{"id":"https://openalex.org/W4389989206","doi":"https://doi.org/10.1109/icnp59255.2023.10355587","title":"SAFE: Secure and Flexible Encryption for Dynamic Team Communications in Disaster Management","display_name":"SAFE: Secure and Flexible Encryption for Dynamic Team Communications in Disaster Management","publication_year":2023,"publication_date":"2023-10-10","ids":{"openalex":"https://openalex.org/W4389989206","doi":"https://doi.org/10.1109/icnp59255.2023.10355587"},"language":"en","primary_location":{"id":"doi:10.1109/icnp59255.2023.10355587","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp59255.2023.10355587","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 31st International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088476617","display_name":"Hongmiao Yu","orcid":"https://orcid.org/0000-0001-9952-4370"},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hongmiao Yu","raw_affiliation_strings":["University of California Riverside,Department of Computer Science and Engineering,Riverside,USA","Department of Computer Science and Engineering, University of California Riverside, Riverside, USA"],"affiliations":[{"raw_affiliation_string":"University of California Riverside,Department of Computer Science and Engineering,Riverside,USA","institution_ids":["https://openalex.org/I103635307"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of California Riverside, Riverside, USA","institution_ids":["https://openalex.org/I103635307"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101923749","display_name":"Jiachen Chen","orcid":"https://orcid.org/0009-0008-1342-6314"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jiachen Chen","raw_affiliation_strings":["Rutgers University,WINLAB,North Brunswick,NJ,USA","WINLAB, Rutgers University, North Brunswick, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Rutgers University,WINLAB,North Brunswick,NJ,USA","institution_ids":["https://openalex.org/I102322142"]},{"raw_affiliation_string":"WINLAB, Rutgers University, North Brunswick, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053712998","display_name":"K. K. Ramakrishnan","orcid":"https://orcid.org/0000-0003-1849-5155"},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"K. K. Ramakrishnan","raw_affiliation_strings":["University of California Riverside,Department of Computer Science and Engineering,Riverside,USA","Department of Computer Science and Engineering, University of California Riverside, Riverside, USA"],"affiliations":[{"raw_affiliation_string":"University of California Riverside,Department of Computer Science and Engineering,Riverside,USA","institution_ids":["https://openalex.org/I103635307"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of California Riverside, Riverside, USA","institution_ids":["https://openalex.org/I103635307"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088476617"],"corresponding_institution_ids":["https://openalex.org/I103635307"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20678868,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8130661249160767},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.796673059463501},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.612216591835022},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.5803288221359253},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5571715235710144},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.5293125510215759},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.48240649700164795},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.47269773483276367},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4578586518764496},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4498264193534851},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.4332062304019928},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.41768383979797363},{"id":"https://openalex.org/keywords/broadcast-encryption","display_name":"Broadcast encryption","score":0.41477522253990173},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.38642987608909607}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8130661249160767},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.796673059463501},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.612216591835022},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.5803288221359253},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5571715235710144},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.5293125510215759},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.48240649700164795},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.47269773483276367},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4578586518764496},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4498264193534851},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.4332062304019928},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.41768383979797363},{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.41477522253990173},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.38642987608909607}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnp59255.2023.10355587","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp59255.2023.10355587","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 31st International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.8700000047683716}],"awards":[{"id":"https://openalex.org/G3600336292","display_name":null,"funder_award_id":"CNS-1818971","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4065109310","display_name":null,"funder_award_id":"70NANB17H188","funder_id":"https://openalex.org/F4320332178","funder_display_name":"National Institute of Standards and Technology"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306111","display_name":"U.S. Department of Commerce","ror":"https://ror.org/04chq2495"},{"id":"https://openalex.org/F4320332178","display_name":"National Institute of Standards and Technology","ror":"https://ror.org/05xpvk416"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1464223488","https://openalex.org/W1498316612","https://openalex.org/W1569083856","https://openalex.org/W1656028867","https://openalex.org/W1685337831","https://openalex.org/W1981293710","https://openalex.org/W1994386233","https://openalex.org/W2014952121","https://openalex.org/W2037515303","https://openalex.org/W2042539274","https://openalex.org/W2054251041","https://openalex.org/W2108072891","https://openalex.org/W2111995392","https://openalex.org/W2138001464","https://openalex.org/W2155903900","https://openalex.org/W2159339434","https://openalex.org/W2164337732","https://openalex.org/W2168903090","https://openalex.org/W2227653143","https://openalex.org/W2230451675","https://openalex.org/W2290007457","https://openalex.org/W2517701812","https://openalex.org/W2518578754","https://openalex.org/W2585171228","https://openalex.org/W2883773130","https://openalex.org/W2964129883","https://openalex.org/W2982617296","https://openalex.org/W3128187773","https://openalex.org/W4232836212","https://openalex.org/W4232913554","https://openalex.org/W4285258810"],"related_works":["https://openalex.org/W2361619969","https://openalex.org/W3118757263","https://openalex.org/W4308784203","https://openalex.org/W1025240641","https://openalex.org/W2370942914","https://openalex.org/W4309584611","https://openalex.org/W4360994575","https://openalex.org/W4379801595","https://openalex.org/W2380438667","https://openalex.org/W2765754337"],"abstract_inverted_index":{"Name-based":[0],"publish/subscribe":[1],"systems":[2],"using":[3],"Information-Centric":[4],"Networking":[5],"(ICN)":[6],"principles":[7],"can":[8,25,114],"provide":[9],"a":[10,27,45,52,89],"flexible":[11,53],"and":[12,35,42,54,85,152,160,166,184,195,198,209],"efficient":[13,55],"framework":[14,57],"for":[15,64,108,135,154,168,207],"communication":[16,67,172],"in":[17,30,157],"disaster":[18,31,158],"situations.":[19],"Efficient,":[20],"secure":[21,34],"dissemination":[22],"of":[23,75,182],"information":[24],"play":[26],"critical":[28],"role":[29],"management.":[32],"But,":[33],"authenticated":[36],"group":[37],"communications":[38],"that":[39,59,93,200],"maintain":[40],"confidentiality":[41],"integrity":[43],"remain":[44],"challenge.":[46],"In":[47],"this":[48],"paper,":[49],"we":[50,147],"design":[51,202],"encryption":[56,77,91,112,119,124,130,177],"SAFE":[58],"leverages":[60,81],"graph-based":[61],"naming":[62],"frameworks":[63],"providing":[65],"role-based":[66],"among":[68],"first":[69],"responders.":[70],"We":[71,127,174,186],"study":[72],"the":[73,79,82,95,105,109,132,162,188,204],"suitability":[74],"message-oriented":[76,129,145],"where":[78],"sender":[80],"name":[83,107],"hierarchy,":[84],"compare":[86],"it":[87],"with":[88,117,140],"key-oriented":[90],"scheme":[92],"requires":[94],"receiver":[96],"to":[97,101],"utilize":[98],"appropriate":[99],"keys":[100],"decrypt":[102],"based":[103],"on":[104,180],"publisher-targeted":[106],"message.":[110],"Both":[111],"schemas":[113,178],"be":[115],"built":[116,179],"attribute-based":[118],"(ABE)":[120],"or":[121],"public":[122],"key":[123,150,189],"(PKE)":[125],"implementations.":[126],"find":[128],"provides":[131],"needed":[133],"flexibility":[134,165],"dynamic":[136],"environments":[137,156],"when":[138],"communicating":[139],"members":[141],"changes":[142],"frequently.":[143],"With":[144],"encryption,":[146,194],"further":[148],"address":[149],"revocation":[151],"support":[153],"infrastructure-less":[155],"situations":[159],"consider":[161],"tradeoff":[163],"between":[164],"optimization":[167],"large":[169,208],"relatively":[170],"static":[171],"groups.":[173,212],"evaluate":[175],"both":[176],"top":[181],"ABE":[183],"PKE.":[185],"examine":[187],"generation":[190],"time,":[191,197],"ciphertext":[192],"length,":[193],"decryption":[196],"see":[199],"SAFE's":[201],"is":[203],"most":[205],"suitable":[206],"dynamically":[210],"changing":[211]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
