{"id":"https://openalex.org/W2971459948","doi":"https://doi.org/10.1109/ccoms.2019.8821757","title":"Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process","display_name":"Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process","publication_year":2019,"publication_date":"2019-02-01","ids":{"openalex":"https://openalex.org/W2971459948","doi":"https://doi.org/10.1109/ccoms.2019.8821757","mag":"2971459948"},"language":"en","primary_location":{"id":"doi:10.1109/ccoms.2019.8821757","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccoms.2019.8821757","pdf_url":null,"source":{"id":"https://openalex.org/S4306498485","display_name":"2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060904302","display_name":"Junji Qiu","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junji Qiu","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, BUPT, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, BUPT, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039044492","display_name":"Xianglin Lu","orcid":"https://orcid.org/0000-0002-8822-5663"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianglin Lu","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, BUPT, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, BUPT, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101503754","display_name":"Jiayi Lin","orcid":"https://orcid.org/0000-0003-2324-4908"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiayi Lin","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, BUPT, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, BUPT, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060904302"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.3677,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.65445545,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"125","issue":null,"first_page":"208","last_page":"212"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7786639332771301},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.721638023853302},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.6790302991867065},{"id":"https://openalex.org/keywords/security-of-cryptographic-hash-functions","display_name":"Security of cryptographic hash functions","score":0.6600191593170166},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5955100059509277},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5423075556755066},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.5050624012947083},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5028120875358582},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.461839884519577},{"id":"https://openalex.org/keywords/secure-hash-algorithm","display_name":"Secure Hash Algorithm","score":0.4207085967063904},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3791552186012268},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3530896306037903},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2778448462486267},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.18921101093292236}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7786639332771301},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.721638023853302},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6790302991867065},{"id":"https://openalex.org/C165511393","wikidata":"https://www.wikidata.org/wiki/Q7252276","display_name":"Security of cryptographic hash functions","level":5,"score":0.6600191593170166},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5955100059509277},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5423075556755066},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.5050624012947083},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5028120875358582},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.461839884519577},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.4207085967063904},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3791552186012268},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3530896306037903},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2778448462486267},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.18921101093292236}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccoms.2019.8821757","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccoms.2019.8821757","pdf_url":null,"source":{"id":"https://openalex.org/S4306498485","display_name":"2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.5799999833106995,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W96267788","https://openalex.org/W1496767193","https://openalex.org/W1595267951","https://openalex.org/W1974114726","https://openalex.org/W2593755274","https://openalex.org/W2725183405","https://openalex.org/W6647965151"],"related_works":["https://openalex.org/W4289821808","https://openalex.org/W1773180899","https://openalex.org/W275246813","https://openalex.org/W2613366409","https://openalex.org/W4387225862","https://openalex.org/W2006897953","https://openalex.org/W2227130482","https://openalex.org/W2141288318","https://openalex.org/W1590262417","https://openalex.org/W3196739495"],"abstract_inverted_index":{"As":[0],"a":[1,54,87],"collection":[2],"of":[3,11,16,30,34,41,47,68,102,106,129,135,192],"innovative":[4],"technologies,":[5],"blockchain":[6,82,184],"has":[7,200],"solved":[8],"the":[9,25,28,39,58,62,69,75,81,99,103,111,126,133,157,175,182,188,193],"problem":[10],"reliable":[12],"transmission":[13],"and":[14,44,66,97,120,140,143,167,190],"exchange":[15],"information":[17],"on":[18],"untrusted":[19],"networks.":[20],"The":[21,50],"underlying":[22],"implementation":[23],"is":[24,171],"basis":[26],"for":[27,38,80,161],"reliability":[29,189],"blockchain,":[31,59,112],"which":[32,60],"consists":[33],"various":[35],"cryptographic":[36,51,78,107,115,118,130,148,179],"algorithms":[37,108,119,131,149,180],"use":[40],"identity":[42],"authentication":[43],"privacy":[45],"protection":[46],"distributed":[48],"ledgers.":[49],"algorithm":[52,79,194],"plays":[53],"vital":[55],"role":[56],"in":[57,110,181,197],"guarantees":[61],"confidentiality,":[63],"integrity,":[64],"verifiability":[65],"non-repudiation":[67],"blockchain.":[70],"In":[71],"order":[72],"to":[73,95,155],"get":[74],"most":[76,158,176],"suitable":[77,159],"system,":[83],"this":[84,198],"paper":[85,124,199],"proposed":[86],"method":[88],"using":[89],"Fuzzy":[90],"Analytic":[91],"Hierarchy":[92],"Process":[93],"(FAHP)":[94],"evaluate":[96],"score":[98],"comprehensive":[100],"performance":[101,127],"three":[104,147],"types":[105],"applied":[109],"including":[113],"symmetric":[114],"algorithms,":[116],"asymmetric":[117],"hash":[121],"algorithms.":[122],"This":[123,169],"weighs":[125],"differences":[128],"considering":[132],"aspects":[134],"security,":[136],"operational":[137],"efficiency,":[138],"language":[139],"hardware":[141],"support":[142],"resource":[144],"consumption.":[145],"Finally,":[146],"are":[150,153],"selected":[151],"that":[152],"considered":[154],"be":[156],"ones":[160],"block-chain":[162],"systems,":[163],"namely":[164],"ECDSA,":[165],"sha256":[166],"AES.":[168],"result":[170],"also":[172],"consistent":[173],"with":[174],"commonly":[177],"used":[178],"current":[183],"development":[185],"direction.":[186],"Therefore,":[187],"practicability":[191],"evaluation":[195],"pro-posed":[196],"been":[201],"proved.":[202]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
