contribs[] |
{'index': 0, 'creator_id': None, 'creator': None, 'raw_name': 'Yu-Fang Chung', 'given_name': None, 'surname': None, 'role': 'author', 'raw_affiliation': None, 'extra': None}
{'index': 1, 'creator_id': None, 'creator': None, 'raw_name': 'Ming-Hsien Kao', 'given_name': None, 'surname': None, 'role': 'author', 'raw_affiliation': None, 'extra': None}
{'index': 2, 'creator_id': None, 'creator': None, 'raw_name': 'Tzer-Long Chen', 'given_name': None, 'surname': None, 'role': 'author', 'raw_affiliation': None, 'extra': None}
{'index': 3, 'creator_id': None, 'creator': None, 'raw_name': 'Tzer-Shyong Chen', 'given_name': None, 'surname': None, 'role': 'author', 'raw_affiliation': None, 'extra': None}
|
refs[] |
{'index': 0, 'target_release_id': None, 'extra': {'authors': ['S Akl', 'P Taylor'], 'volume': None}, 'key': 'b0', 'year': 1983, 'container_name': None, 'title': 'Cryptographic Solution to a Problem of Access Control in a Hierarchy', 'locator': None}
{'index': 1, 'target_release_id': None, 'extra': {'authors': ['R Volker', 'J Mehrdad'], 'volume': '22'}, 'key': 'b1', 'year': 1998, 'container_name': None, 'title': 'Access Control and Key Management for Mobile Agents', 'locator': None}
{'index': 2, 'target_release_id': None, 'extra': {'authors': ['A Karmouch'], 'issue': None, 'volume': '36'}, 'key': 'b2', 'year': 1998, 'container_name': None, 'title': 'Mobile Software Agents for Telecommunications', 'locator': None}
{'index': 3, 'target_release_id': None, 'extra': {'authors': ['I Lin', 'H Ou', 'M Hwang'], 'issue': None, 'volume': '26'}, 'key': 'b3', 'year': 2004, 'container_name': None, 'title': 'Efficient Access Control and Key Management Schemes for Mobile Agents', 'locator': None}
{'index': 4, 'target_release_id': None, 'extra': {'authors': ['F Hohl']}, 'key': 'b4', 'year': 1998, 'container_name': None, 'title': 'A Model of Attacks Malicious Hosts Against Mobile Agents', 'locator': None}
{'index': 5, 'target_release_id': None, 'extra': {'authors': ['D Lange', 'M Oshima']}, 'key': 'b5', 'year': 1998, 'container_name': None, 'title': 'Programming and Deploying Java Mobile Agents with Aglets', 'locator': None}
{'index': 6, 'target_release_id': None, 'extra': {'authors': ['N Koblitz'], 'issue': '177', 'volume': '48'}, 'key': 'b6', 'year': 1987, 'container_name': None, 'title': 'Elliptic Curve Cryptosystems', 'locator': None}
{'index': 7, 'target_release_id': None, 'extra': {'authors': ['V Miller'], 'volume': '218'}, 'key': 'b7', 'year': 1986, 'container_name': None, 'title': 'Use of Elliptic Curves in Cryptography', 'locator': None}
{'index': 8, 'target_release_id': None, 'extra': {'authors': ['S Wu']}, 'key': 'b8', 'year': 2005, 'container_name': None, 'title': 'Authentication and Group Secure Communications Using Elliptic Curve Cryptography', 'locator': None}
{'index': 9, 'target_release_id': None, 'extra': {'authors': ['Y Chung', 'H Lee', 'F Lai', 'T Chen'], 'issue': None, 'volume': '178'}, 'key': 'b9', 'year': 2008, 'container_name': None, 'title': 'Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem', 'locator': None}
{'index': 10, 'target_release_id': None, 'extra': {'authors': ['C Shieh']}, 'key': 'b10', 'year': 2006, 'container_name': None, 'title': 'An Efficient Design of Elliptic Curve Cryptography Processor', 'locator': None}
{'index': 11, 'target_release_id': None, 'extra': {'authors': ['K Huang', 'Y Chung', 'C Liu', 'F Lai', 'T Chen']}, 'key': 'b11', 'year': 2007, 'container_name': None, 'title': 'Efficient Migration for Mobile Computing in Distributed Networks', 'locator': None}
{'index': 12, 'target_release_id': None, 'extra': {'authors': ['D Guan', 'L Jen'], 'volume': None}, 'key': 'b12', 'year': 2005, 'container_name': None, 'title': 'Study and Implementation of Elliptic Curve Cryptosystem', 'locator': None}
|