{"id":"https://openalex.org/W1542714689","doi":"https://doi.org/10.1007/978-3-540-74282-1_117","title":"A Novel Verifier-Based Authenticated Key Agreement Protocol","display_name":"A Novel Verifier-Based Authenticated Key Agreement Protocol","publication_year":2007,"publication_date":"2007-08-09","ids":{"openalex":"https://openalex.org/W1542714689","doi":"https://doi.org/10.1007/978-3-540-74282-1_117","mag":"1542714689"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-74282-1_117","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-74282-1_117","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102024435","display_name":"Chunbo Ma","orcid":"https://orcid.org/0000-0001-5278-9670"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chunbo Ma","raw_affiliation_strings":["School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, 200030, P.R. China","The State Key Laboratory of Information Security, Institute of Software of Chinese Academy of Sciences, Beijing, 100049, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, 200030, P.R. China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"The State Key Laboratory of Information Security, Institute of Software of Chinese Academy of Sciences, Beijing, 100049, P.R. China","institution_ids":["https://openalex.org/I4210128818"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101400524","display_name":"Jun Ao","orcid":"https://orcid.org/0000-0001-8843-613X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Ao","raw_affiliation_strings":["State Key Laboratory for Radar Signal Processing, Xidian University, Xi\u2019an, Shanxi, 710071, P.R. China","State Key Laboratory for Radar Signal Processing, Xidian University, Xi'an, Shanxi, 710071, P.R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Radar Signal Processing, Xidian University, Xi\u2019an, Shanxi, 710071, P.R. China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory for Radar Signal Processing, Xidian University, Xi'an, Shanxi, 710071, P.R. China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100391361","display_name":"Jianhua Li","orcid":"https://orcid.org/0000-0002-6831-3973"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhua Li","raw_affiliation_strings":["School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, 200030, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, 200030, P.R. China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102024435"],"corresponding_institution_ids":["https://openalex.org/I183067930","https://openalex.org/I4210128818"],"apc_list":null,"apc_paid":null,"fwci":0.4172,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.6243746,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1044","last_page":"1050"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.724001944065094},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6284452676773071},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6066935062408447},{"id":"https://openalex.org/keywords/key-agreement-protocol","display_name":"Key-agreement protocol","score":0.5747717022895813},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4846256673336029},{"id":"https://openalex.org/keywords/man-in-the-middle-attack","display_name":"Man-in-the-middle attack","score":0.47813212871551514},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43656057119369507},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.20895957946777344},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.12387984991073608},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09364846348762512},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.05485597252845764}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.724001944065094},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6284452676773071},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6066935062408447},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.5747717022895813},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4846256673336029},{"id":"https://openalex.org/C196491621","wikidata":"https://www.wikidata.org/wiki/Q554830","display_name":"Man-in-the-middle attack","level":3,"score":0.47813212871551514},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43656057119369507},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.20895957946777344},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.12387984991073608},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09364846348762512},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.05485597252845764},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-74282-1_117","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-74282-1_117","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1505957993","https://openalex.org/W1518817958","https://openalex.org/W1549244102","https://openalex.org/W1560431798","https://openalex.org/W1568866862","https://openalex.org/W1585644665","https://openalex.org/W1598151097","https://openalex.org/W1599931493","https://openalex.org/W1610688607","https://openalex.org/W1939815730","https://openalex.org/W2035164471","https://openalex.org/W2124926080","https://openalex.org/W2156186849","https://openalex.org/W2157604883","https://openalex.org/W2476332689","https://openalex.org/W2482419090","https://openalex.org/W2483988241","https://openalex.org/W2496364950","https://openalex.org/W2503431160","https://openalex.org/W2506201965","https://openalex.org/W2624923838","https://openalex.org/W3150288774"],"related_works":["https://openalex.org/W3155578322","https://openalex.org/W4221155389","https://openalex.org/W1837027913","https://openalex.org/W1757125555","https://openalex.org/W4312674866","https://openalex.org/W2078882516","https://openalex.org/W2354911252","https://openalex.org/W2012025519","https://openalex.org/W2791530277","https://openalex.org/W91237049"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
