{"id":"https://openalex.org/W1600727611","doi":"https://doi.org/10.1007/3-540-46416-6_40","title":"Randomized Authentication Systems","display_name":"Randomized Authentication Systems","publication_year":2007,"publication_date":"2007-08-06","ids":{"openalex":"https://openalex.org/W1600727611","doi":"https://doi.org/10.1007/3-540-46416-6_40","mag":"1600727611"},"language":"en","primary_location":{"id":"doi:10.1007/3-540-46416-6_40","is_oa":false,"landing_page_url":"https://doi.org/10.1007/3-540-46416-6_40","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045977578","display_name":"Josef Pieprzyk","orcid":"https://orcid.org/0000-0002-1917-6466"},"institutions":[{"id":"https://openalex.org/I40053085","display_name":"Australian Defence Force Academy","ror":"https://ror.org/02j5s7g39","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571","https://openalex.org/I40053085","https://openalex.org/I4394709116"]},{"id":"https://openalex.org/I90745801","display_name":"University of New England","ror":"https://ror.org/04r659a56","country_code":"AU","type":"education","lineage":["https://openalex.org/I90745801"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Josef Pieprzyk","raw_affiliation_strings":["Department of Computer Science University College University of New South Wales, Australian Defence Force Academy, Canberra, ACT, 2600, Australia","Department of Mathematic, Statistic and Computing, University of New England, Armidale, NSW, 2351, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science University College University of New South Wales, Australian Defence Force Academy, Canberra, ACT, 2600, Australia","institution_ids":["https://openalex.org/I40053085","https://openalex.org/I31746571"]},{"raw_affiliation_string":"Department of Mathematic, Statistic and Computing, University of New England, Armidale, NSW, 2351, Australia","institution_ids":["https://openalex.org/I90745801"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010447902","display_name":"Reihaneh Safavi\u2013Naini","orcid":"https://orcid.org/0000-0002-1697-3590"},"institutions":[{"id":"https://openalex.org/I40053085","display_name":"Australian Defence Force Academy","ror":"https://ror.org/02j5s7g39","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571","https://openalex.org/I40053085","https://openalex.org/I4394709116"]},{"id":"https://openalex.org/I90745801","display_name":"University of New England","ror":"https://ror.org/04r659a56","country_code":"AU","type":"education","lineage":["https://openalex.org/I90745801"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Reihaneh Safavi-Naini","raw_affiliation_strings":["Department of Computer Science University College University of New South Wales, Australian Defence Force Academy, Canberra, ACT, 2600, Australia","Department of Mathematic, Statistic and Computing, University of New England, Armidale, NSW, 2351, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science University College University of New South Wales, Australian Defence Force Academy, Canberra, ACT, 2600, Australia","institution_ids":["https://openalex.org/I40053085","https://openalex.org/I31746571"]},{"raw_affiliation_string":"Department of Mathematic, Statistic and Computing, University of New England, Armidale, NSW, 2351, Australia","institution_ids":["https://openalex.org/I90745801"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045977578"],"corresponding_institution_ids":["https://openalex.org/I31746571","https://openalex.org/I40053085","https://openalex.org/I90745801"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.5485,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.71180615,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"472","last_page":"481"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.6115385293960571},{"id":"https://openalex.org/keywords/concatenation","display_name":"Concatenation (mathematics)","score":0.5913928151130676},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5792483687400818},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5716696977615356},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.48624980449676514},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.4832347333431244},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4593124985694885},{"id":"https://openalex.org/keywords/concatenated-error-correction-code","display_name":"Concatenated error correction code","score":0.41019344329833984},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3303184509277344},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2768245339393616},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.26089155673980713},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.14986652135849},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1417044997215271},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10872349143028259}],"concepts":[{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.6115385293960571},{"id":"https://openalex.org/C87619178","wikidata":"https://www.wikidata.org/wiki/Q126002","display_name":"Concatenation (mathematics)","level":2,"score":0.5913928151130676},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5792483687400818},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5716696977615356},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.48624980449676514},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.4832347333431244},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4593124985694885},{"id":"https://openalex.org/C78944582","wikidata":"https://www.wikidata.org/wiki/Q5158264","display_name":"Concatenated error correction code","level":4,"score":0.41019344329833984},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3303184509277344},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2768245339393616},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.26089155673980713},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.14986652135849},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1417044997215271},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10872349143028259},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/3-540-46416-6_40","is_oa":false,"landing_page_url":"https://doi.org/10.1007/3-540-46416-6_40","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1830378742","https://openalex.org/W2038257637","https://openalex.org/W2061106457","https://openalex.org/W2077300005","https://openalex.org/W2112876875","https://openalex.org/W2117362057","https://openalex.org/W2412381425","https://openalex.org/W3150645827","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2900120528","https://openalex.org/W2783895911","https://openalex.org/W2795193539","https://openalex.org/W2034401304","https://openalex.org/W2273978823","https://openalex.org/W2315999626","https://openalex.org/W2806663979","https://openalex.org/W2157771100","https://openalex.org/W1603044377","https://openalex.org/W1503328659"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
