{"id":"https://openalex.org/W4385606405","doi":"https://doi.org/10.1007/s11416-023-00482-1","title":"Networking and cryptography library with a non-repudiation flavor for blockchain","display_name":"Networking and cryptography library with a non-repudiation flavor for blockchain","publication_year":2023,"publication_date":"2023-08-05","ids":{"openalex":"https://openalex.org/W4385606405","doi":"https://doi.org/10.1007/s11416-023-00482-1"},"language":"en","primary_location":{"id":"doi:10.1007/s11416-023-00482-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11416-023-00482-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11416-023-00482-1.pdf","source":{"id":"https://openalex.org/S2764922190","display_name":"Journal of Computer Virology and Hacking Techniques","issn_l":"2263-8733","issn":["2263-8733"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Virology and Hacking Techniques","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s11416-023-00482-1.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004461355","display_name":"Mohamed Rasslan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156128","display_name":"Electronics Research Institute","ror":"https://ror.org/0532wcf75","country_code":"EG","type":"facility","lineage":["https://openalex.org/I4210094263","https://openalex.org/I4210156128"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Mohamed Rasslan","raw_affiliation_strings":["Informatics Department, Electronics Research Institute, Cairo, 12622, Egypt"],"affiliations":[{"raw_affiliation_string":"Informatics Department, Electronics Research Institute, Cairo, 12622, Egypt","institution_ids":["https://openalex.org/I4210156128"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054411950","display_name":"Mahmoud M. Nasreldin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mahmoud M. Nasreldin","raw_affiliation_strings":["CyberistInsight, Ottawa, ON, K1S 1N4, Canada"],"affiliations":[{"raw_affiliation_string":"CyberistInsight, Ottawa, ON, K1S 1N4, Canada","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111020348","display_name":"Doaa Abdelrahman","orcid":null},"institutions":[{"id":"https://openalex.org/I57629906","display_name":"Nile University","ror":"https://ror.org/03cg7cp61","country_code":"EG","type":"education","lineage":["https://openalex.org/I57629906"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Doaa Abdelrahman","raw_affiliation_strings":["Center of Informatics Science, Faculty of Information Technology and Computer Science, Nile University, Giza, 12588, Egypt"],"affiliations":[{"raw_affiliation_string":"Center of Informatics Science, Faculty of Information Technology and Computer Science, Nile University, Giza, 12588, Egypt","institution_ids":["https://openalex.org/I57629906"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028384335","display_name":"Aya Elshobaky","orcid":null},"institutions":[{"id":"https://openalex.org/I84524832","display_name":"Alexandria University","ror":"https://ror.org/00mzz1w90","country_code":"EG","type":"education","lineage":["https://openalex.org/I84524832"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Aya Elshobaky","raw_affiliation_strings":["Alexandria University, Alexandria, 21500, Egypt"],"affiliations":[{"raw_affiliation_string":"Alexandria University, Alexandria, 21500, Egypt","institution_ids":["https://openalex.org/I84524832"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086270613","display_name":"Heba K. Aslan","orcid":"https://orcid.org/0000-0002-0821-5378"},"institutions":[{"id":"https://openalex.org/I57629906","display_name":"Nile University","ror":"https://ror.org/03cg7cp61","country_code":"EG","type":"education","lineage":["https://openalex.org/I57629906"]},{"id":"https://openalex.org/I4210156128","display_name":"Electronics Research Institute","ror":"https://ror.org/0532wcf75","country_code":"EG","type":"facility","lineage":["https://openalex.org/I4210094263","https://openalex.org/I4210156128"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Heba Aslan","raw_affiliation_strings":["Center of Informatics Science, Faculty of Information Technology and Computer Science, Nile University, Giza, 12588, Egypt","Informatics Department, Electronics Research Institute, Cairo, 12622, Egypt"],"affiliations":[{"raw_affiliation_string":"Center of Informatics Science, Faculty of Information Technology and Computer Science, Nile University, Giza, 12588, Egypt","institution_ids":["https://openalex.org/I57629906"]},{"raw_affiliation_string":"Informatics Department, Electronics Research Institute, Cairo, 12622, Egypt","institution_ids":["https://openalex.org/I4210156128"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5004461355"],"corresponding_institution_ids":["https://openalex.org/I4210156128"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2390,"currency":"EUR","value_usd":2990},"fwci":1.8327,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.88276297,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"20","issue":"1","first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9782999753952026,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7556639313697815},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7335519194602966},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7057303190231323},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6777394413948059},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.6160183548927307},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.5845507383346558},{"id":"https://openalex.org/keywords/non-repudiation","display_name":"Non-repudiation","score":0.548229455947876},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3988995850086212},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.24123477935791016},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.07302364706993103}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7556639313697815},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7335519194602966},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7057303190231323},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6777394413948059},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6160183548927307},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.5845507383346558},{"id":"https://openalex.org/C44209976","wikidata":"https://www.wikidata.org/wiki/Q1327773","display_name":"Non-repudiation","level":3,"score":0.548229455947876},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3988995850086212},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.24123477935791016},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.07302364706993103}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11416-023-00482-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11416-023-00482-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11416-023-00482-1.pdf","source":{"id":"https://openalex.org/S2764922190","display_name":"Journal of Computer Virology and Hacking Techniques","issn_l":"2263-8733","issn":["2263-8733"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Virology and Hacking Techniques","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s11416-023-00482-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11416-023-00482-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11416-023-00482-1.pdf","source":{"id":"https://openalex.org/S2764922190","display_name":"Journal of Computer Virology and Hacking Techniques","issn_l":"2263-8733","issn":["2263-8733"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Virology and Hacking Techniques","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5400000214576721,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4385606405.pdf"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W186684821","https://openalex.org/W2175661655","https://openalex.org/W2698406033","https://openalex.org/W2754529701","https://openalex.org/W2767162229","https://openalex.org/W2901598045","https://openalex.org/W2955179944","https://openalex.org/W3015725655","https://openalex.org/W3157340262","https://openalex.org/W3160290861","https://openalex.org/W3163129491","https://openalex.org/W3193852231","https://openalex.org/W4206243574","https://openalex.org/W4286279717","https://openalex.org/W4287887627"],"related_works":["https://openalex.org/W18954787","https://openalex.org/W3138083505","https://openalex.org/W4254460476","https://openalex.org/W2783353176","https://openalex.org/W4390962791","https://openalex.org/W2339543721","https://openalex.org/W1829339118","https://openalex.org/W3179891621","https://openalex.org/W87530933","https://openalex.org/W1700639748"],"abstract_inverted_index":{"Abstract":[0],"Blockchain":[1],"is":[2,19,29,35,73,81,96,122,162,171,186,212,221],"currently":[3,49],"one":[4,38,85],"of":[5,22,39,86,139,217],"the":[6,12,23,40,87,110,119,126,131,136,140,148,159,168,189,193,203,210,215,218,230,234],"most":[7,41],"widely":[8],"discussed":[9],"inventions":[10],"in":[11,44,59],"information":[13],"and":[14,27,69,100,104,155,214],"communication":[15],"technology":[16,33],"industry.":[17],"It":[18],"a":[20,30,175,180,207],"pillar":[21],"fourth":[24],"industrial":[25],"revolution":[26],"it":[28,106,199],"cryptographically":[31],"demanding":[32],"that":[34,54,90,134,198,229],"regarded":[36],"as":[37],"influential":[42],"topics":[43],"academia.":[45],"Many":[46],"blockchain":[47,120,142],"platforms":[48,121],"utilize":[50],"third-party":[51],"cryptographic":[52,57,78],"libraries":[53,89],"offer":[55],"many":[56],"primitives":[58],"order":[60],"to":[61,83,98,108,118,129,146,178,196,209],"ensure":[62],"users'":[63],"protection":[64],"against":[65],"cyber-attacks.":[66],"The":[67,226],"Networking":[68],"Cryptography":[70],"library":[71,76,128,195,211],"(NaCl)":[72],"an":[74,116],"open-source":[75],"for":[77],"primitives.":[79],"NaCl":[80,95,127,194],"known":[82],"be":[84],"best":[88],"provide":[91,109,147,202],"usability":[92],"property.":[93,182,205],"Although":[94],"easy":[97],"use":[99],"ensures:":[101],"confidentiality,":[102],"integrity,":[103],"authenticity,":[105],"fails":[107],"non-repudiation":[111,132,160,181,204],"service.":[112],"In":[113,144,165],"this":[114,166],"paper,":[115,167],"improvement":[117],"proposed":[123,169,219,231],"by":[124],"enhancing":[125],"achieve":[130],"property":[133],"enhances":[135],"security":[137,150],"level":[138],"implemented":[141],"platform.":[143],"NaCl,":[145],"aforementioned":[149,235],"services,":[151],"messages":[152],"are":[153],"signed":[154],"then":[156],"encrypted.":[157],"Therefore,":[158],"service":[161],"not":[163,201],"provided.":[164],"solution":[170,220,232],"based":[172],"on":[173,192],"adding":[174],"signature":[176],"block":[177],"enable":[179],"First,":[183],"logical":[184],"analysis":[185,227],"conducted":[187],"using":[188,223],"BAN":[190,224],"logic":[191],"prove":[197],"does":[200],"Subsequently,":[206],"modification":[208],"proposed,":[213],"correctness":[216],"proven":[222],"logic.":[225],"suggests":[228],"fixes":[233],"problem.":[236]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
