{"id":"https://openalex.org/W4404030686","doi":"https://doi.org/10.1109/icccnt61001.2024.10724648","title":"Retracted: Quantifying the Benefits of Verifiable Security Schemes in Communications Software Design","display_name":"Retracted: Quantifying the Benefits of Verifiable Security Schemes in Communications Software Design","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404030686","doi":"https://doi.org/10.1109/icccnt61001.2024.10724648"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10724648","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10724648","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093035081","display_name":"Lakshya Swarup","orcid":"https://orcid.org/0009-0006-3351-5248"},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Lakshya Swarup","raw_affiliation_strings":["Chitkara University,Chitkara Centre for Research and Development,Himachal Pradesh,India,174103"],"affiliations":[{"raw_affiliation_string":"Chitkara University,Chitkara Centre for Research and Development,Himachal Pradesh,India,174103","institution_ids":["https://openalex.org/I74319210"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042601840","display_name":"Richa Tiwari","orcid":null},"institutions":[{"id":"https://openalex.org/I106826634","display_name":"Jain University","ror":"https://ror.org/01cnqpt53","country_code":"IN","type":"education","lineage":["https://openalex.org/I106826634"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Richa Tiwari","raw_affiliation_strings":["JAIN (Deemed to be University),School of Mangement - UG Management,Bangalore,Karnataka"],"affiliations":[{"raw_affiliation_string":"JAIN (Deemed to be University),School of Mangement - UG Management,Bangalore,Karnataka","institution_ids":["https://openalex.org/I106826634"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093949466","display_name":"Dattatraya Babanrao Nalawade","orcid":"https://orcid.org/0000-0002-4673-0653"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dattatraya Babanrao Nalawade","raw_affiliation_strings":["Vishwakarma Institute of Technology,Pune"],"affiliations":[{"raw_affiliation_string":"Vishwakarma Institute of Technology,Pune","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013623220","display_name":"N. Thangarasu","orcid":"https://orcid.org/0000-0001-6638-1262"},"institutions":[{"id":"https://openalex.org/I65220239","display_name":"Karpagam Academy of Higher Education","ror":"https://ror.org/00ssvzv66","country_code":"IN","type":"education","lineage":["https://openalex.org/I65220239"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"N. Thangarasu","raw_affiliation_strings":["Karpagam Academy of Higher Education,Department of Computer Science,Coimbatore,641021"],"affiliations":[{"raw_affiliation_string":"Karpagam Academy of Higher Education,Department of Computer Science,Coimbatore,641021","institution_ids":["https://openalex.org/I65220239"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102623177","display_name":"Rajat Saini","orcid":null},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rajat Saini","raw_affiliation_strings":["Chitkara University,Centre of Research Impact and Outcome,Rajpura,Punjab,India,140417"],"affiliations":[{"raw_affiliation_string":"Chitkara University,Centre of Research Impact and Outcome,Rajpura,Punjab,India,140417","institution_ids":["https://openalex.org/I74319210"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088885599","display_name":"A Keerthika","orcid":null},"institutions":[{"id":"https://openalex.org/I15517640","display_name":"Shri Venkateshwara University","ror":"https://ror.org/00xh8va68","country_code":"IN","type":"education","lineage":["https://openalex.org/I15517640"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"A Keerthika","raw_affiliation_strings":["Prince Shri Venkateshwara Padmavathy Engineering College,Department of Computer Science and Engineering,Chennai,127"],"affiliations":[{"raw_affiliation_string":"Prince Shri Venkateshwara Padmavathy Engineering College,Department of Computer Science and Engineering,Chennai,127","institution_ids":["https://openalex.org/I15517640"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5093035081"],"corresponding_institution_ids":["https://openalex.org/I74319210"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30614927,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":true,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9793000221252441,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9793000221252441,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7927155494689941},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7251046895980835},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.630867063999176},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5187783241271973},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4898971915245056},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2607220709323883},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.16647323966026306},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13047775626182556},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.060504138469696045}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7927155494689941},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7251046895980835},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.630867063999176},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5187783241271973},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4898971915245056},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2607220709323883},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.16647323966026306},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13047775626182556},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.060504138469696045},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10724648","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10724648","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2944992978","https://openalex.org/W4292495570","https://openalex.org/W4312238145","https://openalex.org/W4319599305","https://openalex.org/W4387308342","https://openalex.org/W4387367716","https://openalex.org/W4388095552","https://openalex.org/W4389445762","https://openalex.org/W4389728172","https://openalex.org/W4390840114","https://openalex.org/W4391278444","https://openalex.org/W4391540795"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2072918937","https://openalex.org/W2365629437","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2350372928"],"abstract_inverted_index":{"The":[0,68,79,154],"increasing":[1],"use":[2],"of":[3,31,41,60,81,86,107,118,125,138,150,161,199],"communications":[4,34,65],"software":[5,35,66,203],"programs":[6],"for":[7,33,46,56,131,185],"replacing":[8],"sensitive":[9],"data":[10],"requires":[11],"cozy":[12],"designs":[13,177],"that":[14],"prevent":[15],"malicious":[16],"actors":[17],"from":[18],"viewing":[19],"or":[20],"tampering":[21],"with":[22],"data.":[23],"Verifiable":[24],"security":[25,62],"schemes":[26,43,63],"offer":[27],"an":[28],"additional":[29],"layer":[30],"assurance":[32],"program":[36,204],"designs;":[37],"quantifying":[38,57],"the":[39,58,100,136,148,151,181,195,200],"benefits":[40],"such":[42],"is":[44,97,114,144],"crucial":[45],"assessing":[47],"their":[48,186],"practicality.":[49],"This":[50,188],"work":[51],"proposes":[52],"a":[53,158],"prevalent":[54],"framework":[55,69,156],"blessings":[59],"verifiable":[61,162],"in":[64,190],"layout.":[67,205],"evaluates":[70],"three":[71],"factors:":[72],"facts":[73,93],"leakage,":[74],"overhead":[75],"price,":[76],"and":[77,89,102,109,123,129,178,197],"reliability.":[78],"usage":[80],"information":[82],"theoretical":[83],"metrics":[84],"inclusive":[85],"Shannon":[87],"entropy":[88],"mutual":[90],"records":[91],"quantifies":[92],"leakage.":[94],"Overhead":[95],"value":[96],"evaluated":[98],"at":[99,120],"protocol":[101],"machine":[103],"tiers,":[104],"taking":[105],"account":[106],"metadata":[108],"associated":[110],"computational":[111],"prices.":[112],"Reliability":[113],"classified":[115],"by":[116],"way":[117],"looking":[119],"device":[121,176],"disruption":[122],"denial":[124],"carrier":[126],"attack":[127],"risks":[128],"is,":[130],"this":[132],"reason,":[133],"calculated":[134],"on":[135],"grounds":[137],"gadget":[139],"availability.":[140],"A":[141],"simulation-based":[142],"evaluation":[143],"supplied":[145],"to":[146,168,193],"demonstrate":[147],"effectiveness":[149],"proposed":[152,155],"framework.":[153],"offers":[157],"complete":[159],"assessment":[160],"protection":[163],"schemes,":[164],"permitting":[165],"selection":[166],"makers":[167],"greater":[169],"as":[170],"it":[171],"should":[172],"be":[173],"compare":[174],"extraordinary":[175],"pick":[179],"out":[180],"most":[182],"suitable":[183],"one":[184],"utility.":[187],"will,":[189],"turn,":[191],"contribute":[192],"improving":[194],"safety":[196],"robustness":[198],"verbal":[201],"exchange":[202]},"counts_by_year":[],"updated_date":"2026-03-08T06:56:09.383167","created_date":"2025-10-10T00:00:00"}
