{"id":"https://openalex.org/W2904139657","doi":"https://doi.org/10.1007/978-3-030-05063-4_9","title":"Harden Tamper-Proofing to Combat MATE Attack","display_name":"Harden Tamper-Proofing to Combat MATE Attack","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2904139657","doi":"https://doi.org/10.1007/978-3-030-05063-4_9","mag":"2904139657"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-05063-4_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-05063-4_9","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100457692","display_name":"Zhe Chen","orcid":"https://orcid.org/0000-0002-4707-2402"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhe Chen","raw_affiliation_strings":["College of Computer, Nankai University, Tianjin, 300350, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, Nankai University, Tianjin, 300350, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005646333","display_name":"Chunfu Jia","orcid":"https://orcid.org/0000-0002-5588-9690"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]},{"id":"https://openalex.org/I28813325","display_name":"Civil Aviation University of China","ror":"https://ror.org/03je71k37","country_code":"CN","type":"education","lineage":["https://openalex.org/I28813325"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunfu Jia","raw_affiliation_strings":["College of Computer, Nankai University, Tianjin, 300350, China","Information Security Evaluation Center of Civil Aviation, Civil Aviation University of China, Tianjin, 300300, China","Key Laboratory on High Trusted Information System in Hebei Province, Baoding, 071002, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, Nankai University, Tianjin, 300350, China","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"Information Security Evaluation Center of Civil Aviation, Civil Aviation University of China, Tianjin, 300300, China","institution_ids":["https://openalex.org/I28813325"]},{"raw_affiliation_string":"Key Laboratory on High Trusted Information System in Hebei Province, Baoding, 071002, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005969194","display_name":"Tongtong Lv","orcid":null},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tongtong Lv","raw_affiliation_strings":["College of Computer, Nankai University, Tianjin, 300350, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, Nankai University, Tianjin, 300350, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035659127","display_name":"Tong Li","orcid":"https://orcid.org/0000-0002-1817-918X"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tong Li","raw_affiliation_strings":["School of Computer Science, Guangzhou University, Guangzhou, 500016, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Guangzhou University, Guangzhou, 500016, China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100457692"],"corresponding_institution_ids":["https://openalex.org/I205237279"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.17517802,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"98","last_page":"108"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8371996879577637},{"id":"https://openalex.org/keywords/tamper-resistance","display_name":"Tamper resistance","score":0.8348780870437622},{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.7492864727973938},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.716396689414978},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6057575941085815},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5576674342155457},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5092161893844604},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3294142484664917},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21725577116012573},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1108102798461914}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8371996879577637},{"id":"https://openalex.org/C19163912","wikidata":"https://www.wikidata.org/wiki/Q7681779","display_name":"Tamper resistance","level":2,"score":0.8348780870437622},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.7492864727973938},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.716396689414978},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6057575941085815},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5576674342155457},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5092161893844604},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3294142484664917},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21725577116012573},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1108102798461914},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-05063-4_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-05063-4_9","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7900000214576721,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W109909280","https://openalex.org/W1514023947","https://openalex.org/W1538510258","https://openalex.org/W1569778844","https://openalex.org/W1718337629","https://openalex.org/W1987099882","https://openalex.org/W2027586790","https://openalex.org/W2061643296","https://openalex.org/W2064776901","https://openalex.org/W2084939909","https://openalex.org/W2086968222","https://openalex.org/W2103380811","https://openalex.org/W2113866753","https://openalex.org/W2114717587","https://openalex.org/W2397423248","https://openalex.org/W2460441129","https://openalex.org/W2561955909","https://openalex.org/W2575735093","https://openalex.org/W2594560662","https://openalex.org/W2596179659","https://openalex.org/W2624409104","https://openalex.org/W2741593962","https://openalex.org/W2760486121","https://openalex.org/W2765825046","https://openalex.org/W2767283778","https://openalex.org/W6730426483"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W4242235492","https://openalex.org/W2980401999","https://openalex.org/W3016483420","https://openalex.org/W2331628363","https://openalex.org/W2393030234","https://openalex.org/W2367268135","https://openalex.org/W3198851420","https://openalex.org/W2379730136","https://openalex.org/W1480190076"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
