{"id":"https://openalex.org/W1487410302","doi":"https://doi.org/10.1007/978-3-540-68979-9_8","title":"Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI","display_name":"Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI","publication_year":2008,"publication_date":"2008-08-12","ids":{"openalex":"https://openalex.org/W1487410302","doi":"https://doi.org/10.1007/978-3-540-68979-9_8","mag":"1487410302"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-68979-9_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-68979-9_8","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046080762","display_name":"Konstantin Hypp\u00f6nen","orcid":null},"institutions":[{"id":"https://openalex.org/I175532246","display_name":"University of Eastern Finland","ror":"https://ror.org/00cyydd11","country_code":"FI","type":"education","lineage":["https://openalex.org/I175532246"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Konstantin Hypp\u00f6nen","raw_affiliation_strings":["Department of Computer Science, University of Kuopio, Kuopio, Finland FIN-70211#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Kuopio, Kuopio, Finland FIN-70211#TAB#","institution_ids":["https://openalex.org/I175532246"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112002204","display_name":"Marko Hassinen","orcid":null},"institutions":[{"id":"https://openalex.org/I175532246","display_name":"University of Eastern Finland","ror":"https://ror.org/00cyydd11","country_code":"FI","type":"education","lineage":["https://openalex.org/I175532246"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Marko Hassinen","raw_affiliation_strings":["Department of Computer Science, University of Kuopio, Kuopio, Finland","Department of Computer Science, University of Kuopio, Kuopio, Finland FIN-70211#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Kuopio, Kuopio, Finland","institution_ids":["https://openalex.org/I175532246"]},{"raw_affiliation_string":"Department of Computer Science, University of Kuopio, Kuopio, Finland FIN-70211#TAB#","institution_ids":["https://openalex.org/I175532246"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059736917","display_name":"Elena Trichina","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Elena Trichina","raw_affiliation_strings":["Spansion International Inc., Munich, Germany","Spansion International Inc., Munich, Germany 81829#TAB#"],"affiliations":[{"raw_affiliation_string":"Spansion International Inc., Munich, Germany","institution_ids":[]},{"raw_affiliation_string":"Spansion International Inc., Munich, Germany 81829#TAB#","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5046080762"],"corresponding_institution_ids":["https://openalex.org/I175532246"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05578635,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"107","last_page":"118"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7671878933906555},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.7309998273849487},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.7283416390419006},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6460725665092468},{"id":"https://openalex.org/keywords/subscriber-identity-module","display_name":"Subscriber identity module","score":0.5929166078567505},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5901445150375366},{"id":"https://openalex.org/keywords/ticket","display_name":"Ticket","score":0.5721922516822815},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.5589997172355652},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.4840911626815796},{"id":"https://openalex.org/keywords/mobile-identification-number","display_name":"Mobile identification number","score":0.44241347908973694},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42940834164619446},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3635489344596863},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.29146236181259155},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.2573555111885071},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.25536760687828064},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.24731507897377014},{"id":"https://openalex.org/keywords/mobile-technology","display_name":"Mobile technology","score":0.2078143060207367},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.19765126705169678},{"id":"https://openalex.org/keywords/mobile-web","display_name":"Mobile Web","score":0.13333788514137268}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7671878933906555},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.7309998273849487},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.7283416390419006},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6460725665092468},{"id":"https://openalex.org/C40367706","wikidata":"https://www.wikidata.org/wiki/Q230110","display_name":"Subscriber identity module","level":3,"score":0.5929166078567505},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5901445150375366},{"id":"https://openalex.org/C2776540713","wikidata":"https://www.wikidata.org/wiki/Q7800647","display_name":"Ticket","level":2,"score":0.5721922516822815},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.5589997172355652},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.4840911626815796},{"id":"https://openalex.org/C40105971","wikidata":"https://www.wikidata.org/wiki/Q3317648","display_name":"Mobile identification number","level":5,"score":0.44241347908973694},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42940834164619446},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3635489344596863},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.29146236181259155},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.2573555111885071},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.25536760687828064},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.24731507897377014},{"id":"https://openalex.org/C60952562","wikidata":"https://www.wikidata.org/wiki/Q6887246","display_name":"Mobile technology","level":3,"score":0.2078143060207367},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.19765126705169678},{"id":"https://openalex.org/C516764902","wikidata":"https://www.wikidata.org/wiki/Q1043805","display_name":"Mobile Web","level":4,"score":0.13333788514137268},{"id":"https://openalex.org/C2779971919","wikidata":"https://www.wikidata.org/wiki/Q1378949","display_name":"Handset","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-68979-9_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-68979-9_8","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6000000238418579,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1485497075","https://openalex.org/W1508485285","https://openalex.org/W1790978359","https://openalex.org/W1983451630","https://openalex.org/W2155978834","https://openalex.org/W2197000251","https://openalex.org/W4300279966"],"related_works":["https://openalex.org/W647634708","https://openalex.org/W777477939","https://openalex.org/W627358976","https://openalex.org/W2152417340","https://openalex.org/W608920586","https://openalex.org/W2401490094","https://openalex.org/W598805835","https://openalex.org/W2120616525","https://openalex.org/W3164059328","https://openalex.org/W2040103916"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
