{"id":"https://openalex.org/W2810428162","doi":"https://doi.org/10.1007/s00607-018-0641-6","title":"Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting","display_name":"Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting","publication_year":2018,"publication_date":"2018-06-26","ids":{"openalex":"https://openalex.org/W2810428162","doi":"https://doi.org/10.1007/s00607-018-0641-6","mag":"2810428162"},"language":"en","primary_location":{"id":"doi:10.1007/s00607-018-0641-6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s00607-018-0641-6","pdf_url":null,"source":{"id":"https://openalex.org/S35593046","display_name":"Computing","issn_l":"0010-485X","issn":["0010-485X","1436-5057"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049151787","display_name":"Xu An Wang","orcid":"https://orcid.org/0000-0003-2070-4913"},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xu An Wang","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, People\u2019s Republic of China","Key Laboratory of Information and Network Security, Engineering University of Chinese Armed Police Force, Xi\u2019an, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, People\u2019s Republic of China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"Key Laboratory of Information and Network Security, Engineering University of Chinese Armed Police Force, Xi\u2019an, People\u2019s Republic of China","institution_ids":["https://openalex.org/I4210134428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079115940","display_name":"Yudong Liu","orcid":"https://orcid.org/0000-0002-5153-3400"},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yudong Liu","raw_affiliation_strings":["Key Laboratory of Information and Network Security, Engineering University of Chinese Armed Police Force, Xi\u2019an, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information and Network Security, Engineering University of Chinese Armed Police Force, Xi\u2019an, People\u2019s Republic of China","institution_ids":["https://openalex.org/I4210134428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072241102","display_name":"Arun Kumar Sangaiah","orcid":"https://orcid.org/0000-0002-0229-2460"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Arun Kumar Sangaiah","raw_affiliation_strings":["School of Computing Science and Engineering, Vellore Institute of Technology (VIT), Vellore, Tamil Nadu, 632014, India"],"affiliations":[{"raw_affiliation_string":"School of Computing Science and Engineering, Vellore Institute of Technology (VIT), Vellore, Tamil Nadu, 632014, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102846084","display_name":"Jindan Zhang","orcid":"https://orcid.org/0000-0002-1499-8460"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210118093","display_name":"Xianyang Normal University","ror":"https://ror.org/01r45yt97","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210118093"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jindan Zhang","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, People\u2019s Republic of China","State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, 710071, People\u2019s Republic of China","Xianyang Vocational Technical College, Xianyang, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, People\u2019s Republic of China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, 710071, People\u2019s Republic of China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Xianyang Vocational Technical College, Xianyang, People\u2019s Republic of China","institution_ids":["https://openalex.org/I4210118093"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5049151787"],"corresponding_institution_ids":["https://openalex.org/I4210134428","https://openalex.org/I5343935"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":1.3538,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.85799637,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"101","issue":"7","first_page":"773","last_page":"790"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.8849985003471375},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8311922550201416},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7205941081047058},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5999013185501099},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5431221723556519},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5392815470695496},{"id":"https://openalex.org/keywords/data-stream-mining","display_name":"Data stream mining","score":0.5128071904182434},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.46680334210395813},{"id":"https://openalex.org/keywords/data-stream","display_name":"Data stream","score":0.4569334387779236},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.45264604687690735},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4324095547199249},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40603649616241455},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.33841589093208313},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.230744868516922},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.15432360768318176},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14507216215133667}],"concepts":[{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.8849985003471375},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8311922550201416},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7205941081047058},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5999013185501099},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5431221723556519},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5392815470695496},{"id":"https://openalex.org/C89198739","wikidata":"https://www.wikidata.org/wiki/Q3079880","display_name":"Data stream mining","level":2,"score":0.5128071904182434},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.46680334210395813},{"id":"https://openalex.org/C2778484313","wikidata":"https://www.wikidata.org/wiki/Q1172540","display_name":"Data stream","level":2,"score":0.4569334387779236},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.45264604687690735},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4324095547199249},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40603649616241455},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.33841589093208313},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.230744868516922},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15432360768318176},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14507216215133667},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s00607-018-0641-6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s00607-018-0641-6","pdf_url":null,"source":{"id":"https://openalex.org/S35593046","display_name":"Computing","issn_l":"0010-485X","issn":["0010-485X","1436-5057"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5799999833106995}],"awards":[{"id":"https://openalex.org/G2862267523","display_name":null,"funder_award_id":"61772550","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3166509387","display_name":null,"funder_award_id":"61402531","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7322359168","display_name":null,"funder_award_id":"U1636114","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8155079108","display_name":null,"funder_award_id":"61572521","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8170696387","display_name":null,"funder_award_id":"2017YFB0802000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W24999078","https://openalex.org/W37483258","https://openalex.org/W89553247","https://openalex.org/W116275870","https://openalex.org/W167928972","https://openalex.org/W1557386445","https://openalex.org/W1593940884","https://openalex.org/W1966208416","https://openalex.org/W1977620531","https://openalex.org/W1980516015","https://openalex.org/W2001127918","https://openalex.org/W2014784356","https://openalex.org/W2037674847","https://openalex.org/W2060543984","https://openalex.org/W2066346207","https://openalex.org/W2084341361","https://openalex.org/W2091794203","https://openalex.org/W2102881299","https://openalex.org/W2116653107","https://openalex.org/W2139910984","https://openalex.org/W2147412664","https://openalex.org/W2245865570","https://openalex.org/W2326245332","https://openalex.org/W2343351721","https://openalex.org/W2344278474","https://openalex.org/W2407486123","https://openalex.org/W2524195644","https://openalex.org/W2528685303","https://openalex.org/W2733835318","https://openalex.org/W2762453390","https://openalex.org/W2791459719"],"related_works":["https://openalex.org/W1521353230","https://openalex.org/W3015230198","https://openalex.org/W4313171313","https://openalex.org/W3114857059","https://openalex.org/W2139109546","https://openalex.org/W3001342270","https://openalex.org/W2360644575","https://openalex.org/W3082511424","https://openalex.org/W2961527251","https://openalex.org/W2810428162"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
