{"id":"https://openalex.org/W1505439545","doi":"https://doi.org/10.1109/icsmc.2004.1398449","title":"A method for mediator identification using queued history of encrypted user information in an incentive attached peer to peer electronic coupon system","display_name":"A method for mediator identification using queued history of encrypted user information in an incentive attached peer to peer electronic coupon system","publication_year":2005,"publication_date":"2005-04-06","ids":{"openalex":"https://openalex.org/W1505439545","doi":"https://doi.org/10.1109/icsmc.2004.1398449","mag":"1505439545"},"language":"en","primary_location":{"id":"doi:10.1109/icsmc.2004.1398449","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsmc.2004.1398449","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012189032","display_name":"Taiki Shojima","orcid":null},"institutions":[{"id":"https://openalex.org/I98285908","display_name":"The University of Osaka","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"T. Shojima","raw_affiliation_strings":["Graduate School of Information Science and Technology, Suita, Osaka, Japan","Graduate School of Information Science and Technology, Osaka Univ"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Science and Technology, Suita, Osaka, Japan","institution_ids":[]},{"raw_affiliation_string":"Graduate School of Information Science and Technology, Osaka Univ","institution_ids":["https://openalex.org/I98285908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085512444","display_name":"Y. Ikkai","orcid":null},"institutions":[{"id":"https://openalex.org/I98285908","display_name":"The University of Osaka","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Y. Ikkai","raw_affiliation_strings":["Graduate School of Information Science and Technology, Suita, Osaka, Japan","Graduate School of Information Science and Technology, Osaka Univ"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Science and Technology, Suita, Osaka, Japan","institution_ids":[]},{"raw_affiliation_string":"Graduate School of Information Science and Technology, Osaka Univ","institution_ids":["https://openalex.org/I98285908"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086014981","display_name":"Norihisa Komoda","orcid":null},"institutions":[{"id":"https://openalex.org/I98285908","display_name":"The University of Osaka","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"N. Komoda","raw_affiliation_strings":["Graduate School of Information Science and Technology, Suita, Osaka, Japan","Graduate School of Information Science and Technology, Osaka Univ"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Science and Technology, Suita, Osaka, Japan","institution_ids":[]},{"raw_affiliation_string":"Graduate School of Information Science and Technology, Osaka Univ","institution_ids":["https://openalex.org/I98285908"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012189032"],"corresponding_institution_ids":["https://openalex.org/I98285908"],"apc_list":null,"apc_paid":null,"fwci":0.2937,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.56114916,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"1","issue":null,"first_page":"1086","last_page":"1091"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7451328039169312},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6772314310073853},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5895829796791077},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.545461893081665},{"id":"https://openalex.org/keywords/coupon","display_name":"Coupon","score":0.5359365344047546},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.5254893898963928},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4632403254508972},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4296165704727173},{"id":"https://openalex.org/keywords/queue","display_name":"Queue","score":0.4187946319580078}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7451328039169312},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6772314310073853},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5895829796791077},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.545461893081665},{"id":"https://openalex.org/C2779307704","wikidata":"https://www.wikidata.org/wiki/Q11794832","display_name":"Coupon","level":2,"score":0.5359365344047546},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.5254893898963928},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4632403254508972},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4296165704727173},{"id":"https://openalex.org/C160403385","wikidata":"https://www.wikidata.org/wiki/Q220543","display_name":"Queue","level":2,"score":0.4187946319580078},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsmc.2004.1398449","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsmc.2004.1398449","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.4399999976158142,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W12317253","https://openalex.org/W4238250258","https://openalex.org/W4248896697","https://openalex.org/W6600476445"],"related_works":["https://openalex.org/W2974050152","https://openalex.org/W1481018110","https://openalex.org/W3150641959","https://openalex.org/W2083573183","https://openalex.org/W2200893828","https://openalex.org/W2606802280","https://openalex.org/W2285295461","https://openalex.org/W1537782856","https://openalex.org/W2106608244","https://openalex.org/W3121399306"],"abstract_inverted_index":{"An":[0],"incentive":[1],"attached":[2],"peer":[3,5],"to":[4,17,23,29,95,124],"(P2P)":[6],"electronic":[7],"coupon":[8],"system":[9,41],"is":[10,42,63,93,122,137],"proposed":[11,135],"in":[12,36,65,106],"which":[13],"users":[14,19,113],"forward":[15],"e-coupons":[16],"potential":[18],"by":[20,33,139],"providing":[21],"incentives":[22],"mediators.":[24],"A":[25],"service":[26],"provider":[27],"needs":[28],"acquire":[30],"distribution":[31,55,61],"history":[32,62],"recording":[34,87],"it":[35],"the":[37,54,72,90,96,107,134],"e-coupons,":[38],"since":[39],"this":[40],"intended":[43],"for":[44],"pure":[45],"P2P":[46],"communication.":[47],"This":[48],"causes":[49],"problems":[50],"of":[51,76,102,133],"dishonestly":[52],"altering":[53],"history.":[56],"To":[57],"solve":[58],"such":[59],"problems,":[60],"realized":[64],"a":[66,79,83,99,103,118],"queue":[67,97,121],"structure.":[68],"Each":[69],"element":[70],"at":[71],"initial":[73],"state":[74],"consists":[75],"dummy":[77,104],"UIDs,":[78],"secret":[80],"key,":[81],"and":[82],"digital":[84,126],"signature.":[85],"In":[86],"one's":[88],"UID,":[89],"encrypted":[91],"UID":[92,105],"enqueued":[94],"with":[98],"hash":[100],"value":[101],"dequeued":[108],"element,":[109],"so":[110],"that":[111],"malicious":[112],"cannot":[114],"impersonate":[115],"it.":[116],"Additionally,":[117],"public":[119],"key":[120],"applied":[123],"generate":[125],"signatures":[127],"on":[128],"mobile":[129],"devices.":[130],"The":[131],"availability":[132],"method":[136],"evaluated":[138],"quantifying":[140],"risk":[141],"reduction":[142],"effects":[143],"using":[144],"fault":[145],"tree":[146],"analysis":[147],"(FTA).":[148]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
