{"id":"https://openalex.org/W3116484264","doi":"https://doi.org/10.1007/978-3-030-65729-1_8","title":"Comparative Analysis of Cryptographic Key Management Systems","display_name":"Comparative Analysis of Cryptographic Key Management Systems","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3116484264","doi":"https://doi.org/10.1007/978-3-030-65729-1_8","mag":"3116484264"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-65729-1_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-65729-1_8","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2109.09905","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010458580","display_name":"Ievgeniia Kuzminykh","orcid":"https://orcid.org/0000-0001-6917-4234"},"institutions":[{"id":"https://openalex.org/I107158390","display_name":"Kharkiv National University of Radio Electronics","ror":"https://ror.org/01ctj1b90","country_code":"UA","type":"education","lineage":["https://openalex.org/I107158390"]},{"id":"https://openalex.org/I183935753","display_name":"King's College London","ror":"https://ror.org/0220mzb33","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I183935753"]},{"id":"https://openalex.org/I8765205","display_name":"V. N. Karazin Kharkiv National University","ror":"https://ror.org/03ftejk10","country_code":"UA","type":"education","lineage":["https://openalex.org/I8765205"]}],"countries":["GB","UA"],"is_corresponding":true,"raw_author_name":"Ievgeniia Kuzminykh","raw_affiliation_strings":["Kharkiv National University of Radio Electronics, Nauky av. 14, Kharkiv, 61166, Ukraine","King\u2019s College London, Strand, London, WC2R 2LS, UK","King's College London, Strand, London, WC2R 2LS, UK"],"affiliations":[{"raw_affiliation_string":"Kharkiv National University of Radio Electronics, Nauky av. 14, Kharkiv, 61166, Ukraine","institution_ids":["https://openalex.org/I8765205","https://openalex.org/I107158390"]},{"raw_affiliation_string":"King\u2019s College London, Strand, London, WC2R 2LS, UK","institution_ids":["https://openalex.org/I183935753"]},{"raw_affiliation_string":"King's College London, Strand, London, WC2R 2LS, UK","institution_ids":["https://openalex.org/I183935753"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044709278","display_name":"Bogdan Ghita","orcid":"https://orcid.org/0000-0002-1788-547X"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Bogdan Ghita","raw_affiliation_strings":["University of Plymouth, Drake Circus, Plymouth, PL4 8AA, UK"],"affiliations":[{"raw_affiliation_string":"University of Plymouth, Drake Circus, Plymouth, PL4 8AA, UK","institution_ids":["https://openalex.org/I897542642"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004375212","display_name":"Stavros Shiaeles","orcid":"https://orcid.org/0000-0003-3866-0672"},"institutions":[{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Stavros Shiaeles","raw_affiliation_strings":["University of Portsmouth, Portsmouth, PO1 3RR, UK"],"affiliations":[{"raw_affiliation_string":"University of Portsmouth, Portsmouth, PO1 3RR, UK","institution_ids":["https://openalex.org/I63072094"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5010458580"],"corresponding_institution_ids":["https://openalex.org/I107158390","https://openalex.org/I183935753","https://openalex.org/I8765205"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.3733,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.8509281,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"80","last_page":"94"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8466947078704834},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.741244912147522},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6330230832099915},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5426656603813171},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5234403014183044},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4975111782550812},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.49451419711112976},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4911772906780243},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4837479591369629},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.30604052543640137}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8466947078704834},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.741244912147522},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6330230832099915},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5426656603813171},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5234403014183044},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4975111782550812},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.49451419711112976},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4911772906780243},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4837479591369629},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.30604052543640137}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1007/978-3-030-65729-1_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-65729-1_8","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:arXiv.org:2109.09905","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2109.09905","pdf_url":"https://arxiv.org/pdf/2109.09905","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:pearl.plymouth.ac.uk:10026.1/17141","is_oa":true,"landing_page_url":"http://hdl.handle.net/10026.1/17141","pdf_url":"http://hdl.handle.net/10026.1/17141","source":{"id":"https://openalex.org/S4306402507","display_name":"PEARL (University of Plymouth)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I897542642","host_organization_name":"University of Plymouth","host_organization_lineage":["https://openalex.org/I897542642"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conference"},{"id":"pmh:oai:kclpure.kcl.ac.uk:publications/73f7a389-3b26-43db-adc3-9cc014ea765d","is_oa":false,"landing_page_url":"https://kclpure.kcl.ac.uk/portal/en/publications/73f7a389-3b26-43db-adc3-9cc014ea765d","pdf_url":null,"source":{"id":"https://openalex.org/S4306400216","display_name":"Research Portal (King's College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I183935753","host_organization_name":"King's College London","host_organization_lineage":["https://openalex.org/I183935753"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Kuzminykh, I, Ghita, B & Shiaeles, S 2020, Comparative analysis of cryptographic key management systems. in O Galinina, S Andreev, S Balandin & Y Koucheryavy (eds), Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 20th International Conference, NEW2AN 2020 and 13th Conference, ruSMART 2020, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12526 LNCS, Springer Science and Business Media Deutschland GmbH, pp. 80-94, 20th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2020 and 13th Conference on the Internet of Things and Smart Spaces, ruSMART 2020, St. Petersburg, Russian Federation, 26/08/2020. https://doi.org/10.1007/978-3-030-65729-1_8","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:researchportal.port.ac.uk:publications/07f5f54b-660d-4d62-90e3-035be812582f","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401774","display_name":"Portsmouth Research Portal (University of Portsmouth)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I63072094","host_organization_name":"University of Portsmouth","host_organization_lineage":["https://openalex.org/I63072094"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2109.09905","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2109.09905","pdf_url":"https://arxiv.org/pdf/2109.09905","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6299999952316284}],"awards":[{"id":"https://openalex.org/G1047790601","display_name":"Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things","funder_award_id":"786698","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G4662105022","display_name":null,"funder_award_id":"833673","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G4956428346","display_name":null,"funder_award_id":"Horizon 2020 research and innovatio","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8318064016","display_name":null,"funder_award_id":"Horizon","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1608205481","https://openalex.org/W1983898203","https://openalex.org/W2306382618","https://openalex.org/W2521948932","https://openalex.org/W2542896906","https://openalex.org/W2783064561","https://openalex.org/W2792415359","https://openalex.org/W2893778953","https://openalex.org/W3007170693","https://openalex.org/W3093003777","https://openalex.org/W4253731935","https://openalex.org/W7061773922"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4237598585","https://openalex.org/W2625310891","https://openalex.org/W2371673014","https://openalex.org/W2255058412"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2021-01-05T00:00:00"}
