{"id":"https://openalex.org/W1596806171","doi":"https://doi.org/10.1007/978-3-540-31979-5_33","title":"Token-Controlled Public Key Encryption","display_name":"Token-Controlled Public Key Encryption","publication_year":2005,"publication_date":"2005-01-01","ids":{"openalex":"https://openalex.org/W1596806171","doi":"https://doi.org/10.1007/978-3-540-31979-5_33","mag":"1596806171"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-31979-5_33","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-31979-5_33","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088366326","display_name":"Joonsang Baek","orcid":"https://orcid.org/0000-0003-2613-2127"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Joonsang Baek","raw_affiliation_strings":["Centre for Information Security Research, School of Information Technology and Computer Science, University of Wollongong, Wollongong, NSW 2522, Australia","Centre for Information Security Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Information Security Research, School of Information Technology and Computer Science, University of Wollongong, Wollongong, NSW 2522, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Information Security Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010447902","display_name":"Reihaneh Safavi\u2013Naini","orcid":"https://orcid.org/0000-0002-1697-3590"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Reihaneh Safavi-Naini","raw_affiliation_strings":["Centre for Information Security Research, School of Information Technology and Computer Science, University of Wollongong, Wollongong, NSW 2522, Australia","Centre for Information Security Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Information Security Research, School of Information Technology and Computer Science, University of Wollongong, Wollongong, NSW 2522, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Information Security Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["Centre for Information Security Research, School of Information Technology and Computer Science, University of Wollongong, Wollongong, NSW 2522, Australia","Centre for Information Security Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Information Security Research, School of Information Technology and Computer Science, University of Wollongong, Wollongong, NSW 2522, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Information Security Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088366326"],"corresponding_institution_ids":["https://openalex.org/I204824540"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.9897,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.87545956,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"386","last_page":"397"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.8217636346817017},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8158569931983948},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7720736265182495},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.649965763092041},{"id":"https://openalex.org/keywords/token-passing","display_name":"Token passing","score":0.6100084185600281},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.575416088104248},{"id":"https://openalex.org/keywords/token-bus-network","display_name":"Token bus network","score":0.5739160776138306},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.542452871799469},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5281161069869995},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.508171796798706},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.505854606628418},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.47647401690483093},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.4277417063713074},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37826621532440186},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32864516973495483},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3245480954647064},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08105090260505676}],"concepts":[{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.8217636346817017},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8158569931983948},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7720736265182495},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.649965763092041},{"id":"https://openalex.org/C115067241","wikidata":"https://www.wikidata.org/wiki/Q1639854","display_name":"Token passing","level":3,"score":0.6100084185600281},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.575416088104248},{"id":"https://openalex.org/C102462485","wikidata":"https://www.wikidata.org/wiki/Q904595","display_name":"Token bus network","level":3,"score":0.5739160776138306},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.542452871799469},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5281161069869995},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.508171796798706},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.505854606628418},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.47647401690483093},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.4277417063713074},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37826621532440186},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32864516973495483},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3245480954647064},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08105090260505676},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-540-31979-5_33","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-31979-5_33","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ro.uow.edu.au:infopapers-10134","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/infopapers/2798","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Informatics - Papers (Archive)","raw_type":"presentation"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1495266644","https://openalex.org/W1521274767","https://openalex.org/W1527410104","https://openalex.org/W1586972594","https://openalex.org/W1589586740","https://openalex.org/W1610688607","https://openalex.org/W1632088469","https://openalex.org/W2007711167","https://openalex.org/W2052267638","https://openalex.org/W2095708839","https://openalex.org/W2106583429","https://openalex.org/W2110740499","https://openalex.org/W2112460803","https://openalex.org/W2152924492","https://openalex.org/W2480510614","https://openalex.org/W2489368553","https://openalex.org/W2494421621","https://openalex.org/W2624923838","https://openalex.org/W2770583616"],"related_works":["https://openalex.org/W3021845819","https://openalex.org/W2074768958","https://openalex.org/W2540135243","https://openalex.org/W2475413913","https://openalex.org/W2098809314","https://openalex.org/W2089730428","https://openalex.org/W2348435129","https://openalex.org/W2142106817","https://openalex.org/W2008823027","https://openalex.org/W2136545404"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
