{"id":"https://openalex.org/W1982408698","doi":"https://doi.org/10.1007/s10207-008-0062-1","title":"Conference key agreement protocol with non-interactive fault-tolerance over broadcast network","display_name":"Conference key agreement protocol with non-interactive fault-tolerance over broadcast network","publication_year":2008,"publication_date":"2008-09-15","ids":{"openalex":"https://openalex.org/W1982408698","doi":"https://doi.org/10.1007/s10207-008-0062-1","mag":"1982408698"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-008-0062-1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-008-0062-1","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111933426","display_name":"Jiin-Chiou Cheng","orcid":null},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Jiin-Chiou Cheng","raw_affiliation_strings":["Cryptography and Network Security Lab., Department of Electrical Engineering, National Cheng Kung University, No.1, University Road, Tainan City, 701, Taiwan, R.O.C","Department of Electrical Engineering, National Cheng Kung University, Cryptography and Network Security Lab., No.1, University Road, 701, Tainan City, Taiwan, R.O.C.#TAB#"],"affiliations":[{"raw_affiliation_string":"Cryptography and Network Security Lab., Department of Electrical Engineering, National Cheng Kung University, No.1, University Road, Tainan City, 701, Taiwan, R.O.C","institution_ids":[]},{"raw_affiliation_string":"Department of Electrical Engineering, National Cheng Kung University, Cryptography and Network Security Lab., No.1, University Road, 701, Tainan City, Taiwan, R.O.C.#TAB#","institution_ids":["https://openalex.org/I91807558"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111889378","display_name":"Chi\u2010Sung Laih","orcid":null},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chi-Sung Laih","raw_affiliation_strings":["Cryptography and Network Security Lab., Department of Electrical Engineering, National Cheng Kung University, No.1, University Road, Tainan City, 701, Taiwan, R.O.C","Department of Electrical Engineering, National Cheng Kung University, Cryptography and Network Security Lab., No.1, University Road, 701, Tainan City, Taiwan, R.O.C.#TAB#"],"affiliations":[{"raw_affiliation_string":"Cryptography and Network Security Lab., Department of Electrical Engineering, National Cheng Kung University, No.1, University Road, Tainan City, 701, Taiwan, R.O.C","institution_ids":[]},{"raw_affiliation_string":"Department of Electrical Engineering, National Cheng Kung University, Cryptography and Network Security Lab., No.1, University Road, 701, Tainan City, Taiwan, R.O.C.#TAB#","institution_ids":["https://openalex.org/I91807558"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5111933426"],"corresponding_institution_ids":["https://openalex.org/I91807558"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":null,"fwci":1.769,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.87172706,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"8","issue":"1","first_page":"37","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8081148862838745},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6822248101234436},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6703609228134155},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6669235825538635},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6210294961929321},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.5714532136917114},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.18314450979232788},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.08913323283195496}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8081148862838745},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6822248101234436},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6703609228134155},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6669235825538635},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6210294961929321},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.5714532136917114},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.18314450979232788},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.08913323283195496},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-008-0062-1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-008-0062-1","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321040","display_name":"National Science Council","ror":"https://ror.org/02kv4zf79"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W25261110","https://openalex.org/W1486473269","https://openalex.org/W1490371707","https://openalex.org/W1508193711","https://openalex.org/W1509224204","https://openalex.org/W1545843592","https://openalex.org/W1554839057","https://openalex.org/W1605980343","https://openalex.org/W1637905077","https://openalex.org/W1642599990","https://openalex.org/W1965492831","https://openalex.org/W1970448459","https://openalex.org/W1975653461","https://openalex.org/W1985198681","https://openalex.org/W2006453614","https://openalex.org/W2012145772","https://openalex.org/W2036126441","https://openalex.org/W2052267638","https://openalex.org/W2066097003","https://openalex.org/W2082969166","https://openalex.org/W2083461609","https://openalex.org/W2104748480","https://openalex.org/W2111799375","https://openalex.org/W2128718974","https://openalex.org/W2141420453","https://openalex.org/W2152924492","https://openalex.org/W2156186849","https://openalex.org/W2158347562","https://openalex.org/W2162653919","https://openalex.org/W2163324541","https://openalex.org/W2484588551","https://openalex.org/W6630501963","https://openalex.org/W6678756386"],"related_works":["https://openalex.org/W3008339103","https://openalex.org/W2404647514","https://openalex.org/W1667647204","https://openalex.org/W3119814709","https://openalex.org/W2018477250","https://openalex.org/W35919320","https://openalex.org/W1508895727","https://openalex.org/W4241418540","https://openalex.org/W2725786787","https://openalex.org/W4283160672"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
