{"id":"https://openalex.org/W1963797983","doi":"https://doi.org/10.1007/s11235-005-1689-0","title":"A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography","display_name":"A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography","publication_year":2005,"publication_date":"2005-07-01","ids":{"openalex":"https://openalex.org/W1963797983","doi":"https://doi.org/10.1007/s11235-005-1689-0","mag":"1963797983"},"language":"en","primary_location":{"id":"doi:10.1007/s11235-005-1689-0","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11235-005-1689-0","pdf_url":null,"source":{"id":"https://openalex.org/S145894672","display_name":"Telecommunication Systems","issn_l":"1018-4864","issn":["1018-4864","1572-9451"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Telecommunication Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037292711","display_name":"Min\u2010Shiang Hwang","orcid":"https://orcid.org/0000-0001-5502-8033"},"institutions":[{"id":"https://openalex.org/I162838928","display_name":"National Chung Hsing University","ror":"https://ror.org/05vn3ca78","country_code":"TW","type":"education","lineage":["https://openalex.org/I162838928"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Min-Shiang Hwang","raw_affiliation_strings":["Department of Management Information Systems, National Chung Hsing University, 250 Kuo Kuang Road, Taichung, 402, Taiwan, R.O.C"],"affiliations":[{"raw_affiliation_string":"Department of Management Information Systems, National Chung Hsing University, 250 Kuo Kuang Road, Taichung, 402, Taiwan, R.O.C","institution_ids":["https://openalex.org/I162838928"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047477860","display_name":"Cheng\u2010Chi Lee","orcid":"https://orcid.org/0000-0002-8918-1703"},"institutions":[{"id":"https://openalex.org/I162838928","display_name":"National Chung Hsing University","ror":"https://ror.org/05vn3ca78","country_code":"TW","type":"education","lineage":["https://openalex.org/I162838928"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Cheng-Chi Lee","raw_affiliation_strings":["Department of Computer & Communication Engineering, Taichung Healthcare and Management University, No. 500, Lioufeng Raod, Wufeng Shiang, Taichung, Taiwan, 413, R.O.C","Department of Computer Science, National Chung Hsing University, 250 Kuo Kuang Road, 402, Taichung, Taiwan, R.O.C"],"affiliations":[{"raw_affiliation_string":"Department of Computer & Communication Engineering, Taichung Healthcare and Management University, No. 500, Lioufeng Raod, Wufeng Shiang, Taichung, Taiwan, 413, R.O.C","institution_ids":[]},{"raw_affiliation_string":"Department of Computer Science, National Chung Hsing University, 250 Kuo Kuang Road, 402, Taichung, Taiwan, R.O.C","institution_ids":["https://openalex.org/I162838928"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070256786","display_name":"Ji-Zhe Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I162838928","display_name":"National Chung Hsing University","ror":"https://ror.org/05vn3ca78","country_code":"TW","type":"education","lineage":["https://openalex.org/I162838928"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ji-Zhe Lee","raw_affiliation_strings":["Department of Management Information Systems, National Chung Hsing University, 250 Kuo Kuang Road, Taichung, 402, Taiwan, R.O.C"],"affiliations":[{"raw_affiliation_string":"Department of Management Information Systems, National Chung Hsing University, 250 Kuo Kuang Road, Taichung, 402, Taiwan, R.O.C","institution_ids":["https://openalex.org/I162838928"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038961178","display_name":"Chao-Chen Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I162838928","display_name":"National Chung Hsing University","ror":"https://ror.org/05vn3ca78","country_code":"TW","type":"education","lineage":["https://openalex.org/I162838928"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chao-Chen Yang","raw_affiliation_strings":["Department of Management Information Systems, National Chung Hsing University, 250 Kuo Kuang Road, Taichung, 402, Taiwan, R.O.C"],"affiliations":[{"raw_affiliation_string":"Department of Management Information Systems, National Chung Hsing University, 250 Kuo Kuang Road, Taichung, 402, Taiwan, R.O.C","institution_ids":["https://openalex.org/I162838928"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5037292711"],"corresponding_institution_ids":["https://openalex.org/I162838928"],"apc_list":{"value":2190,"currency":"EUR","value_usd":2790},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.13374647,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"29","issue":"3","first_page":"165","last_page":"180"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8722795844078064},{"id":"https://openalex.org/keywords/bluetooth","display_name":"Bluetooth","score":0.8693325519561768},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6506081819534302},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.6313859224319458},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5719143748283386},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5504648089408875},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.49369367957115173},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.42930367588996887},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3672177791595459},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3000968098640442},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.25625085830688477},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.23476353287696838},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1492842733860016}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8722795844078064},{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.8693325519561768},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6506081819534302},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.6313859224319458},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5719143748283386},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5504648089408875},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.49369367957115173},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42930367588996887},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3672177791595459},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3000968098640442},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.25625085830688477},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.23476353287696838},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1492842733860016},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11235-005-1689-0","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11235-005-1689-0","pdf_url":null,"source":{"id":"https://openalex.org/S145894672","display_name":"Telecommunication Systems","issn_l":"1018-4864","issn":["1018-4864","1572-9451"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Telecommunication Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W170084261","https://openalex.org/W190534611","https://openalex.org/W1498408795","https://openalex.org/W1754939103","https://openalex.org/W1967462175","https://openalex.org/W2003736153","https://openalex.org/W2036378739","https://openalex.org/W2066097003","https://openalex.org/W2089831233","https://openalex.org/W2104673077","https://openalex.org/W2139215234","https://openalex.org/W2156186849","https://openalex.org/W2336683095","https://openalex.org/W6610284376"],"related_works":["https://openalex.org/W4322486674","https://openalex.org/W4226182343","https://openalex.org/W1556944867","https://openalex.org/W2164478452","https://openalex.org/W2235903869","https://openalex.org/W1956043843","https://openalex.org/W2024120540","https://openalex.org/W4300630816","https://openalex.org/W1590958755","https://openalex.org/W767161385"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
