{"id":"https://openalex.org/W2102686668","doi":"https://doi.org/10.1007/3-540-45664-3_25","title":"One-Way Cross-Trees and Their Applications","display_name":"One-Way Cross-Trees and Their Applications","publication_year":2002,"publication_date":"2002-01-01","ids":{"openalex":"https://openalex.org/W2102686668","doi":"https://doi.org/10.1007/3-540-45664-3_25","mag":"2102686668"},"language":"en","primary_location":{"id":"doi:10.1007/3-540-45664-3_25","is_oa":true,"landing_page_url":"https://doi.org/10.1007/3-540-45664-3_25","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F3-540-45664-3_25.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007%2F3-540-45664-3_25.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074996766","display_name":"Marc J\u00f3ye","orcid":"https://orcid.org/0000-0003-4433-2333"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Marc Joye","raw_affiliation_strings":["Card Security Group, Gemplus Card International, Parc d\u2019Activit\u00e9s de G\u00e9menos, B.P. 100, 13881, G\u00e9menos Cedex, France","Card Security Group, Gemplus Card International, Parc d'Activit\u00e9s de G\u00e9menos, B.P. 100, 13881, G\u00e9menos Cedex, France"],"affiliations":[{"raw_affiliation_string":"Card Security Group, Gemplus Card International, Parc d\u2019Activit\u00e9s de G\u00e9menos, B.P. 100, 13881, G\u00e9menos Cedex, France","institution_ids":[]},{"raw_affiliation_string":"Card Security Group, Gemplus Card International, Parc d'Activit\u00e9s de G\u00e9menos, B.P. 100, 13881, G\u00e9menos Cedex, France","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111969870","display_name":"Sung\u2010Ming Yen","orcid":null},"institutions":[{"id":"https://openalex.org/I22265921","display_name":"National Central University","ror":"https://ror.org/00944ve71","country_code":"TW","type":"education","lineage":["https://openalex.org/I22265921"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Sung-Ming Yen","raw_affiliation_strings":["Laboratory of Cryptography and Information Security (LCIS) Dept of Computer Science and Information Engineering, National Central University, 320, Chung-Li, Taiwan, ROC"],"affiliations":[{"raw_affiliation_string":"Laboratory of Cryptography and Information Security (LCIS) Dept of Computer Science and Information Engineering, National Central University, 320, Chung-Li, Taiwan, ROC","institution_ids":["https://openalex.org/I22265921"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5074996766"],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.283,"has_fulltext":true,"cited_by_count":18,"citation_normalized_percentile":{"value":0.58825183,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"346","last_page":"356"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8627073764801025},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6476234793663025},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.6460933089256287},{"id":"https://openalex.org/keywords/extension","display_name":"Extension (predicate logic)","score":0.623053252696991},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.6202919483184814},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.6079375743865967},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4868864119052887},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16490775346755981},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1646953523159027}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8627073764801025},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6476234793663025},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.6460933089256287},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.623053252696991},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.6202919483184814},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.6079375743865967},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4868864119052887},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16490775346755981},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1646953523159027},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1007/3-540-45664-3_25","is_oa":true,"landing_page_url":"https://doi.org/10.1007/3-540-45664-3_25","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F3-540-45664-3_25.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.1.5888","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5888","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.gemplus.com/smart/r_d/publications/ps/JY02owct.ps","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.10.4537","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.4537","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.gemplus.com/smart/r_d/publications/pdf/JY02owct.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.136.5163","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.5163","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.mathmagic.cn/crypt1998-2003/papers/2274/22740346.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.8.8174","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.8174","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.geocities.com/CapeCanaveral/Launchpad/9160/./papers/owct02.pdf","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1007/3-540-45664-3_25","is_oa":true,"landing_page_url":"https://doi.org/10.1007/3-540-45664-3_25","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F3-540-45664-3_25.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321040","display_name":"National Science Council","ror":"https://ror.org/02kv4zf79"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2102686668.pdf","grobid_xml":"https://content.openalex.org/works/W2102686668.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W115629558","https://openalex.org/W1509197568","https://openalex.org/W1539397313","https://openalex.org/W1566345534","https://openalex.org/W1600255172","https://openalex.org/W1639145229","https://openalex.org/W1705803884","https://openalex.org/W1919093791","https://openalex.org/W2113446256","https://openalex.org/W2132303913","https://openalex.org/W2167179301","https://openalex.org/W2477523090","https://openalex.org/W2484860292","https://openalex.org/W2499506661","https://openalex.org/W2505944591","https://openalex.org/W2916086000","https://openalex.org/W2948409301","https://openalex.org/W3145042860"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W2075768550","https://openalex.org/W3022218857","https://openalex.org/W2369178846","https://openalex.org/W4242235492","https://openalex.org/W2370289839","https://openalex.org/W3144842310","https://openalex.org/W2206006039","https://openalex.org/W3140270587","https://openalex.org/W2159790760"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":4}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
