{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:17:02Z","timestamp":1730297822881,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/snpd.2007.146","type":"proceedings-article","created":{"date-parts":[[2007,8,22]],"date-time":"2007-08-22T19:35:35Z","timestamp":1187811335000},"page":"435-438","source":"Crossref","is-referenced-by-count":2,"title":["Study on Classification Algorithm of Multi-subject Text"],"prefix":"10.1109","author":[{"given":"Yu-ping","family":"Qin","sequence":"first","affiliation":[]},{"given":"Qing","family":"Ai","sequence":"additional","affiliation":[]},{"given":"Xiu-kun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiang-na","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"316","article-title":"Two Improved Partially Blind Signature Schemes from Bilinear Pairings","volume":"3574","author":"mchow","year":"2005","journal-title":"LNCS"},{"key":"17","first-page":"385","article-title":"RSA-based partially blind signature with low computation","author":"chien","year":"2001","journal-title":"IEEE International Conference on Parallel and Distributed Systems"},{"key":"18","first-page":"191","article-title":"Efficient verifiably encrypted signature and partially blind signature from bilinear pairings, Cryptology-Indocrypt 2003","volume":"2904","author":"zhang","year":"2003","journal-title":"LNCS"},{"key":"15","first-page":"818","article-title":"Low-computation partially blind signatures for electronic cash","volume":"81","author":"fan","year":"1998","journal-title":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences"},{"key":"16","first-page":"271","article-title":"Provably Secure Partially Blind Signatures","volume":"1880","author":"abe","year":"2000","journal-title":"LNCS"},{"key":"13","first-page":"312","article-title":"Efficient ID-Based blind signature and proxy signature from Bilinear Pairings, ACISP'03","volume":"2727","author":"zhang","year":"2003","journal-title":"LNCS"},{"key":"14","first-page":"244","article-title":"How to date blind signatures, Advances in Cryptology-AisaCrypt'96","volume":"1163","author":"abe","year":"1996","journal-title":"LNCS"},{"key":"11","first-page":"552","article-title":"ID-based blind signature and ring signature from pairings, Advances in Cryptology-Asiacrypt 2002","volume":"2501","author":"zhang","year":"2002","journal-title":"LNCS"},{"key":"12","first-page":"1","article-title":"Security of blind discrete log signatures against interactive attacks, ICICS 2001","volume":"2229","author":"schnorr","year":"2001","journal-title":"LNCS"},{"key":"21","first-page":"514","article-title":"Short signatures from the Weil pairing, Advances in Cryptology-Asiacrypt 2001","volume":"2248","author":"boneh","year":"2001","journal-title":"LNCS"},{"key":"20","first-page":"324","article-title":"Implementing the Tate pairing, ANTS 2002","volume":"2369","author":"galbraith","year":"2002","journal-title":"LNCS"},{"key":"22","first-page":"354","article-title":"Efficient algorithms for pairing-based cryptosystems, Advances in Cryptology-Crypto","volume":"2442","author":"barreto","year":"2002","journal-title":"LNCS"},{"key":"23","article-title":"On the selection of pairing-friendly groups","author":"barreto","year":"2003","journal-title":"Workshop Selected Areas in Cryptography"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010003"},{"key":"25","first-page":"120","article-title":"Efficient Identitybased Signature and Blind Signature","author":"huang","year":"2005","journal-title":"CANS 2005"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/11751595_38"},{"key":"27","first-page":"80","article-title":"Efficient Blind and Partially Blind Signatures Without Random Oracles","author":"okamoto","year":"2006","journal-title":"TCC 2006"},{"key":"28","first-page":"1","article-title":"Security of Blind Discrete Log Signature against Interactive Attacks, ICICS","volume":"2229","author":"schnorr","year":"2001","journal-title":"LNCS"},{"article-title":"Enhancing the Security of Perfect Blind DLSignature","year":"2003","author":"schnorr","key":"29"},{"key":"3","first-page":"213","article-title":"Identity-based encryption from the Weil pairing, Advances in Cryptology-Crypto","volume":"2139","author":"boneh","year":"2001","journal-title":"LNCS"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/49.17709"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(00)00254-1"},{"key":"1","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes, Advances in Cryptology-Crypto 84","volume":"196","author":"shamir","year":"1984","journal-title":"LNCS"},{"key":"30","first-page":"288","article-title":"A Generailized Birthday Problem, CRYPTO 2002","volume":"2442","author":"wagner","year":"2002","journal-title":"LNCS"},{"key":"7","first-page":"153","article-title":"Blind signature systems","author":"chaum","year":"1998","journal-title":"Proceedings of the Crypto'83"},{"key":"6","first-page":"18","article-title":"An identity-based encryption from gap diffie-hellman groups, Public Key Cryptography - PKC 2003","volume":"2139","author":"cha","year":"2003","journal-title":"LNCS"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1049\/el:20020387"},{"key":"4","first-page":"360","article-title":"An identity based encryption scheme based on quadratic residues, In Cryptography and Coding","volume":"2260","author":"cocks","year":"2001","journal-title":"LNCS"},{"key":"9","first-page":"428","article-title":"Blind signatures based on the discrete logarithm problem","volume":"950","author":"camenisch","year":"1995","journal-title":"LNCS"},{"key":"8","first-page":"294","article-title":"Efficient off-line electronic check","volume":"434","author":"chaum","year":"1990","journal-title":"LNCS"}],"event":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel\/Distributed Computing (SNPD 2007)","start":{"date-parts":[[2007,7,30]]},"location":"Qingdao, China","end":{"date-parts":[[2007,8,1]]}},"container-title":["Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel\/Distributed Computing (SNPD 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4287452\/4287630\/04287723.pdf?arnumber=4287723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T21:04:29Z","timestamp":1489698269000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4287723\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/snpd.2007.146","relation":{},"subject":[],"published":{"date-parts":[[2007,7]]}}}