{"id":"https://openalex.org/W2782593912","doi":"https://doi.org/10.1007/978-3-319-72550-5_9","title":"Fuzzy Evaluation Scheme for KDF Based on Stream Ciphers","display_name":"Fuzzy Evaluation Scheme for KDF Based on Stream Ciphers","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2782593912","doi":"https://doi.org/10.1007/978-3-319-72550-5_9","mag":"2782593912"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-72550-5_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-72550-5_9","pdf_url":null,"source":{"id":"https://openalex.org/S2764905038","display_name":"Advances in intelligent systems and computing","issn_l":"2194-5357","issn":["2194-5357","2194-5365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Intelligent Systems and Computing","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086529704","display_name":"Hamijah Mohd Rahman","orcid":null},"institutions":[{"id":"https://openalex.org/I930072361","display_name":"Tun Hussein Onn University of Malaysia","ror":"https://ror.org/01c5wha71","country_code":"MY","type":"education","lineage":["https://openalex.org/I930072361"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Hamijah Mohd. Rahman","raw_affiliation_strings":["Information Security Interest Group (ISIG), Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn, 86400, Parit Raja, Batu Pahat, Johor, Malaysia","Soft Computing and Data Mining (SMC), Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn, 86400, Parit Raja, Batu Pahat, Johor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Information Security Interest Group (ISIG), Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn, 86400, Parit Raja, Batu Pahat, Johor, Malaysia","institution_ids":["https://openalex.org/I930072361"]},{"raw_affiliation_string":"Soft Computing and Data Mining (SMC), Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn, 86400, Parit Raja, Batu Pahat, Johor, Malaysia","institution_ids":["https://openalex.org/I930072361"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016614429","display_name":"Nureize Arbaiy","orcid":"https://orcid.org/0000-0002-9535-8384"},"institutions":[{"id":"https://openalex.org/I930072361","display_name":"Tun Hussein Onn University of Malaysia","ror":"https://ror.org/01c5wha71","country_code":"MY","type":"education","lineage":["https://openalex.org/I930072361"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Nureize Arbaiy","raw_affiliation_strings":["Soft Computing and Data Mining (SMC), Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn, 86400, Parit Raja, Batu Pahat, Johor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Soft Computing and Data Mining (SMC), Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn, 86400, Parit Raja, Batu Pahat, Johor, Malaysia","institution_ids":["https://openalex.org/I930072361"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058289252","display_name":"Chuah Chai Wen","orcid":"https://orcid.org/0000-0003-0800-0147"},"institutions":[{"id":"https://openalex.org/I930072361","display_name":"Tun Hussein Onn University of Malaysia","ror":"https://ror.org/01c5wha71","country_code":"MY","type":"education","lineage":["https://openalex.org/I930072361"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Chuah Chai Wen","raw_affiliation_strings":["Information Security Interest Group (ISIG), Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn, 86400, Parit Raja, Batu Pahat, Johor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Information Security Interest Group (ISIG), Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn, 86400, Parit Raja, Batu Pahat, Johor, Malaysia","institution_ids":["https://openalex.org/I930072361"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5086529704"],"corresponding_institution_ids":["https://openalex.org/I930072361"],"apc_list":null,"apc_paid":null,"fwci":0.0907,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.43332146,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"82","last_page":"94"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6440215706825256},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.577686607837677},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5425442457199097},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5012896060943604},{"id":"https://openalex.org/keywords/key-schedule","display_name":"Key schedule","score":0.47074705362319946},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.4028054475784302},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.39476361870765686},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3141045570373535},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15720659494400024}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6440215706825256},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.577686607837677},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5425442457199097},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5012896060943604},{"id":"https://openalex.org/C112145980","wikidata":"https://www.wikidata.org/wiki/Q2569509","display_name":"Key schedule","level":5,"score":0.47074705362319946},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.4028054475784302},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.39476361870765686},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3141045570373535},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15720659494400024}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-72550-5_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-72550-5_9","pdf_url":null,"source":{"id":"https://openalex.org/S2764905038","display_name":"Advances in intelligent systems and computing","issn_l":"2194-5357","issn":["2194-5357","2194-5365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Intelligent Systems and Computing","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W157669941","https://openalex.org/W617837371","https://openalex.org/W1518337906","https://openalex.org/W1518850531","https://openalex.org/W1903742260","https://openalex.org/W1992176519","https://openalex.org/W2032521963","https://openalex.org/W2052267638","https://openalex.org/W2072739149","https://openalex.org/W2097140439","https://openalex.org/W2098400079","https://openalex.org/W2164090669","https://openalex.org/W2179629416","https://openalex.org/W2186387410","https://openalex.org/W2187320938","https://openalex.org/W2398735678","https://openalex.org/W2496338429","https://openalex.org/W2506471491","https://openalex.org/W2543095631","https://openalex.org/W2599666542","https://openalex.org/W4233407746","https://openalex.org/W4249749961"],"related_works":["https://openalex.org/W2610633131","https://openalex.org/W2058945216","https://openalex.org/W3049224195","https://openalex.org/W2949320056","https://openalex.org/W1489350638","https://openalex.org/W1536123347","https://openalex.org/W2903451324","https://openalex.org/W1890290077","https://openalex.org/W2406342588","https://openalex.org/W2244520036"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
