{"id":"https://openalex.org/W1967193464","doi":"https://doi.org/10.1007/bf02947115","title":"Study on strand space model theory","display_name":"Study on strand space model theory","publication_year":2003,"publication_date":"2003-09-01","ids":{"openalex":"https://openalex.org/W1967193464","doi":"https://doi.org/10.1007/bf02947115","mag":"1967193464"},"language":"en","primary_location":{"id":"doi:10.1007/bf02947115","is_oa":false,"landing_page_url":"https://doi.org/10.1007/bf02947115","pdf_url":null,"source":{"id":"https://openalex.org/S161516442","display_name":"Journal of Computer Science and Technology","issn_l":"1000-9000","issn":["1000-9000","1860-4749"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Science and Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015791860","display_name":"Qing Guang Ji","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"QingGuang Ji","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Software, The Chinese Academy of Sciences and Engineering Research Center for Information Security Technology, Institute of Software, TCA ...#TAB#"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, The Chinese Academy of Sciences and Engineering Research Center for Information Security Technology, Institute of Software, TCA ...#TAB#","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089455874","display_name":"Si Han Qing","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"SiHan Qing","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Software, The Chinese Academy of Sciences, Beijing 100080, P.R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, The Chinese Academy of Sciences, Beijing 100080, P.R. China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076212397","display_name":"Yong Zhou","orcid":"https://orcid.org/0000-0003-2546-8462"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"YongBin Zhou","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Software, The Chinese Academy of Sciences, Beijing 100080, P.R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, The Chinese Academy of Sciences, Beijing 100080, P.R. China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100826757","display_name":"Deng Guo Feng","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"DengGuo Feng","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Software, The Chinese Academy of Sciences, Beijing 100080, P.R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, The Chinese Academy of Sciences, Beijing 100080, P.R. China","institution_ids":["https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5015791860"],"corresponding_institution_ids":["https://openalex.org/I19820366"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":1.4929,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.86196063,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"18","issue":"5","first_page":"553","last_page":"570"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9652000069618225,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7967798113822937},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.764809250831604},{"id":"https://openalex.org/keywords/otway\u2013rees-protocol","display_name":"Otway\u2013Rees protocol","score":0.7601516246795654},{"id":"https://openalex.org/keywords/universal-composability","display_name":"Universal composability","score":0.6535599827766418},{"id":"https://openalex.org/keywords/wide-mouth-frog-protocol","display_name":"Wide Mouth Frog protocol","score":0.5583427548408508},{"id":"https://openalex.org/keywords/oakley-protocol","display_name":"Oakley protocol","score":0.532425582408905},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5279356837272644},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4655751585960388},{"id":"https://openalex.org/keywords/general-inter-orb-protocol","display_name":"General Inter-ORB Protocol","score":0.4639342427253723},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4440957307815552},{"id":"https://openalex.org/keywords/two-phase-commit-protocol","display_name":"Two-phase commit protocol","score":0.4390440285205841},{"id":"https://openalex.org/keywords/internet-protocol-control-protocol","display_name":"Internet Protocol Control Protocol","score":0.41732552647590637},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4121696650981903},{"id":"https://openalex.org/keywords/resource-reservation-protocol","display_name":"Resource Reservation Protocol","score":0.3530896306037903},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.3246775269508362},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30173787474632263},{"id":"https://openalex.org/keywords/challenge-handshake-authentication-protocol","display_name":"Challenge-Handshake Authentication Protocol","score":0.3016040325164795},{"id":"https://openalex.org/keywords/user-datagram-protocol","display_name":"User Datagram Protocol","score":0.2881368398666382},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.26444774866104126},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2440474033355713},{"id":"https://openalex.org/keywords/internet-protocol-suite","display_name":"Internet protocol suite","score":0.24153411388397217},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11360675096511841},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.06906497478485107}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7967798113822937},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.764809250831604},{"id":"https://openalex.org/C35788789","wikidata":"https://www.wikidata.org/wiki/Q1320237","display_name":"Otway\u2013Rees protocol","level":5,"score":0.7601516246795654},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.6535599827766418},{"id":"https://openalex.org/C124086997","wikidata":"https://www.wikidata.org/wiki/Q4053131","display_name":"Wide Mouth Frog protocol","level":5,"score":0.5583427548408508},{"id":"https://openalex.org/C126266803","wikidata":"https://www.wikidata.org/wiki/Q7074169","display_name":"Oakley protocol","level":5,"score":0.532425582408905},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5279356837272644},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4655751585960388},{"id":"https://openalex.org/C75114861","wikidata":"https://www.wikidata.org/wiki/Q594324","display_name":"General Inter-ORB Protocol","level":5,"score":0.4639342427253723},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4440957307815552},{"id":"https://openalex.org/C111009948","wikidata":"https://www.wikidata.org/wiki/Q1067690","display_name":"Two-phase commit protocol","level":5,"score":0.4390440285205841},{"id":"https://openalex.org/C162571340","wikidata":"https://www.wikidata.org/wiki/Q1667988","display_name":"Internet Protocol Control Protocol","level":5,"score":0.41732552647590637},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4121696650981903},{"id":"https://openalex.org/C178248399","wikidata":"https://www.wikidata.org/wiki/Q640435","display_name":"Resource Reservation Protocol","level":4,"score":0.3530896306037903},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.3246775269508362},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30173787474632263},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.3016040325164795},{"id":"https://openalex.org/C20636137","wikidata":"https://www.wikidata.org/wiki/Q11163","display_name":"User Datagram Protocol","level":4,"score":0.2881368398666382},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26444774866104126},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2440474033355713},{"id":"https://openalex.org/C65567647","wikidata":"https://www.wikidata.org/wiki/Q81414","display_name":"Internet protocol suite","level":3,"score":0.24153411388397217},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11360675096511841},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.06906497478485107},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C72108876","wikidata":"https://www.wikidata.org/wiki/Q844565","display_name":"Transaction processing","level":3,"score":0.0},{"id":"https://openalex.org/C25185021","wikidata":"https://www.wikidata.org/wiki/Q4053284","display_name":"Distributed transaction","level":4,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/bf02947115","is_oa":false,"landing_page_url":"https://doi.org/10.1007/bf02947115","pdf_url":null,"source":{"id":"https://openalex.org/S161516442","display_name":"Journal of Computer Science and Technology","issn_l":"1000-9000","issn":["1000-9000","1860-4749"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Science and Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W236281116","https://openalex.org/W1522461599","https://openalex.org/W1536045256","https://openalex.org/W1551843303","https://openalex.org/W1552843130","https://openalex.org/W1671268155","https://openalex.org/W1707105039","https://openalex.org/W1779054477","https://openalex.org/W1867986337","https://openalex.org/W1907943060","https://openalex.org/W1985050790","https://openalex.org/W2027917863","https://openalex.org/W2052539228","https://openalex.org/W2096436720","https://openalex.org/W2104655005","https://openalex.org/W2107515440","https://openalex.org/W2132898941","https://openalex.org/W2145415641","https://openalex.org/W2155032609","https://openalex.org/W2166027506","https://openalex.org/W2166288236","https://openalex.org/W2175661655","https://openalex.org/W2293633287","https://openalex.org/W2381411377","https://openalex.org/W3140521952","https://openalex.org/W3162919972","https://openalex.org/W6602499392","https://openalex.org/W6697141651"],"related_works":["https://openalex.org/W1501502722","https://openalex.org/W2294179037","https://openalex.org/W3168897635","https://openalex.org/W2350708904","https://openalex.org/W1600194194","https://openalex.org/W72195266","https://openalex.org/W2140626418","https://openalex.org/W2350536881","https://openalex.org/W1967193464","https://openalex.org/W2352399120"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
