{"id":"https://openalex.org/W2890160856","doi":"https://doi.org/10.1109/cscwd.2018.8465203","title":"Intrusion-Resilient Undetachable Digital Signature for Mobile-Agent-Based Collaborative Business Systems","display_name":"Intrusion-Resilient Undetachable Digital Signature for Mobile-Agent-Based Collaborative Business Systems","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2890160856","doi":"https://doi.org/10.1109/cscwd.2018.8465203","mag":"2890160856"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd.2018.8465203","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd.2018.8465203","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design ((CSCWD))","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101908672","display_name":"Yang Shi","orcid":"https://orcid.org/0000-0003-3905-2257"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Shi","raw_affiliation_strings":["School of Software Engineering, Tongii University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Tongii University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113013294","display_name":"Jingwen Liang","orcid":"https://orcid.org/0009-0000-5984-138X"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingwen Liang","raw_affiliation_strings":["School of Software Engineering, Tongii University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Tongii University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076726941","display_name":"Jingxuan Han","orcid":null},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingxuan Han","raw_affiliation_strings":["School of Software Engineering, Tongii University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Tongii University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046580450","display_name":"Jiayao Gao","orcid":"https://orcid.org/0000-0002-8954-1668"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiayao Gao","raw_affiliation_strings":["School of Software Engineering, Tongii University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Tongii University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081896664","display_name":"Guoyue Xiong","orcid":null},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoyue Xiong","raw_affiliation_strings":["School of Economics and Management, Tongji University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Economics and Management, Tongji University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005634549","display_name":"Hongfei Fan","orcid":"https://orcid.org/0000-0002-0352-9730"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongfei Fan","raw_affiliation_strings":["School of Software Engineering, Tongii University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Tongii University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101908672"],"corresponding_institution_ids":["https://openalex.org/I116953780"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.11483972,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"401","last_page":"406"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.8364957571029663},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7204207181930542},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6259289979934692},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5230958461761475},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.48041394352912903},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4475458860397339},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4362903833389282},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.32575154304504395},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1362609565258026}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.8364957571029663},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7204207181930542},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6259289979934692},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5230958461761475},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.48041394352912903},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4475458860397339},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4362903833389282},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32575154304504395},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1362609565258026},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd.2018.8465203","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd.2018.8465203","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design ((CSCWD))","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1554705736","https://openalex.org/W1570296326","https://openalex.org/W1572559454","https://openalex.org/W1602560985","https://openalex.org/W1791023610","https://openalex.org/W1864767824","https://openalex.org/W1965191083","https://openalex.org/W1991609011","https://openalex.org/W1993806529","https://openalex.org/W2014239329","https://openalex.org/W2073853306","https://openalex.org/W2112739133","https://openalex.org/W2112914778","https://openalex.org/W2137882010","https://openalex.org/W2145498831","https://openalex.org/W2169194339","https://openalex.org/W2322277786","https://openalex.org/W2386425078","https://openalex.org/W2396511550","https://openalex.org/W2462335548","https://openalex.org/W2549696172","https://openalex.org/W2560201274","https://openalex.org/W2586920801","https://openalex.org/W6634172598","https://openalex.org/W6669057552","https://openalex.org/W6676604977","https://openalex.org/W6676698326","https://openalex.org/W7023647191"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2390009783","https://openalex.org/W4254602698","https://openalex.org/W2394461323","https://openalex.org/W2349441905","https://openalex.org/W2065457896","https://openalex.org/W2117112636","https://openalex.org/W2001981265"],"abstract_inverted_index":{"Mobile":[0],"agents":[1],"are":[2],"useful":[3],"in":[4],"collaborative":[5],"business":[6],"systems":[7],"due":[8],"to":[9,20,41,66,104,163],"their":[10,28],"mobility":[11],"and":[12,23,81,108,170,193],"autonomy,":[13],"which":[14],"can":[15,187],"roam":[16],"over":[17],"the":[18,49,68,76,89,93,106,114,121,126,133,139,151,159,165,171,198,202],"Internet":[19],"purchase":[21],"goods":[22],"services":[24],"on":[25,46,75,96,177],"behalf":[26,47],"of":[27,48,71,91,125,167,173,191,201],"owners.":[29],"However,":[30],"given":[31],"attacks":[32],"from":[33],"a":[34,39,44,189],"malicious":[35,83,178],"host,":[36,78],"it":[37],"is":[38,117,136],"challenge":[40],"securely":[42],"sign":[43],"contract":[45],"owner":[50],"(the":[51],"original":[52,127,160,174],"signer).":[53],"In":[54],"this":[55],"paper,":[56],"we":[57],"propose":[58],"an":[59],"intrusion-resilient":[60],"undetachable":[61],"digital":[62],"signature":[63],"(IR-UDS)":[64],"approach":[65],"mitigate":[67],"security":[69],"risk":[70,90],"signing":[72,94,123,153,168,175],"key":[73,124,176],"leakage":[74],"signer's":[77,161],"base":[79,115,134],"device,":[80],"potentially":[82],"remote":[84,97],"hosts,":[85],"as":[86,88,111,113],"well":[87],"misusing":[92],"algorithm":[95,169],"hosts.":[98,179],"An":[99],"attacker":[100],"will":[101],"be":[102,143],"unable":[103],"forge":[105],"past":[107,146],"future":[109,140],"signatures":[110,141,147],"long":[112],"device":[116,135],"secure,":[118],"even":[119],"if":[120],"current":[122],"signer":[128],"has":[129,155,182],"been":[130,156],"gained.":[131],"When":[132],"compromised,":[137],"although":[138],"could":[142],"forged,":[144],"all":[145],"remain":[148],"secure.":[149],"Furthermore,":[150],"encrypted":[152],"function":[154],"combined":[157],"with":[158],"requirement":[162],"prevent":[164],"misuse":[166],"exposure":[172],"Security":[180],"analysis":[181],"indicated":[183],"that":[184],"our":[185],"scheme":[186],"defeat":[188],"variety":[190],"attacks,":[192],"experimental":[194],"evaluations":[195],"have":[196],"demonstrated":[197],"good":[199],"performance":[200],"scheme.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
