{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:11:41Z","timestamp":1729620701995,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/iscisc.2013.6767344","type":"proceedings-article","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T19:25:49Z","timestamp":1395343549000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Identity based universal re-encryption for mix nets"],"prefix":"10.1109","author":[{"given":"Habib Allah","family":"Yajam","sequence":"first","affiliation":[]},{"given":"Javad","family":"Mohajeri","sequence":"additional","affiliation":[]},{"given":"Mahmoud","family":"Salmasizadeh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/3-540-48892-8_13","article-title":"Mix-based electronic payments","author":"jacobson","year":"1999","journal-title":"Selected Areas in Cryptography"},{"key":"2","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-63594-7_64","article-title":"How to make personalized web browsing simple, secure, and anonymous","author":"gabber","year":"1997","journal-title":"Financial Cryptography"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935026"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2009.02.002"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"5","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1007\/BFb0028500","article-title":"Fault tolerant anonymous channel","author":"ogata","year":"1997","journal-title":"Information and Communications Security"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_21"},{"key":"9","first-page":"163","article-title":"Universal reencryption for mixnets","volume":"2004","author":"golle","year":"2004","journal-title":"Topics in Cryptology-CT-RSA"},{"key":"8","first-page":"213","article-title":"Identity-based encryption from the Weil pairing","volume":"2001","author":"boneh","year":"2001","journal-title":"Advances in Cryptology - CRYPTO"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9383-0"}],"event":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2013,8,29]]},"location":"Yazd, Iran","end":{"date-parts":[[2013,8,30]]}},"container-title":["2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6765549\/6767314\/06767344.pdf?arnumber=6767344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T10:00:49Z","timestamp":1498125649000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6767344\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2013.6767344","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}