{"id":"https://openalex.org/W7128913044","doi":"https://doi.org/10.1007/978-3-032-13377-9_8","title":"Economic Security of\u00a0Multiple Shared Security Protocols","display_name":"Economic Security of\u00a0Multiple Shared Security Protocols","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7128913044","doi":"https://doi.org/10.1007/978-3-032-13377-9_8"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-032-13377-9_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-032-13377-9_8","pdf_url":null,"source":{"id":"https://openalex.org/S4210196675","display_name":"Lecture notes in operations research","issn_l":"2731-040X","issn":["2731-040X","2731-0418"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Operations Research","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Abhimanyu Nag","orcid":null},"institutions":[{"id":"https://openalex.org/I154425047","display_name":"University of Alberta","ror":"https://ror.org/0160cpw27","country_code":"CA","type":"education","lineage":["https://openalex.org/I154425047"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Abhimanyu Nag","raw_affiliation_strings":["Department of Mathematical and Statistical Sciences, University of Alberta, Edmonton, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Mathematical and Statistical Sciences, University of Alberta, Edmonton, Canada","institution_ids":["https://openalex.org/I154425047"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Dhruv Bodani","orcid":null},"institutions":[{"id":"https://openalex.org/I4210092861","display_name":"Institute of Catalysis and Petrochemistry","ror":"https://ror.org/00hfszj21","country_code":"RU","type":"facility","lineage":["https://openalex.org/I1313323035","https://openalex.org/I4210092861","https://openalex.org/I4210145551"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Dhruv Bodani","raw_affiliation_strings":["Catalysis Labs, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Catalysis Labs, Singapore, Singapore","institution_ids":["https://openalex.org/I4210092861"]}]},{"author_position":"last","author":{"id":null,"display_name":"Abhishek Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I4210092861","display_name":"Institute of Catalysis and Petrochemistry","ror":"https://ror.org/00hfszj21","country_code":"RU","type":"facility","lineage":["https://openalex.org/I1313323035","https://openalex.org/I4210092861","https://openalex.org/I4210145551"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Abhishek Kumar","raw_affiliation_strings":["Catalysis Labs, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Catalysis Labs, Singapore, Singapore","institution_ids":["https://openalex.org/I4210092861"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I154425047"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.72132867,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"166","last_page":"186"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.482699990272522,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.482699990272522,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.053199999034404755,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.0502999983727932,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6322000026702881},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.6237999796867371},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.4839000105857849},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4641000032424927},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.45840001106262207},{"id":"https://openalex.org/keywords/negotiation","display_name":"Negotiation","score":0.4341000020503998},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.41940000653266907},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4034000039100647}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7294999957084656},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6480000019073486},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6322000026702881},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.6237999796867371},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.4839000105857849},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4641000032424927},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.45840001106262207},{"id":"https://openalex.org/C199776023","wikidata":"https://www.wikidata.org/wiki/Q202875","display_name":"Negotiation","level":2,"score":0.4341000020503998},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.41940000653266907},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4034000039100647},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.3781999945640564},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.36239999532699585},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.3497999906539917},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.30059999227523804},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.27549999952316284},{"id":"https://openalex.org/C52146309","wikidata":"https://www.wikidata.org/wiki/Q7431116","display_name":"Schema (genetic algorithms)","level":2,"score":0.2687999904155731},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.25699999928474426},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.25690001249313354},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2565999925136566}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-032-13377-9_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-032-13377-9_8","pdf_url":null,"source":{"id":"https://openalex.org/S4210196675","display_name":"Lecture notes in operations research","issn_l":"2731-040X","issn":["2731-040X","2731-0418"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Operations Research","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/15","display_name":"Life in Land","score":0.6307443976402283}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2030134503","https://openalex.org/W2089266366","https://openalex.org/W2131695829","https://openalex.org/W2138083400","https://openalex.org/W2171543997","https://openalex.org/W2929975740","https://openalex.org/W3086936962","https://openalex.org/W3202562889","https://openalex.org/W4229815470","https://openalex.org/W4239508238","https://openalex.org/W4244750590","https://openalex.org/W4250589301"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-02-16T05:59:50.152749","created_date":"2025-12-10T00:00:00"}
