{"id":"https://openalex.org/W2125984087","doi":"https://doi.org/10.1016/0167-4048(87)90126-x","title":"Expert systems applied to the analysis of key management schemes","display_name":"Expert systems applied to the analysis of key management schemes","publication_year":1987,"publication_date":"1987-02-01","ids":{"openalex":"https://openalex.org/W2125984087","doi":"https://doi.org/10.1016/0167-4048(87)90126-x","mag":"2125984087"},"language":"en","primary_location":{"id":"doi:10.1016/0167-4048(87)90126-x","is_oa":false,"landing_page_url":"https://doi.org/10.1016/0167-4048(87)90126-x","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026305815","display_name":"Dennis Longley","orcid":null},"institutions":[{"id":"https://openalex.org/I160993911","display_name":"Queensland University of Technology","ror":"https://ror.org/03pnv4752","country_code":"AU","type":"education","lineage":["https://openalex.org/I160993911"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Dennis Longley","raw_affiliation_strings":["Head of the School of Computing Studies, Queensland Institute of Technology, George Street, GPO Box 2434, Brisbane, Queensland, Australia 4001","Head of the School of Computing Studies, Queensland Institute of Technology, George Street, GPO Box 2434, Brisbane, Queensland, Australia 4001#TAB#"],"affiliations":[{"raw_affiliation_string":"Head of the School of Computing Studies, Queensland Institute of Technology, George Street, GPO Box 2434, Brisbane, Queensland, Australia 4001","institution_ids":["https://openalex.org/I160993911"]},{"raw_affiliation_string":"Head of the School of Computing Studies, Queensland Institute of Technology, George Street, GPO Box 2434, Brisbane, Queensland, Australia 4001#TAB#","institution_ids":["https://openalex.org/I160993911"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5026305815"],"corresponding_institution_ids":["https://openalex.org/I160993911"],"apc_list":{"value":3190,"currency":"USD","value_usd":3190},"apc_paid":null,"fwci":1.0173,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.8088334,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"6","issue":"1","first_page":"54","last_page":"67"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9722999930381775,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7581384778022766},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7413780689239502},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.4775346517562866},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28481602668762207},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.14024919271469116}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7581384778022766},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7413780689239502},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.4775346517562866},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28481602668762207},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.14024919271469116}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/0167-4048(87)90126-x","is_oa":false,"landing_page_url":"https://doi.org/10.1016/0167-4048(87)90126-x","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2035309195","https://openalex.org/W2070392129","https://openalex.org/W2317768079"],"related_works":["https://openalex.org/W2957415295","https://openalex.org/W2152563268","https://openalex.org/W2025411550","https://openalex.org/W2020176320","https://openalex.org/W2134686030","https://openalex.org/W4240532262","https://openalex.org/W2392390330","https://openalex.org/W2365054870","https://openalex.org/W2952702399","https://openalex.org/W4252670433"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
