{"id":"https://openalex.org/W1842029737","doi":"https://doi.org/10.1007/978-3-540-73257-0_14","title":"Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery","display_name":"Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery","publication_year":2007,"publication_date":"2007-01-01","ids":{"openalex":"https://openalex.org/W1842029737","doi":"https://doi.org/10.1007/978-3-540-73257-0_14","mag":"1842029737"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-73257-0_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-73257-0_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102024435","display_name":"Chunbo Ma","orcid":"https://orcid.org/0000-0001-5278-9670"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I4391768012","display_name":"State Key Laboratory of Information Security","ror":"https://ror.org/012cr4033","country_code":null,"type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4391768012"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chunbo Ma","raw_affiliation_strings":["School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, 200030, P.R. China","The State Key Laboratory of Information Security, Institute of Software of Chinese Academy of Sciences, Beijing, 100049, P.R. China","School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, P.R. China and The State Key Laboratory of Information Security, Institute of Software of Chinese Academy of Sc ...#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, 200030, P.R. China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"The State Key Laboratory of Information Security, Institute of Software of Chinese Academy of Sciences, Beijing, 100049, P.R. China","institution_ids":["https://openalex.org/I4210128818"]},{"raw_affiliation_string":"School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, P.R. China and The State Key Laboratory of Information Security, Institute of Software of Chinese Academy of Sc ...#TAB#","institution_ids":["https://openalex.org/I183067930","https://openalex.org/I4391768012"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101400524","display_name":"Jun Ao","orcid":"https://orcid.org/0000-0001-8843-613X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Ao","raw_affiliation_strings":["State Key Laboratory for Radar Signal Processing, Xidian University, Xi\u2019an, Shanxi, 710071, P.R. China","State Key Laboratory for Radar Signal Processing, Xidian University, Xi'an, Shanxi, P.R. China#TAB#"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Radar Signal Processing, Xidian University, Xi\u2019an, Shanxi, 710071, P.R. China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory for Radar Signal Processing, Xidian University, Xi'an, Shanxi, P.R. China#TAB#","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100391361","display_name":"Jianhua Li","orcid":"https://orcid.org/0000-0002-6831-3973"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhua Li","raw_affiliation_strings":["School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, 200030, P.R. China","School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, P.R.China#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, 200030, P.R. China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, P.R.China#TAB#","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102024435"],"corresponding_institution_ids":["https://openalex.org/I183067930","https://openalex.org/I4210128818","https://openalex.org/I4391768012"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.916,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.77229676,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"124","last_page":"133"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7864798307418823},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7075623869895935},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6292576789855957},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.59654700756073},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5255916118621826},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5017449855804443},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.4355957508087158},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.0675191581249237}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7864798307418823},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7075623869895935},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6292576789855957},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.59654700756073},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5255916118621826},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5017449855804443},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.4355957508087158},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0675191581249237},{"id":"https://openalex.org/C159110408","wikidata":"https://www.wikidata.org/wiki/Q121176","display_name":"Nursing","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-73257-0_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-73257-0_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7200000286102295}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W143651745","https://openalex.org/W1485802713","https://openalex.org/W1500682127","https://openalex.org/W1502577962","https://openalex.org/W1506423323","https://openalex.org/W1508362310","https://openalex.org/W1520478394","https://openalex.org/W1546600652","https://openalex.org/W1549244102","https://openalex.org/W1921661296","https://openalex.org/W2020071233","https://openalex.org/W2043529420","https://openalex.org/W2065722310","https://openalex.org/W2098996144","https://openalex.org/W2107561818","https://openalex.org/W2117852003","https://openalex.org/W2129483619","https://openalex.org/W2134679597","https://openalex.org/W2156186849","https://openalex.org/W2166706457","https://openalex.org/W2282892286","https://openalex.org/W2476332689","https://openalex.org/W2477011922","https://openalex.org/W2480001466","https://openalex.org/W2486408843","https://openalex.org/W2503514047","https://openalex.org/W2561675875","https://openalex.org/W2624923838","https://openalex.org/W4200283578"],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2892743407","https://openalex.org/W773319083","https://openalex.org/W2776010770"],"abstract_inverted_index":null,"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
