume-title":"Information Security","author":"Danezis","year":"2006"},{"key":"10.1002\/sec.1226-BIB0026|sec1226-cit-0026","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/11426639_7","volume-title":"Advances in Cryptology-EUROCRYPT 2005","author":"Waters","year":"2005"},{"key":"10.1002\/sec.1226-BIB0027|sec1226-cit-0027","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1007\/978-3-642-03356-8_36","volume-title":"Advances in Cryptology-CRYPTO 2009","author":"Waters","year":"2009"},{"key":"10.1002\/sec.1226-BIB0028|sec1226-cit-0028","unstructured":"CertiVox http:\/\/www.certivox.com\/miracl"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1226","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/sec.1226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,4]],"date-time":"2021-07-04T05:42:17Z","timestamp":1625377337000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1226"}},"subtitle":["Identity-based universal re-encryption for mixnets"],"short-title":[],"issued":{"date-parts":[[2015,2,18]]},"references-count":28,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2015,11,25]]}},"URL":"https:\/\/doi.org\/10.1002\/sec.1226","archive":["Portico"],"relation":{},"ISSN":["1939-0114"],"issn-type":[{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2015,2,18]]}}}