{"id":"https://openalex.org/W3193542172","doi":"https://doi.org/10.1007/s11432-020-2975-6","title":"Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0","display_name":"Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0","publication_year":2021,"publication_date":"2021-08-20","ids":{"openalex":"https://openalex.org/W3193542172","doi":"https://doi.org/10.1007/s11432-020-2975-6","mag":"3193542172"},"language":"en","primary_location":{"id":"doi:10.1007/s11432-020-2975-6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11432-020-2975-6","pdf_url":null,"source":{"id":"https://openalex.org/S4210218743","display_name":"Science China Information Sciences","issn_l":"1674-733X","issn":["1674-733X","1869-1919"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Science China Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100385875","display_name":"Chenyu Wang","orcid":"https://orcid.org/0000-0002-6527-2897"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chenyu Wang","raw_affiliation_strings":["School of Cyber Security, Beijing University of Posts and Telecommunications, Beijing, 100876, China","State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, Beijing University of Posts and Telecommunications, Beijing, 100876, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030674762","display_name":"Ding Wang","orcid":"https://orcid.org/0000-0002-1667-2237"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ding Wang","raw_affiliation_strings":["College of Cyber Science, Nankai University, Tianjin, 300350, China","State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","Tianjin Key Laboratory of Network and Data Security Technology, Nankai University, Tianjin, 300350, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Science, Nankai University, Tianjin, 300350, China","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Tianjin Key Laboratory of Network and Data Security Technology, Nankai University, Tianjin, 300350, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102002679","display_name":"Guoai Xu","orcid":"https://orcid.org/0000-0002-9582-0698"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoai Xu","raw_affiliation_strings":["School of Cyber Security, Beijing University of Posts and Telecommunications, Beijing, 100876, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, Beijing University of Posts and Telecommunications, Beijing, 100876, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, 430072, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, 430072, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100385875"],"corresponding_institution_ids":["https://openalex.org/I139759216","https://openalex.org/I4210132990"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":null,"fwci":23.6133,"has_fulltext":false,"cited_by_count":96,"citation_normalized_percentile":{"value":0.99561615,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"65","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7975205183029175},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.7964072227478027},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6335189938545227},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6208584904670715},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5953546762466431},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5429591536521912},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5324075818061829},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4748842120170593},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4707753360271454},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.45913559198379517},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3937146067619324},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3537268340587616},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.33943983912467957},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.24215346574783325},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1532105803489685}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7975205183029175},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.7964072227478027},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6335189938545227},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6208584904670715},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5953546762466431},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5429591536521912},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5324075818061829},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4748842120170593},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4707753360271454},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.45913559198379517},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3937146067619324},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3537268340587616},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.33943983912467957},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.24215346574783325},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1532105803489685},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11432-020-2975-6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11432-020-2975-6","pdf_url":null,"source":{"id":"https://openalex.org/S4210218743","display_name":"Science China Information Sciences","issn_l":"1674-733X","issn":["1674-733X","1869-1919"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Science China Information Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1595293097","https://openalex.org/W1967308747","https://openalex.org/W1976678509","https://openalex.org/W1992007967","https://openalex.org/W2007287631","https://openalex.org/W2025700917","https://openalex.org/W2029693536","https://openalex.org/W2041027981","https://openalex.org/W2053249018","https://openalex.org/W2054857924","https://openalex.org/W2086576140","https://openalex.org/W2147883419","https://openalex.org/W2401625836","https://openalex.org/W2412908136","https://openalex.org/W2482796009","https://openalex.org/W2514873781","https://openalex.org/W2519160529","https://openalex.org/W2546496699","https://openalex.org/W2564131315","https://openalex.org/W2592416275","https://openalex.org/W2605738864","https://openalex.org/W2734150319","https://openalex.org/W2735243062","https://openalex.org/W2753121224","https://openalex.org/W2756359791","https://openalex.org/W2766472919","https://openalex.org/W2769200374","https://openalex.org/W2782556342","https://openalex.org/W2799341537","https://openalex.org/W2804672261","https://openalex.org/W2883088980","https://openalex.org/W2898222788","https://openalex.org/W2915352631","https://openalex.org/W2923796516","https://openalex.org/W2944931339","https://openalex.org/W2951234249","https://openalex.org/W2974280033","https://openalex.org/W3008439638","https://openalex.org/W3012181873","https://openalex.org/W4210322570"],"related_works":["https://openalex.org/W2134722839","https://openalex.org/W2350667451","https://openalex.org/W4285207525","https://openalex.org/W1991914881","https://openalex.org/W1600454606","https://openalex.org/W2371032303","https://openalex.org/W2795109472","https://openalex.org/W2395443637","https://openalex.org/W1982865346","https://openalex.org/W3009400955"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":18},{"year":2023,"cited_by_count":25},{"year":2022,"cited_by_count":21},{"year":2021,"cited_by_count":19}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
