{"id":"https://openalex.org/W2164706912","doi":"https://doi.org/10.1007/978-3-642-13241-4_23","title":"Secure Communication Using Identity Based Encryption","display_name":"Secure Communication Using Identity Based Encryption","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W2164706912","doi":"https://doi.org/10.1007/978-3-642-13241-4_23","mag":"2164706912"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-13241-4_23","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-13241-4_23","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-13241-4_23.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-13241-4_23.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062060869","display_name":"Sebastian Roschke","orcid":null},"institutions":[{"id":"https://openalex.org/I176453806","display_name":"University of Potsdam","ror":"https://ror.org/03bnmw459","country_code":"DE","type":"education","lineage":["https://openalex.org/I176453806"]},{"id":"https://openalex.org/I143288331","display_name":"Hasso Plattner Institute","ror":"https://ror.org/058rn5r42","country_code":"DE","type":"facility","lineage":["https://openalex.org/I143288331","https://openalex.org/I176453806"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Sebastian Roschke","raw_affiliation_strings":["Hasso Plattner Institute (HPI), University of Potsdam, P.O. Box 900460, 14440, Potsdam, Germany"],"affiliations":[{"raw_affiliation_string":"Hasso Plattner Institute (HPI), University of Potsdam, P.O. Box 900460, 14440, Potsdam, Germany","institution_ids":["https://openalex.org/I143288331","https://openalex.org/I176453806"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019652256","display_name":"Luan Ibraimi","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Luan Ibraimi","raw_affiliation_strings":["University of Twente, P.O. Box 217, 7500 AE, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, P.O. Box 217, 7500 AE, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107387385","display_name":"Feng Cheng","orcid":null},"institutions":[{"id":"https://openalex.org/I176453806","display_name":"University of Potsdam","ror":"https://ror.org/03bnmw459","country_code":"DE","type":"education","lineage":["https://openalex.org/I176453806"]},{"id":"https://openalex.org/I143288331","display_name":"Hasso Plattner Institute","ror":"https://ror.org/058rn5r42","country_code":"DE","type":"facility","lineage":["https://openalex.org/I143288331","https://openalex.org/I176453806"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Feng Cheng","raw_affiliation_strings":["Hasso Plattner Institute (HPI), University of Potsdam, P.O. Box 900460, 14440, Potsdam, Germany"],"affiliations":[{"raw_affiliation_string":"Hasso Plattner Institute (HPI), University of Potsdam, P.O. Box 900460, 14440, Potsdam, Germany","institution_ids":["https://openalex.org/I143288331","https://openalex.org/I176453806"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102919398","display_name":"Christoph Meinel","orcid":"https://orcid.org/0000-0002-3410-3193"},"institutions":[{"id":"https://openalex.org/I143288331","display_name":"Hasso Plattner Institute","ror":"https://ror.org/058rn5r42","country_code":"DE","type":"facility","lineage":["https://openalex.org/I143288331","https://openalex.org/I176453806"]},{"id":"https://openalex.org/I176453806","display_name":"University of Potsdam","ror":"https://ror.org/03bnmw459","country_code":"DE","type":"education","lineage":["https://openalex.org/I176453806"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christoph Meinel","raw_affiliation_strings":["Hasso Plattner Institute (HPI), University of Potsdam, P.O. Box 900460, 14440, Potsdam, Germany"],"affiliations":[{"raw_affiliation_string":"Hasso Plattner Institute (HPI), University of Potsdam, P.O. Box 900460, 14440, Potsdam, Germany","institution_ids":["https://openalex.org/I143288331","https://openalex.org/I176453806"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5062060869"],"corresponding_institution_ids":["https://openalex.org/I143288331","https://openalex.org/I176453806"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.5664,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.69763345,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"256","last_page":"267"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/man-in-the-middle-attack","display_name":"Man-in-the-middle attack","score":0.8242505788803101},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7028197646141052},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6646535992622375},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5949257016181946},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.5896388292312622},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5551978349685669},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4899579584598541},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.44488105177879333},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3909718990325928}],"concepts":[{"id":"https://openalex.org/C196491621","wikidata":"https://www.wikidata.org/wiki/Q554830","display_name":"Man-in-the-middle attack","level":3,"score":0.8242505788803101},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7028197646141052},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6646535992622375},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5949257016181946},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.5896388292312622},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5551978349685669},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4899579584598541},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.44488105177879333},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3909718990325928}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-642-13241-4_23","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-13241-4_23","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-13241-4_23.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/ff6fda6b-26ed-4a5b-9f8f-3f71227a0150","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/ff6fda6b-26ed-4a5b-9f8f-3f71227a0150","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Roschke, S, Ibraimi, L, Cheng, F & Meinel, C 2010, Secure Communication using Identity Based Encryption. in Proceedings of the 11th Joint IFIP TC6 and TC 11 Conference on Communications and Multimedia Security (CMS). Lecture Notes in Computer Science, vol. 6109, Springer, Berlin, pp. 256-267. https://doi.org/10.1007/978-3-642-13241-4_23","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:HAL:hal-01056374v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01056374","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.256-267, &#x27E8;10.1007/978-3-642-13241-4_23&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:ris.utwente.nl:publications/ff6fda6b-26ed-4a5b-9f8f-3f71227a0150","is_oa":false,"landing_page_url":"http://eprints.eemcs.utwente.nl/secure2/17825/01/IBE_TLS_LNCS.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"doi:10.1007/978-3-642-13241-4_23","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-13241-4_23","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-13241-4_23.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"score":0.41999998688697815,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2164706912.pdf","grobid_xml":"https://content.openalex.org/works/W2164706912.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W148460497","https://openalex.org/W1495266644","https://openalex.org/W1498316612","https://openalex.org/W1527701244","https://openalex.org/W1569083856","https://openalex.org/W1591480890","https://openalex.org/W1660562555","https://openalex.org/W1908122868","https://openalex.org/W1909457994","https://openalex.org/W2016096722","https://openalex.org/W2086042811","https://openalex.org/W2105742458","https://openalex.org/W2108072891","https://openalex.org/W2138001464","https://openalex.org/W2140471436","https://openalex.org/W2146923862","https://openalex.org/W2152924492","https://openalex.org/W2156250856","https://openalex.org/W2166362740","https://openalex.org/W2490262601","https://openalex.org/W2495889793","https://openalex.org/W2619380141","https://openalex.org/W3016246408"],"related_works":["https://openalex.org/W4205947986","https://openalex.org/W2169929745","https://openalex.org/W2183582611","https://openalex.org/W4214730958","https://openalex.org/W2050704528","https://openalex.org/W2123811836","https://openalex.org/W3021021821","https://openalex.org/W2888183313","https://openalex.org/W36197628","https://openalex.org/W3009555975"],"abstract_inverted_index":null,"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
