{"id":"https://openalex.org/W1592097729","doi":"https://doi.org/10.1007/978-3-642-29101-2_1","title":"A Pre-computable Signature Scheme with Efficient Verification for RFID","display_name":"A Pre-computable Signature Scheme with Efficient Verification for RFID","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W1592097729","doi":"https://doi.org/10.1007/978-3-642-29101-2_1","mag":"1592097729"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-29101-2_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-29101-2_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051751395","display_name":"Fuchun Guo","orcid":"https://orcid.org/0000-0001-6939-7710"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Fuchun Guo","raw_affiliation_strings":["Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia","Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia#TAB#","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008178136","display_name":"Yi Mu","orcid":"https://orcid.org/0000-0002-1637-845X"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yi Mu","raw_affiliation_strings":["Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia","Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia#TAB#","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia","Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia#TAB#","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029458848","display_name":"Vijay Varadharajan","orcid":"https://orcid.org/0000-0002-3621-9114"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Vijay Varadharajan","raw_affiliation_strings":["Information and Networked Systems Security Research, Department of Computing, Faculty of Science, Macquarie University, Sydney, Australia","Information & Networked Systems Security Research, Department of Computing, Faculty of Science, Macquarie University, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"Information and Networked Systems Security Research, Department of Computing, Faculty of Science, Macquarie University, Sydney, Australia","institution_ids":["https://openalex.org/I99043593"]},{"raw_affiliation_string":"Information & Networked Systems Security Research, Department of Computing, Faculty of Science, Macquarie University, Sydney, Australia","institution_ids":["https://openalex.org/I99043593"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5051751395"],"corresponding_institution_ids":["https://openalex.org/I204824540"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15786408,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/modular-exponentiation","display_name":"Modular exponentiation","score":0.898622453212738},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8567121028900146},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.7456990480422974},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6571062207221985},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6423126459121704},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.58792644739151},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5610908269882202},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.5506807565689087},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5098616480827332},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.4349672794342041},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.41150620579719543},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3774409592151642},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3707861304283142},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3283308744430542},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3153005838394165},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2873811721801758},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22224220633506775},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.1710694432258606},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10043138265609741},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08400753140449524}],"concepts":[{"id":"https://openalex.org/C152763109","wikidata":"https://www.wikidata.org/wiki/Q1228841","display_name":"Modular exponentiation","level":4,"score":0.898622453212738},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8567121028900146},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.7456990480422974},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6571062207221985},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6423126459121704},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.58792644739151},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5610908269882202},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.5506807565689087},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5098616480827332},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4349672794342041},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.41150620579719543},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3774409592151642},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3707861304283142},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3283308744430542},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3153005838394165},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2873811721801758},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22224220633506775},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.1710694432258606},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10043138265609741},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08400753140449524},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-642-29101-2_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-29101-2_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ro.uow.edu.au:infopapers-9225","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/infopapers/1890","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Informatics - Papers (Archive)","raw_type":"article"},{"id":"pmh:oai:nova.newcastle.edu.au:uon:31818","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.13/1356897","pdf_url":null,"source":{"id":"https://openalex.org/S4377196612","display_name":"NOVA (University of Newcastle Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I78757542","host_organization_name":"University of Newcastle Australia","host_organization_lineage":["https://openalex.org/I78757542"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conference paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W54110551","https://openalex.org/W115629558","https://openalex.org/W1487683390","https://openalex.org/W1495266644","https://openalex.org/W1508759756","https://openalex.org/W1511374591","https://openalex.org/W1549300373","https://openalex.org/W1561511342","https://openalex.org/W1592322311","https://openalex.org/W1606573350","https://openalex.org/W1606804022","https://openalex.org/W1653866131","https://openalex.org/W1919093791","https://openalex.org/W1933366382","https://openalex.org/W1988458847","https://openalex.org/W2006691934","https://openalex.org/W2039561385","https://openalex.org/W2057636642","https://openalex.org/W2064652494","https://openalex.org/W2084360450","https://openalex.org/W2109365902","https://openalex.org/W2112137829","https://openalex.org/W2117176738","https://openalex.org/W2117797270","https://openalex.org/W2120472924","https://openalex.org/W2133740767","https://openalex.org/W2138582578","https://openalex.org/W2150402532","https://openalex.org/W2152436975","https://openalex.org/W2161152118","https://openalex.org/W2172174332","https://openalex.org/W2282892286","https://openalex.org/W2475855573","https://openalex.org/W2477011922","https://openalex.org/W2482125448","https://openalex.org/W2483346752","https://openalex.org/W2484860292","https://openalex.org/W2485204867","https://openalex.org/W2493686639","https://openalex.org/W2503837195","https://openalex.org/W2506735936","https://openalex.org/W2619633776","https://openalex.org/W2622601883","https://openalex.org/W2912274982","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2149234266","https://openalex.org/W2390942931","https://openalex.org/W2039465140","https://openalex.org/W1932157736","https://openalex.org/W4254816090","https://openalex.org/W1981680180","https://openalex.org/W2610264794","https://openalex.org/W2055766186","https://openalex.org/W2111965281","https://openalex.org/W2350215162"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
