{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:12:47Z","timestamp":1742389967147,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1109\/infcom.2010.5462166","type":"proceedings-article","created":{"date-parts":[[2010,5,12]],"date-time":"2010-05-12T16:54:40Z","timestamp":1273683280000},"page":"1-9","source":"Crossref","is-referenced-by-count":31,"title":["An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs"],"prefix":"10.1109","author":[{"given":"Haojin","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Rongxing","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xuemin","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Dongsheng","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Zhenfu","family":"Cao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1247694.1247705"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550373"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1007\/978-3-540-72540-4_14","article-title":"Batch verification of short signatures","volume":"4515","author":"camenisch","year":"2007","journal-title":"EUROCRYPT 2007 LNCS"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","article-title":"Short signature from the Weil Pairing","volume":"2248","author":"boneh","year":"2001","journal-title":"ASIACRYPT 2001"},{"key":"ref14","article-title":"Practical Short Signature Batch Verification","author":"ferrara","year":"2009","journal-title":"proceedings of CT-RSA 2009"},{"key":"ref15","first-page":"18","article-title":"An identity-based signature from gap Diffie-Hellman groups","volume":"2567","author":"cha","year":"2003","journal-title":"Proc PKC'03"},{"key":"ref16","first-page":"310","article-title":"Efficient identity-based signature schemes based on pairing","volume":"2595","author":"hess","year":"2002","journal-title":"SAC 2002 LNCS"},{"key":"ref17","article-title":"Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures","author":"matt","year":"2009","journal-title":"PKC 2009"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455836"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2020105"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062170"},{"key":"ref6","article-title":"Security consideartons in space and delay tolerant networks","author":"farrell","year":"2006","journal-title":"Proc of SMC-IT'06"},{"key":"ref5","article-title":"Towards securing disruption-tolerant networking","author":"asokan","year":"0","journal-title":"Nokia Research Center Tech Rep NRC-TR-2007-007"},{"key":"ref8","article-title":"Bundle security protocol specification","author":"symington","year":"2009","journal-title":"draft-irtf-dtnrg-bundle-security-08 txt work-in-progress"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080609"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.897962"},{"article-title":"Delay tolerant networking research group: dtn-interest mailing list archive","year":"2005","author":"dtnr","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530790"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2008.4594892"},{"year":"0","key":"ref22","article-title":"The One Simulator"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2008.40"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292834"},{"year":"0","key":"ref23","article-title":"Multiprecision Integer and Rational Arithmetic C\/C++ Library (MIR-ACL)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861382"}],"event":{"name":"IEEE INFOCOM 2010 - IEEE Conference on Computer Communications","start":{"date-parts":[[2010,3,14]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2010,3,19]]}},"container-title":["2010 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5461675\/5461899\/05462166.pdf?arnumber=5462166","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T04:07:03Z","timestamp":1497845223000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5462166\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/infcom.2010.5462166","relation":{},"subject":[],"published":{"date-parts":[[2010,3]]}}}