{"id":"https://openalex.org/W2493429532","doi":"https://doi.org/10.1007/b96249","title":"Information Security and Cryptology - ICISC 2003","display_name":"Information Security and Cryptology - ICISC 2003","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W2493429532","doi":"https://doi.org/10.1007/b96249","mag":"2493429532"},"language":"en","primary_location":{"id":"doi:10.1007/b96249","is_oa":false,"landing_page_url":"https://doi.org/10.1007/b96249","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book"},"type":"book","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ris.utwente.nl/ws/files/134652971/Laud04sound.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111434851","display_name":"Jongin Lim","orcid":null},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Lim, Jong-In","raw_affiliation_strings":["Center for Information Security Technologies (CIST), Korea University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Center for Information Security Technologies (CIST), Korea University, Seoul, Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100422970","display_name":"Dong\u2010Hoon Lee","orcid":"https://orcid.org/0000-0002-5013-4440"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Lee, Dong-Hoon","raw_affiliation_strings":["CIST (Center for Information Security Technologies), Korea University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"CIST (Center for Information Security Technologies), Korea University, Seoul, Korea","institution_ids":["https://openalex.org/I197347611"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5111434851"],"corresponding_institution_ids":["https://openalex.org/I197347611"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":11.1594,"has_fulltext":true,"cited_by_count":154,"citation_normalized_percentile":{"value":0.98130841,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.5618000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.5618000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8254153728485107},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.691994309425354},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.686263918876648},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.6416704058647156}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8254153728485107},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.691994309425354},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.686263918876648},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.6416704058647156}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/b96249","is_oa":false,"landing_page_url":"https://doi.org/10.1007/b96249","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book"},{"id":"pmh:oai:ris.utwente.nl:openaire/c557de7f-70fa-4258-a178-1d74b88497cf","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/c557de7f-70fa-4258-a178-1d74b88497cf","pdf_url":"https://ris.utwente.nl/ws/files/134652971/Laud04sound.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Laud, P & Corin, R 2003, Sound Computational Interpretation of Formal Encryption with Composed Keys. in J-I Lim & D-H Lee (eds), Information Security and Cryptology - ICISC 2003 : 6th International Conference, Seoul, Korea, November 27-28, 2003. Revised Papers. Lecture Notes in Computer Science, vol. 2971, Springer, Berlin, Heidelberg, pp. 55-66, 6th Annual International Conference on Information Security and Cryptology, ICISC 2003, Seoul, Korea, Republic of, 1/11/03. https://doi.org/10.1007/b96249","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:dial.uclouvain.be:ebook:32321","is_oa":false,"landing_page_url":"http://hdl.handle.net/2078/ebook:32321","pdf_url":null,"source":{"id":"https://openalex.org/S4306401902","display_name":"Digital Access to Libraries (Universit\u00e9 catholique de Louvain (UCL), l'Universit\u00e9 de Namur (UNamur) and the Universit\u00e9 Saint-Louis (USL-B))","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I95674353","host_organization_name":"UCLouvain","host_organization_lineage":["https://openalex.org/I95674353"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/25ad0f5e-15e0-4618-a23e-2a1d281c1076","is_oa":false,"landing_page_url":"https://research.birmingham.ac.uk/portal/en/publications/security-analysis-of-some-proxy-signatures(25ad0f5e-15e0-4618-a23e-2a1d281c1076).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wang, G, Bao, F, Zhou, J, Deng, RH, Lim, JI & Lee, DH 2005, 'Security Analysis of Some Proxy Signatures', Paper presented at Proceedings of the 6th International Conference on Information Security and Cryptology (ICISC'03), Seoul, Korea, 27-28 November 2003, Revised Papers, 1/01/05 pp. 305-319. https://doi.org/10.1007/b96249","raw_type":"conferenceObject"}],"best_oa_location":{"id":"pmh:oai:ris.utwente.nl:openaire/c557de7f-70fa-4258-a178-1d74b88497cf","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/c557de7f-70fa-4258-a178-1d74b88497cf","pdf_url":"https://ris.utwente.nl/ws/files/134652971/Laud04sound.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Laud, P & Corin, R 2003, Sound Computational Interpretation of Formal Encryption with Composed Keys. in J-I Lim & D-H Lee (eds), Information Security and Cryptology - ICISC 2003 : 6th International Conference, Seoul, Korea, November 27-28, 2003. Revised Papers. Lecture Notes in Computer Science, vol. 2971, Springer, Berlin, Heidelberg, pp. 55-66, 6th Annual International Conference on Information Security and Cryptology, ICISC 2003, Seoul, Korea, Republic of, 1/11/03. https://doi.org/10.1007/b96249","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2493429532.pdf","grobid_xml":"https://content.openalex.org/works/W2493429532.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W182317985","https://openalex.org/W4239903230","https://openalex.org/W2790683366","https://openalex.org/W2973311209","https://openalex.org/W2587935614","https://openalex.org/W2777767897","https://openalex.org/W1591098212","https://openalex.org/W2505716179","https://openalex.org/W4307747319","https://openalex.org/W2182165023"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":6},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":19}],"updated_date":"2026-03-17T17:19:04.345684","created_date":"2016-08-23T00:00:00"}
