{"id":"https://openalex.org/W2781959360","doi":"https://doi.org/10.1007/978-981-10-7844-6_10","title":"A High Efficient Control Flow Authentication Method Basing on Loop Isolation","display_name":"A High Efficient Control Flow Authentication Method Basing on Loop Isolation","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2781959360","doi":"https://doi.org/10.1007/978-981-10-7844-6_10","mag":"2781959360"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-10-7844-6_10","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-10-7844-6_10","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062437303","display_name":"Qingran Wang","orcid":"https://orcid.org/0000-0002-7073-016X"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qingran Wang","raw_affiliation_strings":["Tianjin Advanced Network Key Lab, School of Computer Science and Technology, Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Tianjin Advanced Network Key Lab, School of Computer Science and Technology, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100704816","display_name":"Wei Guo","orcid":"https://orcid.org/0000-0002-7804-0032"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Guo","raw_affiliation_strings":["Tianjin Advanced Network Key Lab, School of Computer Science and Technology, Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Tianjin Advanced Network Key Lab, School of Computer Science and Technology, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026720401","display_name":"Da\u2010Zhi Sun","orcid":"https://orcid.org/0000-0002-5479-549X"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dazhi Sun","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","Tianjin Advanced Network Key Lab, School of Computer Science and Technology, Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Tianjin Advanced Network Key Lab, School of Computer Science and Technology, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102122678","display_name":"Jizeng Wei","orcid":"https://orcid.org/0000-0002-3040-6859"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jizeng Wei","raw_affiliation_strings":["Tianjin Advanced Network Key Lab, School of Computer Science and Technology, Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Tianjin Advanced Network Key Lab, School of Computer Science and Technology, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5062437303"],"corresponding_institution_ids":["https://openalex.org/I162868743"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01312862,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"96","last_page":"103"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7946077585220337},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.6234749555587769},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation (microbiology)","score":0.6119695901870728},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5927324295043945},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5331588983535767},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.49814820289611816},{"id":"https://openalex.org/keywords/flow-control","display_name":"Flow control (data)","score":0.4940967857837677},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.43310460448265076},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.42707371711730957},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.4174540042877197},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.34271031618118286},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.26493537425994873},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22306865453720093},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.13707894086837769},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.13252988457679749}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7946077585220337},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.6234749555587769},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.6119695901870728},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5927324295043945},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5331588983535767},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.49814820289611816},{"id":"https://openalex.org/C186766456","wikidata":"https://www.wikidata.org/wiki/Q612457","display_name":"Flow control (data)","level":2,"score":0.4940967857837677},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.43310460448265076},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.42707371711730957},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.4174540042877197},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.34271031618118286},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.26493537425994873},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22306865453720093},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.13707894086837769},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.13252988457679749},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C89423630","wikidata":"https://www.wikidata.org/wiki/Q7193","display_name":"Microbiology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-10-7844-6_10","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-10-7844-6_10","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1519027223","https://openalex.org/W1595579786","https://openalex.org/W2053227059","https://openalex.org/W2062102126","https://openalex.org/W2128171167","https://openalex.org/W2136021246","https://openalex.org/W2147657366","https://openalex.org/W2169596872","https://openalex.org/W2346370213","https://openalex.org/W2346595863","https://openalex.org/W4242192026"],"related_works":["https://openalex.org/W2095925360","https://openalex.org/W4246377515","https://openalex.org/W1549956274","https://openalex.org/W2052160877","https://openalex.org/W2052485000","https://openalex.org/W2040778456","https://openalex.org/W2027700796","https://openalex.org/W2119238100","https://openalex.org/W2148473336","https://openalex.org/W4254236578"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
