{"id":"https://openalex.org/W4389903132","doi":"https://doi.org/10.1049/2023/8234537","title":"A Secure Anonymous Identity\u2010Based Virtual\u2010Space Agreement Method for Crowds\u2010Based Anonymous Communicate Scheme","display_name":"A Secure Anonymous Identity\u2010Based Virtual\u2010Space Agreement Method for Crowds\u2010Based Anonymous Communicate Scheme","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4389903132","doi":"https://doi.org/10.1049/2023/8234537"},"language":"en","primary_location":{"id":"doi:10.1049/2023/8234537","is_oa":true,"landing_page_url":"https://doi.org/10.1049/2023/8234537","pdf_url":"https://downloads.hindawi.com/journals/ietis/2023/8234537.pdf","source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://downloads.hindawi.com/journals/ietis/2023/8234537.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017636101","display_name":"Kai Yan Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I4210119262","display_name":"Chengdu Design & Research Institute of Building Materials Industry (China)","ror":"https://ror.org/028xtjj97","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210119262"]},{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Lin","raw_affiliation_strings":["Sichuan Digital Economy Industry Development Research Institute, Chengdu","The School of Cyber Security, Xi\u2019an Jiaotong University, Xi\u2019an","The School of Cyber Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","Sichuan Digital Economy Industry Development Research Institute, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Sichuan Digital Economy Industry Development Research Institute, Chengdu","institution_ids":["https://openalex.org/I4210119262"]},{"raw_affiliation_string":"The School of Cyber Security, Xi\u2019an Jiaotong University, Xi\u2019an","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"The School of Cyber Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Sichuan Digital Economy Industry Development Research Institute, Chengdu, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102855902","display_name":"Wang Kai-yu","orcid":"https://orcid.org/0000-0002-8880-581X"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaiyu Wang","raw_affiliation_strings":["The School of Cyber Security, Xi\u2019an Jiaotong University, Xi\u2019an","The School of Cyber Security, Xi\u2019an Jiaotong University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"The School of Cyber Security, Xi\u2019an Jiaotong University, Xi\u2019an","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"The School of Cyber Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093524329","display_name":"Jin Shang","orcid":"https://orcid.org/0000-0001-6859-3410"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Shang","raw_affiliation_strings":["The School of Cyber Security, Xi\u2019an Jiaotong University, Xi\u2019an","The School of Cyber Security, Xi\u2019an Jiaotong University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"The School of Cyber Security, Xi\u2019an Jiaotong University, Xi\u2019an","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"The School of Cyber Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082944496","display_name":"Qindong Sun","orcid":"https://orcid.org/0000-0003-2019-7886"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qindong Sun","raw_affiliation_strings":["The School of Cyber Security, Xi\u2019an Jiaotong University, Xi\u2019an","The School of Cyber Security, Xi\u2019an Jiaotong University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"The School of Cyber Security, Xi\u2019an Jiaotong University, Xi\u2019an","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"The School of Cyber Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5082944496"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":{"value":2000,"currency":"EUR","value_usd":2200},"apc_paid":{"value":2000,"currency":"EUR","value_usd":2200},"fwci":0.1726,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.59548,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"2023","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7226623296737671},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.6001295447349548},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5245740413665771},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5209625959396362},{"id":"https://openalex.org/keywords/crowds","display_name":"Crowds","score":0.4953071177005768},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.49210137128829956},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3825885057449341},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10679852962493896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7226623296737671},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6001295447349548},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5245740413665771},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5209625959396362},{"id":"https://openalex.org/C2777852691","wikidata":"https://www.wikidata.org/wiki/Q13430821","display_name":"Crowds","level":2,"score":0.4953071177005768},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.49210137128829956},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3825885057449341},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10679852962493896},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1049/2023/8234537","is_oa":true,"landing_page_url":"https://doi.org/10.1049/2023/8234537","pdf_url":"https://downloads.hindawi.com/journals/ietis/2023/8234537.pdf","source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:8807a6d076af4ab3bbb213cfa9ef9483","is_oa":true,"landing_page_url":"https://doaj.org/article/8807a6d076af4ab3bbb213cfa9ef9483","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IET Information Security, Vol 2023 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1049/2023/8234537","is_oa":true,"landing_page_url":"https://doi.org/10.1049/2023/8234537","pdf_url":"https://downloads.hindawi.com/journals/ietis/2023/8234537.pdf","source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1990103393","display_name":null,"funder_award_id":"2022ZDLSF07-07","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4298793368","display_name":null,"funder_award_id":"2023NSFSC0502","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4467160330","display_name":null,"funder_award_id":"22GXFW0079","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5189907394","display_name":null,"funder_award_id":"62272378","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6778145870","display_name":null,"funder_award_id":"2022ZDLSF07-07","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"},{"id":"https://openalex.org/G8466107693","display_name":null,"funder_award_id":"2019-38","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320325079","display_name":"Xi'an Municipal Bureau of Science and Technology","ror":"https://ror.org/02rn5dn49"},{"id":"https://openalex.org/F4320329861","display_name":"Natural Science Foundation of Sichuan Province","ror":null},{"id":"https://openalex.org/F4320336350","display_name":"Key Research and Development Projects of Shaanxi Province","ror":null}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4389903132.pdf"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W287184503","https://openalex.org/W1484798037","https://openalex.org/W1597087347","https://openalex.org/W1978044849","https://openalex.org/W1978884755","https://openalex.org/W1982179579","https://openalex.org/W2030231203","https://openalex.org/W2054405726","https://openalex.org/W2086853779","https://openalex.org/W2090396608","https://openalex.org/W2103647628","https://openalex.org/W2105709923","https://openalex.org/W2135599859","https://openalex.org/W2138307787","https://openalex.org/W2153281696","https://openalex.org/W2155690458","https://openalex.org/W2162297215","https://openalex.org/W2171294352","https://openalex.org/W2174507869","https://openalex.org/W2227653143","https://openalex.org/W2408528206","https://openalex.org/W2524028925","https://openalex.org/W2732124327","https://openalex.org/W2790635691","https://openalex.org/W2793097973","https://openalex.org/W3029861272","https://openalex.org/W3034223808","https://openalex.org/W3043828267","https://openalex.org/W3080846549","https://openalex.org/W3131174583","https://openalex.org/W3163909197","https://openalex.org/W3209780393","https://openalex.org/W4200462170","https://openalex.org/W4210835755","https://openalex.org/W4220824332","https://openalex.org/W4221006440","https://openalex.org/W4256295616","https://openalex.org/W4285226905","https://openalex.org/W4308691278","https://openalex.org/W4323816033","https://openalex.org/W4367292551"],"related_works":["https://openalex.org/W4240200267","https://openalex.org/W1511510665","https://openalex.org/W1524661185","https://openalex.org/W2078823605","https://openalex.org/W2500095415","https://openalex.org/W4233026749","https://openalex.org/W2282342021","https://openalex.org/W2097922264","https://openalex.org/W2391461167","https://openalex.org/W2925418343"],"abstract_inverted_index":{"Anonymous":[0],"data":[1,22,60],"exchange":[2,61],"is":[3,183],"in":[4,7,11,15,62,154],"great":[5],"demand":[6],"many":[8],"situations,":[9],"especially":[10],"remote":[12,63],"control":[13,35,64],"systems,":[14],"which":[16],"a":[17,46,122,128,193],"stable,":[18],"secure,":[19],"and":[20,30,37,73,79,96,99,139,157,168,187],"secret":[21,59],"channel":[23],"must":[24],"be":[25],"established":[26],"between":[27,136],"the":[28,41,54,93,107,117,137,140,147,155,158,163,166,169,198,203],"controlling":[29],"controlled":[31,141,170],"parties":[32],"to":[33,200],"distribute":[34],"commands":[36],"return":[38],"data.":[39],"In":[40,88,112],"previous":[42],"work,":[43],"we":[44,91,115,188],"built":[45],"two\u2010level":[47],"Virtual-Space":[48,103,124,132,160],"anonymous":[49],"communication":[50],"scheme":[51],"based":[52],"on":[53,162,185],"Crowds":[55],"System":[56],"for":[57],"performing":[58],"systems.":[65],"However,":[66],"as":[67],"an":[68,101],"essential":[69],"part":[70],"of":[71,130,165,197],"security":[72,195],"anonymity,":[74],"participating":[75],"nodes\u2019":[76],"identity":[77,94,118,164],"declaration":[78,97,119],"session":[80],"key":[81],"agreement":[82,95,104,125],"phases":[83],"were":[84],"not":[85,176],"well":[86],"designed.":[87],"this":[89,113,190],"paper,":[90],"redesign":[92],"process":[98,120],"design":[100],"identity\u2010based":[102],"method":[105,199,204],"using":[106],"extended":[108],"Chebyshev":[109],"Chaotic":[110],"Maps.":[111],"approach,":[114],"transform":[116],"into":[121],"multilevel":[123],"problem,":[126],"where":[127,149],"series":[129],"security\u2010progressive":[131],"addresses":[133],"are":[134,151],"negotiated":[135,159],"controller":[138,167],"nodes.":[142],"The":[143,180],"protocol":[144,182],"can":[145],"handle":[146],"case":[148],"there":[150],"multiple":[152],"controllers":[153,174],"system,":[156],"depends":[161],"node,":[171],"so":[172],"different":[173],"do":[175],"affect":[177],"each":[178],"other.":[179],"designed":[181],"verified":[184],"Freenet,":[186],"conclude":[189],"paper":[191],"with":[192],"detailed":[194],"analysis":[196],"prove":[201],"that":[202],"satisfies":[205],"forward":[206],"security.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-12T07:58:50.170612","created_date":"2025-10-10T00:00:00"}
