{"id":"https://openalex.org/W2021218789","doi":"https://doi.org/10.1007/s11432-014-5176-7","title":"On \u03c4-time secure key agreement","display_name":"On \u03c4-time secure key agreement","publication_year":2014,"publication_date":"2014-12-02","ids":{"openalex":"https://openalex.org/W2021218789","doi":"https://doi.org/10.1007/s11432-014-5176-7","mag":"2021218789"},"language":"en","primary_location":{"id":"doi:10.1007/s11432-014-5176-7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11432-014-5176-7","pdf_url":null,"source":{"id":"https://openalex.org/S4210218743","display_name":"Science China Information Sciences","issn_l":"1674-733X","issn":["1674-733X","1869-1919"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Science China Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084928289","display_name":"Shaoquan Jiang","orcid":"https://orcid.org/0000-0001-8114-0782"},"institutions":[{"id":"https://openalex.org/I3130456415","display_name":"Mianyang Normal University","ror":"https://ror.org/02rka3n91","country_code":"CN","type":"education","lineage":["https://openalex.org/I3130456415"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"ShaoQuan Jiang","raw_affiliation_strings":["Institute of Information Security, Mianyang Normal University, Mianyang, 621000, China","School of Computer Science, University of Electronic Science and Technology of China, Chengdu, 611731, China","Mianyang Normal University","University of Electronic Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Security, Mianyang Normal University, Mianyang, 621000, China","institution_ids":["https://openalex.org/I3130456415"]},{"raw_affiliation_string":"School of Computer Science, University of Electronic Science and Technology of China, Chengdu, 611731, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Mianyang Normal University","institution_ids":["https://openalex.org/I3130456415"]},{"raw_affiliation_string":"University of Electronic Science and Technology of China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5084928289"],"corresponding_institution_ids":["https://openalex.org/I150229711","https://openalex.org/I3130456415"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":null,"fwci":0.3618,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.6611884,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"58","issue":"1","first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7999916076660156},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7380292415618896},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6343017816543579},{"id":"https://openalex.org/keywords/key-agreement-protocol","display_name":"Key-agreement protocol","score":0.5724291801452637},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4980788230895996},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.49045392870903015},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4500027000904083},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.40794435143470764},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3494468927383423},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.21296656131744385},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17050692439079285}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7999916076660156},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7380292415618896},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6343017816543579},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.5724291801452637},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4980788230895996},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.49045392870903015},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4500027000904083},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.40794435143470764},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3494468927383423},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.21296656131744385},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17050692439079285},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11432-014-5176-7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11432-014-5176-7","pdf_url":null,"source":{"id":"https://openalex.org/S4210218743","display_name":"Science China Information Sciences","issn_l":"1674-733X","issn":["1674-733X","1869-1919"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Science China Information Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1494829933","https://openalex.org/W1512186075","https://openalex.org/W1514361308","https://openalex.org/W1542059364","https://openalex.org/W1544592562","https://openalex.org/W1590263452","https://openalex.org/W1822822445","https://openalex.org/W1974152067","https://openalex.org/W1994704618","https://openalex.org/W2034927267","https://openalex.org/W2047241038","https://openalex.org/W2087944032","https://openalex.org/W2088379485","https://openalex.org/W2099111195","https://openalex.org/W2105514582","https://openalex.org/W2156186849","https://openalex.org/W2161790848","https://openalex.org/W2167541784","https://openalex.org/W2478708596","https://openalex.org/W2914756988","https://openalex.org/W3144761759"],"related_works":["https://openalex.org/W2381403452","https://openalex.org/W4312674866","https://openalex.org/W4378471218","https://openalex.org/W1510601450","https://openalex.org/W2371677104","https://openalex.org/W2306720604","https://openalex.org/W2028299655","https://openalex.org/W2064447331","https://openalex.org/W2370238447","https://openalex.org/W2027791414"],"abstract_inverted_index":null,"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
