{"id":"https://openalex.org/W3101072701","doi":"https://doi.org/10.1007/978-3-030-62223-7_50","title":"A Secure Multi-party Computational Adversary Selection Model Based on Time-Varying of Entropy","display_name":"A Secure Multi-party Computational Adversary Selection Model Based on Time-Varying of Entropy","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3101072701","doi":"https://doi.org/10.1007/978-3-030-62223-7_50","mag":"3101072701"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-62223-7_50","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-62223-7_50","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100390708","display_name":"Xinyu Zhang","orcid":"https://orcid.org/0000-0002-7427-5774"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]},{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]},{"id":"https://openalex.org/I71920554","display_name":"King Abdullah University of Science and Technology","ror":"https://ror.org/01q3tbs38","country_code":"SA","type":"education","lineage":["https://openalex.org/I71920554"]}],"countries":["CN","SA"],"is_corresponding":false,"raw_author_name":"Xinyu Zhang","raw_affiliation_strings":["Division of Computer, Electrical and Mathematical Sciences and Engineering, King Abdullah University of Science, Thuwal, Saudi Arabia","School of Computer Science, Nankai University, Tianjin, China","State Key Laboratory of Public Big Date, College of Computer Science and Technology, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"Division of Computer, Electrical and Mathematical Sciences and Engineering, King Abdullah University of Science, Thuwal, Saudi Arabia","institution_ids":["https://openalex.org/I71920554"]},{"raw_affiliation_string":"School of Computer Science, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"State Key Laboratory of Public Big Date, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017747321","display_name":"Yujun Liu","orcid":"https://orcid.org/0009-0007-0628-8630"},"institutions":[{"id":"https://openalex.org/I4210102827","display_name":"Shanghai Customs College","ror":"https://ror.org/01agvej60","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210102827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"YuJun Liu","raw_affiliation_strings":["Technical Center of Beijing Customs, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Technical Center of Beijing Customs, Beijing, China","institution_ids":["https://openalex.org/I4210102827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100722813","display_name":"Yuling Chen","orcid":"https://orcid.org/0000-0002-3698-2478"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuling Chen","raw_affiliation_strings":["State Key Laboratory of Public Big Date, College of Computer Science and Technology, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Date, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100749982","display_name":"Zhan Wang","orcid":"https://orcid.org/0000-0002-8684-3767"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhan Wang","raw_affiliation_strings":["State Key Laboratory of Public Big Date, College of Computer Science and Technology, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Date, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100722813"],"corresponding_institution_ids":["https://openalex.org/I178232147"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20808493,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"566","last_page":"577"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8316128253936768},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7481046915054321},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6484241485595703},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6095584034919739},{"id":"https://openalex.org/keywords/cheating","display_name":"Cheating","score":0.6078186631202698},{"id":"https://openalex.org/keywords/security-parameter","display_name":"Security parameter","score":0.5077413320541382},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5073463320732117},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.5036022067070007},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4785366952419281},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.45786717534065247},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.4538766145706177},{"id":"https://openalex.org/keywords/secure-two-party-computation","display_name":"Secure two-party computation","score":0.4237518906593323},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.41853976249694824},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.41850659251213074},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.12175905704498291}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8316128253936768},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7481046915054321},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6484241485595703},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6095584034919739},{"id":"https://openalex.org/C2778024590","wikidata":"https://www.wikidata.org/wiki/Q2357432","display_name":"Cheating","level":2,"score":0.6078186631202698},{"id":"https://openalex.org/C2776711565","wikidata":"https://www.wikidata.org/wiki/Q7445058","display_name":"Security parameter","level":3,"score":0.5077413320541382},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5073463320732117},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.5036022067070007},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4785366952419281},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.45786717534065247},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.4538766145706177},{"id":"https://openalex.org/C13652956","wikidata":"https://www.wikidata.org/wiki/Q7444883","display_name":"Secure two-party computation","level":4,"score":0.4237518906593323},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.41853976249694824},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.41850659251213074},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.12175905704498291},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-62223-7_50","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-62223-7_50","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W112739640","https://openalex.org/W128784951","https://openalex.org/W1515945955","https://openalex.org/W1895254779","https://openalex.org/W1995875735","https://openalex.org/W2027471022","https://openalex.org/W2050209678","https://openalex.org/W2068632940","https://openalex.org/W2092422002","https://openalex.org/W2232834728","https://openalex.org/W2486125865","https://openalex.org/W2538997648","https://openalex.org/W2605557958","https://openalex.org/W2801763503","https://openalex.org/W2805457650","https://openalex.org/W2809435741","https://openalex.org/W2900116858","https://openalex.org/W2908294075","https://openalex.org/W2935394538","https://openalex.org/W2972882814","https://openalex.org/W2978725006","https://openalex.org/W2993383518","https://openalex.org/W2997571012","https://openalex.org/W3003575154","https://openalex.org/W4249169689"],"related_works":["https://openalex.org/W2886283651","https://openalex.org/W4293056000","https://openalex.org/W2952477979","https://openalex.org/W2952662274","https://openalex.org/W4365143614","https://openalex.org/W2188119083","https://openalex.org/W4206242289","https://openalex.org/W2990282446","https://openalex.org/W1576843907","https://openalex.org/W1519947574"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
