{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:38:31Z","timestamp":1742395111219,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/itcc.2005.57","type":"proceedings-article","created":{"date-parts":[[2008,7,18]],"date-time":"2008-07-18T15:07:52Z","timestamp":1216393672000},"page":"540-545 Vol. 2","source":"Crossref","is-referenced-by-count":4,"title":["Ad hoc key management infrastructure"],"prefix":"10.1109","author":[{"given":"B.","family":"Lehane","sequence":"first","affiliation":[]},{"given":"L.","family":"Dolye","sequence":"additional","affiliation":[]},{"given":"D.","family":"O'Mahony","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"207","article-title":"Practical threshold signatures","volume":"1807","author":"shoup","year":"2000","journal-title":"LNCS"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"15","first-page":"43","article-title":"Experimenting with shared generation of RSA key","author":"malkin","year":"1999","journal-title":"Proceedings of the Internet Societies' 1999 Symposium on Network and Distributed System Security (SNDSS)"},{"key":"16","first-page":"327","article-title":"Distributed pseudo-random functions and KDCs","volume":"1592","author":"naor","year":"1999","journal-title":"LNCS"},{"journal-title":"An Adaptable Node Architecture for Future Wireless Networks in Mobile Computing Implementing Pervasive Information and Communication Technologies","year":"2001","author":"o'mahony","key":"13"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1145\/345910.345955","article-title":"Mitigating routing misbehaviour in mobile Ad-hoc networks","author":"marti","year":"2000","journal-title":"Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000)"},{"key":"11","article-title":"Ubiquitous and robust authentication services for Ad hoc wireless networks","author":"luo","year":"2000","journal-title":"Technical Report"},{"key":"12","first-page":"235","article-title":"Simple and fault-tolerant key agreement for dynamic collaborative groups","author":"kim","year":"2000","journal-title":"Proceedings of the 7th ACM conference on computer and communications security"},{"key":"3","first-page":"425","article-title":"Efficient generation of shared RSA keys","author":"boneh","year":"1997","journal-title":"Proceedings of the Annual International Cryptology Conference on Advances in Cryptology- Crypto '87"},{"key":"2","first-page":"17","article-title":"Authenticated group key agreement and friends","author":"atenicsc","year":"1998","journal-title":"Proceedings of the 5th ACM Conference on Computer and Communication Security"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(00)00249-8"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2003.1290217"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/49.223866"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"5","first-page":"152","article-title":"Practical threshold RSA signatures without a trusted dealer","author":"damgard","year":"2001","journal-title":"Proceedings of the Advances in Cryptology - Eurocrypt '01 International Conference on the Theory and Application of Cryptographic Techniques"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2003.1232048"},{"key":"9","first-page":"457","article-title":"Proactive secret sharing or: How to cope with perpetual leakage","author":"herzberg","year":"1995","journal-title":"Proceedings of the Annual International Cryptology Conference on Advances in Cryptohgy- Crypto '95"},{"key":"8","first-page":"310","article-title":"Fully distributed threshold RSA under standard assumptions","author":"foque","year":"2001","journal-title":"Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security Advances in Ctyptology - Crypto '01"}],"event":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","start":{"date-parts":[[2005,4,4]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2005,4,6]]}},"container-title":["International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9755\/30769\/01425199.pdf?arnumber=1425199","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T10:01:15Z","timestamp":1497780075000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1425199\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/itcc.2005.57","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}