{"id":"https://openalex.org/W2114566024","doi":"https://doi.org/10.1007/s10207-003-0023-7","title":"Zheng and Seberry\u2019s public key encryption scheme revisited","display_name":"Zheng and Seberry\u2019s public key encryption scheme revisited","publication_year":2003,"publication_date":"2003-11-01","ids":{"openalex":"https://openalex.org/W2114566024","doi":"https://doi.org/10.1007/s10207-003-0023-7","mag":"2114566024"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-003-0023-7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-003-0023-7","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088366326","display_name":"Joonsang Baek","orcid":"https://orcid.org/0000-0003-2613-2127"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Joonsang Baek","raw_affiliation_strings":["School of Network Computing, Monash University, McMahons Road, VIC 3199, Frankston, Australia","School of Network Computing, Monash University, Frankston, Australia VIC 3199#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Network Computing, Monash University, McMahons Road, VIC 3199, Frankston, Australia","institution_ids":["https://openalex.org/I56590836"]},{"raw_affiliation_string":"School of Network Computing, Monash University, Frankston, Australia VIC 3199#TAB#","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000813695","display_name":"Yuliang Zheng","orcid":"https://orcid.org/0000-0002-9815-9727"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuliang Zheng","raw_affiliation_strings":["Department of Software and Information Systems, University of North Carolina at Charlotte, NC 28223, Charlotte, USA","Department of Software and Information Systems, University of North Carolina at Charlotte, Charlotte, USA NC 28223#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Software and Information Systems, University of North Carolina at Charlotte, NC 28223, Charlotte, USA","institution_ids":["https://openalex.org/I102149020"]},{"raw_affiliation_string":"Department of Software and Information Systems, University of North Carolina at Charlotte, Charlotte, USA NC 28223#TAB#","institution_ids":["https://openalex.org/I102149020"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5088366326"],"corresponding_institution_ids":["https://openalex.org/I56590836"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":null,"fwci":0.468,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.75362488,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2","issue":"1","first_page":"37","last_page":"44"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.7715740203857422},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6681589484214783},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5958779454231262},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5914098620414734},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5638719201087952},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5468697547912598},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5450014472007751},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5070619583129883},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4675532579421997},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.466776043176651},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4354468882083893},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22420936822891235}],"concepts":[{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.7715740203857422},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6681589484214783},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5958779454231262},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5914098620414734},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5638719201087952},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5468697547912598},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5450014472007751},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5070619583129883},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4675532579421997},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.466776043176651},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4354468882083893},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22420936822891235},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10207-003-0023-7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-003-0023-7","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.122.1610","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.122.1610","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.sis.uncc.edu/~yzheng/publications/files/IJIS-2003-fnl.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1498517373","https://openalex.org/W1511745870","https://openalex.org/W1516512945","https://openalex.org/W1589129854","https://openalex.org/W1589586740","https://openalex.org/W2019570994","https://openalex.org/W2052267638","https://openalex.org/W2126878966","https://openalex.org/W2149093588","https://openalex.org/W2161195863","https://openalex.org/W2912926260"],"related_works":["https://openalex.org/W2383065991","https://openalex.org/W1519370602","https://openalex.org/W4313172668","https://openalex.org/W1554299772","https://openalex.org/W1569215146","https://openalex.org/W2024757849","https://openalex.org/W2165448723","https://openalex.org/W2063764735","https://openalex.org/W2369329904","https://openalex.org/W121525879"],"abstract_inverted_index":null,"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
