{"id":"https://openalex.org/W2340169680","doi":"https://doi.org/10.1080/10798587.2015.1121615","title":"Data Encryption Method Using Environmental Secret Key with Server Assistance","display_name":"Data Encryption Method Using Environmental Secret Key with Server Assistance","publication_year":2016,"publication_date":"2016-04-20","ids":{"openalex":"https://openalex.org/W2340169680","doi":"https://doi.org/10.1080/10798587.2015.1121615","mag":"2340169680"},"language":"en","primary_location":{"id":"doi:10.1080/10798587.2015.1121615","is_oa":false,"landing_page_url":"https://doi.org/10.1080/10798587.2015.1121615","pdf_url":null,"source":{"id":"https://openalex.org/S40639465","display_name":"Intelligent Automation & Soft Computing","issn_l":"1079-8587","issn":["1079-8587","2326-005X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Automation &amp; Soft Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054086761","display_name":"Kun-Lin Tsai","orcid":"https://orcid.org/0000-0002-1317-6019"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kun-Lin Tsai","raw_affiliation_strings":["Department of Electrical Engineering, Tunghai University, Taichung /Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Tunghai University, Taichung /Taiwan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108639433","display_name":"Fang\u2212Yie Leu","orcid":null},"institutions":[{"id":"https://openalex.org/I169090423","display_name":"Tunghai University","ror":"https://ror.org/00zhvdn11","country_code":"TW","type":"education","lineage":["https://openalex.org/I169090423"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Fang-Yie Leu","raw_affiliation_strings":["Department of computer science, Tunghai University, Taichung, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of computer science, Tunghai University, Taichung, Taiwan","institution_ids":["https://openalex.org/I169090423"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059754609","display_name":"Shun\u2010Hung Tsai","orcid":"https://orcid.org/0000-0002-2423-3226"},"institutions":[{"id":"https://openalex.org/I118292597","display_name":"National Taipei University of Technology","ror":"https://ror.org/00cn92c09","country_code":"TW","type":"education","lineage":["https://openalex.org/I118292597"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Shun-Hung Tsai","raw_affiliation_strings":["Institute of Automation Technology, National Taipei University of Technology, Taipei, Taiwan#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute of Automation Technology, National Taipei University of Technology, Taipei, Taiwan#TAB#","institution_ids":["https://openalex.org/I118292597"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5054086761"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.1424,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.90240083,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"22","issue":"3","first_page":"423","last_page":"430"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9297014474868774},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7053747177124023},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6724854707717896},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5505152940750122},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3519552946090698}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9297014474868774},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7053747177124023},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6724854707717896},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5505152940750122},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3519552946090698}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/10798587.2015.1121615","is_oa":false,"landing_page_url":"https://doi.org/10.1080/10798587.2015.1121615","pdf_url":null,"source":{"id":"https://openalex.org/S40639465","display_name":"Intelligent Automation & Soft Computing","issn_l":"1079-8587","issn":["1079-8587","2326-005X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Automation &amp; Soft Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5099999904632568}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W70096886","https://openalex.org/W1501669749","https://openalex.org/W1503242180","https://openalex.org/W1682451491","https://openalex.org/W1969953346","https://openalex.org/W1982154823","https://openalex.org/W1992043559","https://openalex.org/W2013745554","https://openalex.org/W2019789301","https://openalex.org/W2048543827","https://openalex.org/W2048807460","https://openalex.org/W2054248938","https://openalex.org/W2069735920","https://openalex.org/W2087577197","https://openalex.org/W2103793330","https://openalex.org/W2122742911","https://openalex.org/W2157680879","https://openalex.org/W2162630521","https://openalex.org/W2397065307","https://openalex.org/W2510160977","https://openalex.org/W2584269677","https://openalex.org/W2594164382"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2130043461","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"AbstractData":[0],"encryption":[1],"is":[2,24,115,134],"an":[3,58,71],"effective":[4],"method":[5,104],"for":[6,52,70],"enterprises":[7],"and":[8,65,87,91,122],"government":[9],"offices":[10],"to":[11,74,95,118],"protect":[12],"their":[13,76],"important":[14,82,109],"information":[15],"from":[16,98,111],"being":[17,99,112],"lost":[18],"or":[19],"leaked,":[20],"especially":[21],"when":[22],"data":[23,36,110],"transmitted":[25],"on":[26],"the":[27,40,79,81,92,108],"Internet.":[28],"In":[29,78],"this":[30],"paper,":[31],"we":[32],"propose":[33],"a":[34,62,66,128],"novel":[35],"encryption/decryption":[37],"method,":[38],"named":[39],"Data":[41],"Encryption":[42],"Method":[43],"using":[44],"Environmental":[45],"Secret":[46],"Key":[47],"with":[48,57],"Server":[49],"Assistance":[50],"(DESK":[51],"short),":[53],"which":[54,133],"provides":[55],"users":[56],"environmental":[59],"key":[60,68],"of":[61],"trusted":[63,93],"computer":[64,94],"group":[67,73],"created":[69],"authorized":[72],"encrypt":[75],"data.":[77],"DESK,":[80],"parameters":[83],"are":[84],"separately":[85],"stored":[86],"hidden":[88],"in":[89,137],"server":[90],"avoid":[96],"them":[97],"cracked":[100],"easily.":[101],"The":[102,125],"proposed":[103],"not":[105],"only":[106],"protects":[107],"loss,":[113],"but":[114],"also":[116],"able":[117],"resist":[119],"replay":[120],"attack":[121],"eavesdropping":[123],"attack.":[124],"DESK":[126],"has":[127],"very":[129],"high":[130],"security":[131],"level,":[132],"practically":[135],"useful":[136],"homeland":[138],"security.":[139]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
