{"id":"https://openalex.org/W4388830376","doi":"https://doi.org/10.1007/s10207-023-00748-1","title":"A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)","display_name":"A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)","publication_year":2023,"publication_date":"2023-11-20","ids":{"openalex":"https://openalex.org/W4388830376","doi":"https://doi.org/10.1007/s10207-023-00748-1"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-023-00748-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00748-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00748-1.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00748-1.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064850998","display_name":"Osama Rabie","orcid":"https://orcid.org/0000-0001-8680-7080"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Osama Bassam J. Rabie","raw_affiliation_strings":["Cybersecurity Center, King Abdulaziz University, Jeddah, Saudi Arabia","Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Center, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]},{"raw_affiliation_string":"Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067888843","display_name":"Shitharth Selvarajan","orcid":"https://orcid.org/0000-0002-4931-724X"},"institutions":[{"id":"https://openalex.org/I4210107262","display_name":"Amhara Agricultural Research Institute","ror":"https://ror.org/01vwxpj86","country_code":"ET","type":"government","lineage":["https://openalex.org/I4210107262"]},{"id":"https://openalex.org/I4387152840","display_name":"Kebri Dehar University","ror":"https://ror.org/00r6xxj20","country_code":null,"type":"education","lineage":["https://openalex.org/I4387152840"]},{"id":"https://openalex.org/I84027002","display_name":"Leeds Beckett University","ror":"https://ror.org/02xsh5r57","country_code":"GB","type":"education","lineage":["https://openalex.org/I84027002"]}],"countries":["ET","GB"],"is_corresponding":true,"raw_author_name":"Shitharth Selvarajan","raw_affiliation_strings":["Department of Computer Science, Kebri Dehar University, Kebri Dehar, Ethiopia","School of Built Environment, Engineering and Computing, Leeds Beckett University, Leeds, LS1 3HE, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kebri Dehar University, Kebri Dehar, Ethiopia","institution_ids":["https://openalex.org/I4210107262","https://openalex.org/I4387152840"]},{"raw_affiliation_string":"School of Built Environment, Engineering and Computing, Leeds Beckett University, Leeds, LS1 3HE, UK","institution_ids":["https://openalex.org/I84027002"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079873660","display_name":"Tawfiq Hasanin","orcid":"https://orcid.org/0000-0003-1072-278X"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Tawfiq Hasanin","raw_affiliation_strings":["Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045305407","display_name":"Gouse Baig Mohammed","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gouse Baig Mohammed","raw_affiliation_strings":["Department of Computer Science and Engineering, Vardhaman College of Engineering, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Vardhaman College of Engineering, Hyderabad, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068603015","display_name":"Abdulrhman M. Alshareef","orcid":"https://orcid.org/0000-0002-0434-8413"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Abddulrhman M. Alshareef","raw_affiliation_strings":["Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009473482","display_name":"Mueen Uddin","orcid":"https://orcid.org/0000-0003-1919-3407"},"institutions":[{"id":"https://openalex.org/I4210105992","display_name":"Qatar Science and Technology Park","ror":"https://ror.org/01gshyb58","country_code":"QA","type":"archive","lineage":["https://openalex.org/I4210105992"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Mueen Uddin","raw_affiliation_strings":["College of Computing and Information Technology, University of Doha for Science and Technology, 24449, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"College of Computing and Information Technology, University of Doha for Science and Technology, 24449, Doha, Qatar","institution_ids":["https://openalex.org/I4210105992"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5067888843"],"corresponding_institution_ids":["https://openalex.org/I4210107262","https://openalex.org/I4387152840","https://openalex.org/I84027002"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":6.7847,"has_fulltext":true,"cited_by_count":34,"citation_normalized_percentile":{"value":0.97324386,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"23","issue":"1","first_page":"51","last_page":"80"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.801598310470581},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5903726816177368},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.5879442691802979},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.5590420365333557},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5310542583465576},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.5305616855621338},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.524412989616394},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4987502098083496},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.4970891773700714},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4741743803024292},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4699314534664154},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.42363080382347107},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38901418447494507},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.29634928703308105},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.27997440099716187},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.11450496315956116},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09362965822219849}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.801598310470581},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5903726816177368},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.5879442691802979},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.5590420365333557},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5310542583465576},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.5305616855621338},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.524412989616394},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4987502098083496},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.4970891773700714},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4741743803024292},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4699314534664154},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42363080382347107},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38901418447494507},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.29634928703308105},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.27997440099716187},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.11450496315956116},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09362965822219849}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/s10207-023-00748-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00748-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00748-1.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:eprints.leedsbeckett.ac.uk:10325","is_oa":true,"landing_page_url":"https://eprints.leedsbeckett.ac.uk/view/creators/Rabie=3AOBJ=3A=3A.html>","pdf_url":"https://eprints.leedsbeckett.ac.uk/id/eprint/10325/1/AFullPrivacypreservingDistributedBatchbasedCertificatelessAggregateSignatureAuthenticationSchemeForHealthcareWearableWirelessMedicalSensorNetworksHwmsnsPV-SELVARAJAN.pdf","source":{"id":"https://openalex.org/S4306400805","display_name":"Leeds Beckett Repository (Leeds Beckett University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I84027002","host_organization_name":"Leeds Beckett University","host_organization_lineage":["https://openalex.org/I84027002"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:figshare.com:article/29022623","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal contribution"}],"best_oa_location":{"id":"doi:10.1007/s10207-023-00748-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00748-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00748-1.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5400000214576721,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G8172349892","display_name":null,"funder_award_id":"RG-9-611-43","funder_id":"https://openalex.org/F4320322322","funder_display_name":"King Abdulaziz University"}],"funders":[{"id":"https://openalex.org/F4320322322","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4388830376.pdf"},"referenced_works_count":63,"referenced_works":["https://openalex.org/W1591524234","https://openalex.org/W1698775192","https://openalex.org/W1713252110","https://openalex.org/W2003736153","https://openalex.org/W2018468667","https://openalex.org/W2036378739","https://openalex.org/W2105103777","https://openalex.org/W2107605764","https://openalex.org/W2108967892","https://openalex.org/W2122991569","https://openalex.org/W2169194339","https://openalex.org/W2325943429","https://openalex.org/W2337909812","https://openalex.org/W2407105492","https://openalex.org/W2515697212","https://openalex.org/W2526783369","https://openalex.org/W2620234603","https://openalex.org/W2753121224","https://openalex.org/W2753923799","https://openalex.org/W2790013793","https://openalex.org/W2791462427","https://openalex.org/W2805096948","https://openalex.org/W2808403644","https://openalex.org/W2896150139","https://openalex.org/W2897645146","https://openalex.org/W2901425569","https://openalex.org/W2911328135","https://openalex.org/W2920715909","https://openalex.org/W2955829994","https://openalex.org/W2962756931","https://openalex.org/W2966516618","https://openalex.org/W2970330337","https://openalex.org/W2997184002","https://openalex.org/W3005811485","https://openalex.org/W3007971370","https://openalex.org/W3010488964","https://openalex.org/W3015476067","https://openalex.org/W3106674775","https://openalex.org/W3120179717","https://openalex.org/W3154673953","https://openalex.org/W3184143869","https://openalex.org/W3184406784","https://openalex.org/W3193489073","https://openalex.org/W3197125054","https://openalex.org/W3212036709","https://openalex.org/W4205276078","https://openalex.org/W4205439778","https://openalex.org/W4205802419","https://openalex.org/W4281722825","https://openalex.org/W4282555355","https://openalex.org/W4283715774","https://openalex.org/W4285073103","https://openalex.org/W4290713631","https://openalex.org/W4292014285","https://openalex.org/W4295725518","https://openalex.org/W4307271708","https://openalex.org/W4308773065","https://openalex.org/W4311548093","https://openalex.org/W4319008772","https://openalex.org/W4319335560","https://openalex.org/W4327893913","https://openalex.org/W4367677400","https://openalex.org/W4385068798"],"related_works":["https://openalex.org/W2793666424","https://openalex.org/W1521063997","https://openalex.org/W4226182343","https://openalex.org/W1556944867","https://openalex.org/W2164478452","https://openalex.org/W2235903869","https://openalex.org/W1956043843","https://openalex.org/W1590958755","https://openalex.org/W4300630816","https://openalex.org/W1974088066"],"abstract_inverted_index":{"Abstract":[0],"The":[1,120,136,152,170],"dynamic":[2],"connectivity":[3],"and":[4,19,77,167,188],"functionality":[5],"of":[6,17,68,85,122,133,154],"sensors":[7],"has":[8,96,124],"revolutionized":[9],"remote":[10],"monitoring":[11,31],"applications":[12],"thanks":[13],"to":[14,49,75,81,102,130,205,216],"the":[15,66,82,86,103,131,155,160,175,196],"combination":[16],"IoT":[18,52],"wireless":[20,25],"sensor":[21,27],"networks":[22],"(WSNs).":[23],"Wearable":[24],"medical":[26,69,201],"nodes":[28],"allow":[29],"continuous":[30],"by":[32,105,127,184],"amassing":[33],"physiological":[34],"data,":[35],"which":[36,113,142],"is":[37,72,139,143,162,173,214],"very":[38],"useful":[39],"in":[40,203],"healthcare":[41],"applications.":[42],"These":[43],"text":[44,70],"data":[45,71],"are":[46],"then":[47],"sent":[48],"doctors":[50],"via":[51],"devices":[53],"so":[54],"they":[55],"can":[56,181],"make":[57],"an":[58],"accurate":[59],"diagnosis":[60],"as":[61,63,99],"soon":[62],"possible.":[64],"However,":[65],"transmission":[67],"extremely":[73],"vulnerable":[74],"security":[76,156],"privacy":[78],"assaults":[79],"due":[80,129],"open":[83],"nature":[84],"underlying":[87],"communication":[88,137],"medium.":[89],"Therefore,":[90],"a":[91,100,116,144,199,210],"certificate-less":[92],"aggregation-based":[93],"signature":[94,179],"system":[95],"been":[97,125],"proposed":[98],"solution":[101],"issue":[104],"using":[106,185],"elliptic":[107],"curve":[108],"public":[109],"key":[110],"cryptography":[111],"(ECC)":[112],"allows":[114],"for":[115,178],"highly":[117],"effective":[118],"technique.":[119],"cost":[121,138],"computing":[123],"reduced":[126,183],"93%":[128],"incorporation":[132],"aggregation":[134],"technology.":[135],"400":[140],"bits":[141],"significant":[145],"reduction":[146],"when":[147],"compared":[148],"with":[149,195],"its":[150,222],"counterparts.":[151],"results":[153],"analysis":[157],"show":[158],"that":[159,174],"scheme":[161],"robust":[163],"against":[164],"forging,":[165],"tampering,":[166],"man-in-the-middle":[168],"attacks.":[169],"primary":[171],"innovation":[172],"time":[176],"required":[177],"verification":[180],"be":[182],"point":[186],"addition":[187],"aggregation.":[189],"In":[190],"addition,":[191],"it":[192,213],"does":[193],"away":[194],"reliance":[197],"on":[198],"centralized":[200],"server":[202],"order":[204],"do":[206],"verification.":[207],"By":[208],"taking":[209],"distributed":[211],"approach,":[212],"able":[215],"fully":[217],"preserve":[218],"user":[219],"privacy,":[220],"proving":[221],"superiority.":[223]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":17},{"year":2024,"cited_by_count":13}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
