{"id":"https://openalex.org/W2031251414","doi":"https://doi.org/10.1108/03684921111169468","title":"Cryptography","display_name":"Cryptography","publication_year":2011,"publication_date":"2011-10-18","ids":{"openalex":"https://openalex.org/W2031251414","doi":"https://doi.org/10.1108/03684921111169468","mag":"2031251414"},"language":"en","primary_location":{"id":"doi:10.1108/03684921111169468","is_oa":false,"landing_page_url":"https://doi.org/10.1108/03684921111169468","pdf_url":null,"source":{"id":"https://openalex.org/S168682784","display_name":"Kybernetes","issn_l":"0368-492X","issn":["0368-492X","1758-7883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Kybernetes","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055935657","display_name":"Bhushan Kapoor","orcid":"https://orcid.org/0000-0003-3086-8209"},"institutions":[{"id":"https://openalex.org/I142934699","display_name":"California State University, Fullerton","ror":"https://ror.org/02avqqw26","country_code":"US","type":"education","lineage":["https://openalex.org/I142934699"]},{"id":"https://openalex.org/I1334627681","display_name":"Jet Propulsion Laboratory","ror":"https://ror.org/027k65916","country_code":"US","type":"facility","lineage":["https://openalex.org/I122411786","https://openalex.org/I1334627681","https://openalex.org/I4210124779"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Bhushan Kapoor","raw_affiliation_strings":["California State University, Fullerton, California, USA and Jet Propulsion Laboratory, California Institute of Technology, Pasadena, California, USA","(California State University, Fullerton, California, USA and Jet Propulsion Laboratory, California Institute of Technology, Pasadena, California, USA)"],"affiliations":[{"raw_affiliation_string":"California State University, Fullerton, California, USA and Jet Propulsion Laboratory, California Institute of Technology, Pasadena, California, USA","institution_ids":["https://openalex.org/I1334627681","https://openalex.org/I142934699"]},{"raw_affiliation_string":"(California State University, Fullerton, California, USA and Jet Propulsion Laboratory, California Institute of Technology, Pasadena, California, USA)","institution_ids":["https://openalex.org/I1334627681","https://openalex.org/I142934699"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005721258","display_name":"Pramod Pandya","orcid":null},"institutions":[{"id":"https://openalex.org/I142934699","display_name":"California State University, Fullerton","ror":"https://ror.org/02avqqw26","country_code":"US","type":"education","lineage":["https://openalex.org/I142934699"]},{"id":"https://openalex.org/I1334627681","display_name":"Jet Propulsion Laboratory","ror":"https://ror.org/027k65916","country_code":"US","type":"facility","lineage":["https://openalex.org/I122411786","https://openalex.org/I1334627681","https://openalex.org/I4210124779"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pramod Pandya","raw_affiliation_strings":["California State University, Fullerton, California, USA and Jet Propulsion Laboratory, California Institute of Technology, Pasadena, California, USA"],"affiliations":[{"raw_affiliation_string":"California State University, Fullerton, California, USA and Jet Propulsion Laboratory, California Institute of Technology, Pasadena, California, USA","institution_ids":["https://openalex.org/I1334627681","https://openalex.org/I142934699"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114252671","display_name":"Joseph S. Sherif","orcid":null},"institutions":[{"id":"https://openalex.org/I142934699","display_name":"California State University, Fullerton","ror":"https://ror.org/02avqqw26","country_code":"US","type":"education","lineage":["https://openalex.org/I142934699"]},{"id":"https://openalex.org/I1334627681","display_name":"Jet Propulsion Laboratory","ror":"https://ror.org/027k65916","country_code":"US","type":"facility","lineage":["https://openalex.org/I122411786","https://openalex.org/I1334627681","https://openalex.org/I4210124779"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joseph S. Sherif","raw_affiliation_strings":["California State University, Fullerton, California, USA and Jet Propulsion Laboratory, California Institute of Technology, Pasadena, California, USA"],"affiliations":[{"raw_affiliation_string":"California State University, Fullerton, California, USA and Jet Propulsion Laboratory, California Institute of Technology, Pasadena, California, USA","institution_ids":["https://openalex.org/I1334627681","https://openalex.org/I142934699"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055935657"],"corresponding_institution_ids":["https://openalex.org/I1334627681","https://openalex.org/I142934699"],"apc_list":null,"apc_paid":null,"fwci":0.5151,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.67772652,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"40","issue":"9/10","first_page":"1422","last_page":"1439"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7410632371902466},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7156503200531006},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5682408213615417},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4513217806816101},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4297518730163574}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7410632371902466},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7156503200531006},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5682408213615417},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4513217806816101},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4297518730163574}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/03684921111169468","is_oa":false,"landing_page_url":"https://doi.org/10.1108/03684921111169468","pdf_url":null,"source":{"id":"https://openalex.org/S168682784","display_name":"Kybernetes","issn_l":"0368-492X","issn":["0368-492X","1758-7883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Kybernetes","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W329998640","https://openalex.org/W562235385","https://openalex.org/W1565988340","https://openalex.org/W2099170260","https://openalex.org/W2128665430","https://openalex.org/W2171067798","https://openalex.org/W2242304307","https://openalex.org/W2281564060","https://openalex.org/W2295814488","https://openalex.org/W2340406763","https://openalex.org/W3144627111"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2060145807","https://openalex.org/W2912135041","https://openalex.org/W4248806346"],"abstract_inverted_index":{"Purpose":[0],"This":[1,178],"paper":[2,40,179],"seeks":[3],"to":[4,11,18,23,32,74,121,197,214],"advance":[5],"research":[6,97],"and":[7,29,31,48,54,60,88,113,150,154,169,199,219,233],"strategies":[8],"that":[9,67,99,146,148],"lead":[10,120],"a":[12],"heightened":[13],"awareness":[14],"of":[15,27,45,95,102,125,182,187,203,207,211,221,225],"the":[16,25,42,138,166,171,174,183,222],"need":[17],"protect":[19,33],"data":[20,28,115,167,189],"from":[21,35,173],"disclosure,":[22],"guarantee":[24],"authenticity":[26],"messages,":[30],"systems":[34],"network\u2010based":[36],"attacks.":[37],"Design/methodology/approach":[38],"The":[39,64,93],"introduces":[41],"necessary":[43],"mathematics":[44],"cryptography:":[46],"integer":[47],"modular":[49],"arithmetic,":[50],"linear":[51],"congruence,":[52],"Euclidean":[53,56],"extended":[55],"algorithm,":[57],"Fermat's":[58],"theorem,":[59],"Elliptic":[61],"curve.":[62],"Findings":[63],"results":[65,94],"indicate":[66],"encryption":[68],"has":[69],"expanded":[70],"beyond":[71],"confidentiality":[72],"concerns":[73],"include":[75],"techniques":[76],"for":[77],"message":[78],"integrity":[79],"checking,":[80],"sender/receiver":[81],"identity":[82],"authentication,":[83,227],"digital":[84],"signatures,":[85],"interactive":[86],"proofs,":[87],"secure":[89],"computation.":[90],"Practical":[91],"implications":[92],"this":[96],"show":[98],"all":[100],"forms":[101],"e\u2010commerce":[103],"activities":[104],"such":[105,216],"as":[106,130,132,217],"online":[107],"credit":[108],"card":[109],"processing,":[110,116],"purchasing":[111],"stocks,":[112],"banking":[114],"if":[117],"compromised,":[118],"would":[119],"businesses":[122],"losing":[123,133],"billions":[124],"dollars":[126],"in":[127,135],"lost":[128],"revenues":[129],"well":[131],"confidence":[134],"e\u2010commerce.":[136],"In":[137],"last":[139],"few":[140],"years,":[141],"it":[142],"had":[143],"been":[144],"reported":[145],"organizations":[147],"store":[149],"maintain":[151],"customers'":[152],"private":[153],"confidential":[155],"records":[156,172],"were":[157],"compromised":[158],"on":[159],"many":[160],"occasions":[161],"by":[162],"hackers":[163],"breaking":[164],"into":[165],"networks":[168,215],"stealing":[170],"storage":[175],"media.":[176],"Originality/value":[177],"tackles":[180],"one":[181],"most":[184],"critical":[185],"problems":[186,192],"securing":[188],"networks.":[190],"Security":[191],"arise":[193],"among":[194],"other":[195],"things":[196],"resource":[198],"workload":[200],"sharing;":[201],"complexity":[202],"interconnected":[204],"networks;":[205,212],"authentication":[206],"users;":[208],"fast":[209],"expandability":[210],"threats":[213],"wiretapping":[218],"violations":[220],"seven":[223],"pillars":[224],"security:":[226],"authorization,":[228],"privacy,":[229],"integrity,":[230],"non\u2010repudiation,":[231],"availability,":[232],"audit.":[234]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
