{"id":"https://openalex.org/W2106076658","doi":"https://doi.org/10.1007/978-3-540-88140-7_11","title":"Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks","display_name":"Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2106076658","doi":"https://doi.org/10.1007/978-3-540-88140-7_11","mag":"2106076658"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-88140-7_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-88140-7_11","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://fun.repo.nii.ac.jp/records/1126","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032223567","display_name":"Fagen Li","orcid":"https://orcid.org/0000-0001-6289-1265"},"institutions":[{"id":"https://openalex.org/I84400586","display_name":"Future University Hakodate","ror":"https://ror.org/05szw2z23","country_code":"JP","type":"education","lineage":["https://openalex.org/I84400586"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN","JP"],"is_corresponding":true,"raw_author_name":"Fagen Li","raw_affiliation_strings":["Key Laboratory of Computer Networks and Information Security, Xidian University, Xi\u2019an, 710071, China","School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 610054, China","School of Systems Information Science, Future University-Hakodate, Hakodate, 041-8655, Japan"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computer Networks and Information Security, Xidian University, Xi\u2019an, 710071, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 610054, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Systems Information Science, Future University-Hakodate, Hakodate, 041-8655, Japan","institution_ids":["https://openalex.org/I84400586"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063809026","display_name":"Masaaki Shirase","orcid":"https://orcid.org/0000-0001-8993-2848"},"institutions":[{"id":"https://openalex.org/I84400586","display_name":"Future University Hakodate","ror":"https://ror.org/05szw2z23","country_code":"JP","type":"education","lineage":["https://openalex.org/I84400586"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masaaki Shirase","raw_affiliation_strings":["School of Systems Information Science, Future University-Hakodate, Hakodate, 041-8655, Japan"],"affiliations":[{"raw_affiliation_string":"School of Systems Information Science, Future University-Hakodate, Hakodate, 041-8655, Japan","institution_ids":["https://openalex.org/I84400586"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000004915","display_name":"Tsuyoshi Takagi","orcid":null},"institutions":[{"id":"https://openalex.org/I84400586","display_name":"Future University Hakodate","ror":"https://ror.org/05szw2z23","country_code":"JP","type":"education","lineage":["https://openalex.org/I84400586"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tsuyoshi Takagi","raw_affiliation_strings":["School of Systems Information Science, Future University-Hakodate, Hakodate, 041-8655, Japan"],"affiliations":[{"raw_affiliation_string":"School of Systems Information Science, Future University-Hakodate, Hakodate, 041-8655, Japan","institution_ids":["https://openalex.org/I84400586"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5032223567"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I150229711","https://openalex.org/I84400586"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.5564,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.68663708,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"LNCS 5245","issue":null,"first_page":"116","last_page":"126"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.8908991813659668},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8097538948059082},{"id":"https://openalex.org/keywords/id-based-cryptography","display_name":"ID-based cryptography","score":0.7451938390731812},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.7364970445632935},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6960594058036804},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.6854740381240845},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.6841552257537842},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5646790266036987},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5459550619125366},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.493934690952301},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.47464069724082947},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44662341475486755},{"id":"https://openalex.org/keywords/pre-shared-key","display_name":"Pre-shared key","score":0.4417800307273865},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.4370628893375397},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.29924696683883667},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.13003024458885193},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11805424094200134}],"concepts":[{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.8908991813659668},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8097538948059082},{"id":"https://openalex.org/C19150895","wikidata":"https://www.wikidata.org/wiki/Q582616","display_name":"ID-based cryptography","level":5,"score":0.7451938390731812},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.7364970445632935},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6960594058036804},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.6854740381240845},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.6841552257537842},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5646790266036987},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5459550619125366},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.493934690952301},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.47464069724082947},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44662341475486755},{"id":"https://openalex.org/C50230483","wikidata":"https://www.wikidata.org/wiki/Q2108226","display_name":"Pre-shared key","level":5,"score":0.4417800307273865},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.4370628893375397},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.29924696683883667},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13003024458885193},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11805424094200134}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-540-88140-7_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-88140-7_11","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:irdb.nii.ac.jp:01406:0005253916","is_oa":true,"landing_page_url":"https://fun.repo.nii.ac.jp/records/1126","pdf_url":null,"source":{"id":"https://openalex.org/S7407056385","display_name":"Institutional Repositories DataBase (IRDB)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I184597095","host_organization_name":"National Institute of Informatics","host_organization_lineage":["https://openalex.org/I184597095"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"NPC 2008","raw_type":"conference paper"}],"best_oa_location":{"id":"pmh:oai:irdb.nii.ac.jp:01406:0005253916","is_oa":true,"landing_page_url":"https://fun.repo.nii.ac.jp/records/1126","pdf_url":null,"source":{"id":"https://openalex.org/S7407056385","display_name":"Institutional Repositories DataBase (IRDB)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I184597095","host_organization_name":"National Institute of Informatics","host_organization_lineage":["https://openalex.org/I184597095"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"NPC 2008","raw_type":"conference paper"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1497626621","https://openalex.org/W1552851303","https://openalex.org/W1563032947","https://openalex.org/W1591524234","https://openalex.org/W1885156594","https://openalex.org/W1997820219","https://openalex.org/W2090020264","https://openalex.org/W2096024255","https://openalex.org/W2117496982","https://openalex.org/W2132130537","https://openalex.org/W2135057483","https://openalex.org/W2141420453","https://openalex.org/W2151528634","https://openalex.org/W2158923961","https://openalex.org/W2168970529","https://openalex.org/W2170262057","https://openalex.org/W2170561193","https://openalex.org/W2475786860","https://openalex.org/W2484860292","https://openalex.org/W2486408843","https://openalex.org/W2496364950","https://openalex.org/W2498149115","https://openalex.org/W2506201965","https://openalex.org/W2537170501","https://openalex.org/W2561675875","https://openalex.org/W3035112273","https://openalex.org/W3112127769","https://openalex.org/W4210500032"],"related_works":["https://openalex.org/W2148480905","https://openalex.org/W2106076658","https://openalex.org/W2607793613","https://openalex.org/W2113976983","https://openalex.org/W3018690376","https://openalex.org/W2162703844","https://openalex.org/W3174772455","https://openalex.org/W783558444","https://openalex.org/W3143198484","https://openalex.org/W1566323499"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
