{"id":"https://openalex.org/W2091899647","doi":"https://doi.org/10.1109/icspcs.2011.6140862","title":"Error Correcting and Weighted Noise Tolerant Message Authentication Codes","display_name":"Error Correcting and Weighted Noise Tolerant Message Authentication Codes","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W2091899647","doi":"https://doi.org/10.1109/icspcs.2011.6140862","mag":"2091899647"},"language":"en","primary_location":{"id":"doi:10.1109/icspcs.2011.6140862","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icspcs.2011.6140862","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 5th International Conference on Signal Processing and Communication Systems (ICSPCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018964045","display_name":"Obaid Ur\u2010Rehman","orcid":"https://orcid.org/0000-0001-7884-8341"},"institutions":[{"id":"https://openalex.org/I206895457","display_name":"University of Siegen","ror":"https://ror.org/02azyry73","country_code":"DE","type":"education","lineage":["https://openalex.org/I206895457"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Obaid Ur-Rehman","raw_affiliation_strings":["Chair for Data Communications Systems, University of Siegen, Siegen, Germany","Data Communications Systems, University of Siegen, Hoelderlinstrasse 3, 57076, Germany"],"affiliations":[{"raw_affiliation_string":"Chair for Data Communications Systems, University of Siegen, Siegen, Germany","institution_ids":["https://openalex.org/I206895457"]},{"raw_affiliation_string":"Data Communications Systems, University of Siegen, Hoelderlinstrasse 3, 57076, Germany","institution_ids":["https://openalex.org/I206895457"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111431315","display_name":"Nata\u0161a \u017divi\u0107","orcid":null},"institutions":[{"id":"https://openalex.org/I206895457","display_name":"University of Siegen","ror":"https://ror.org/02azyry73","country_code":"DE","type":"education","lineage":["https://openalex.org/I206895457"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Natasa Zivic","raw_affiliation_strings":["Chair for Data Communications Systems, University of Siegen, Siegen, Germany","Data Communications Systems, University of Siegen, Hoelderlinstrasse 3, 57076, Germany"],"affiliations":[{"raw_affiliation_string":"Chair for Data Communications Systems, University of Siegen, Siegen, Germany","institution_ids":["https://openalex.org/I206895457"]},{"raw_affiliation_string":"Data Communications Systems, University of Siegen, Hoelderlinstrasse 3, 57076, Germany","institution_ids":["https://openalex.org/I206895457"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071616341","display_name":"Seyed Amir Hossein Tabatabaei","orcid":"https://orcid.org/0000-0002-1510-5783"},"institutions":[{"id":"https://openalex.org/I206895457","display_name":"University of Siegen","ror":"https://ror.org/02azyry73","country_code":"DE","type":"education","lineage":["https://openalex.org/I206895457"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"S. Amir Hossein A. E. Tabatabaei","raw_affiliation_strings":["Chair for Data Communications Systems, University of Siegen, Siegen, Germany","Data Communications Systems, University of Siegen, Hoelderlinstrasse 3, 57076, Germany"],"affiliations":[{"raw_affiliation_string":"Chair for Data Communications Systems, University of Siegen, Siegen, Germany","institution_ids":["https://openalex.org/I206895457"]},{"raw_affiliation_string":"Data Communications Systems, University of Siegen, Hoelderlinstrasse 3, 57076, Germany","institution_ids":["https://openalex.org/I206895457"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021417034","display_name":"Christoph Ruland","orcid":"https://orcid.org/0000-0002-4518-8735"},"institutions":[{"id":"https://openalex.org/I206895457","display_name":"University of Siegen","ror":"https://ror.org/02azyry73","country_code":"DE","type":"education","lineage":["https://openalex.org/I206895457"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christoph Ruland","raw_affiliation_strings":["Chair for Data Communications Systems, University of Siegen, Siegen, Germany","Data Communications Systems, University of Siegen, Hoelderlinstrasse 3, 57076, Germany"],"affiliations":[{"raw_affiliation_string":"Chair for Data Communications Systems, University of Siegen, Siegen, Germany","institution_ids":["https://openalex.org/I206895457"]},{"raw_affiliation_string":"Data Communications Systems, University of Siegen, Hoelderlinstrasse 3, 57076, Germany","institution_ids":["https://openalex.org/I206895457"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5018964045"],"corresponding_institution_ids":["https://openalex.org/I206895457"],"apc_list":null,"apc_paid":null,"fwci":2.1379,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.88915347,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8359667062759399},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.8347820043563843},{"id":"https://openalex.org/keywords/error-detection-and-correction","display_name":"Error detection and correction","score":0.6890710592269897},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.64714515209198},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.6424924731254578},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.6121416687965393},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5238552093505859},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5104814767837524},{"id":"https://openalex.org/keywords/message-passing","display_name":"Message passing","score":0.4195369482040405},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.41493451595306396},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4115045964717865},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3294724225997925},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.26034796237945557},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.23497194051742554},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.2066294252872467},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.18847784399986267},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1769287884235382},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09459331631660461},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09410840272903442}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8359667062759399},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.8347820043563843},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.6890710592269897},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.64714515209198},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.6424924731254578},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.6121416687965393},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5238552093505859},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5104814767837524},{"id":"https://openalex.org/C854659","wikidata":"https://www.wikidata.org/wiki/Q1859284","display_name":"Message passing","level":2,"score":0.4195369482040405},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.41493451595306396},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4115045964717865},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3294724225997925},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.26034796237945557},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.23497194051742554},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.2066294252872467},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.18847784399986267},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1769287884235382},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09459331631660461},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09410840272903442},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icspcs.2011.6140862","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icspcs.2011.6140862","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 5th International Conference on Signal Processing and Communication Systems (ICSPCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1577093677","https://openalex.org/W1636565598","https://openalex.org/W2023355697","https://openalex.org/W2107040324","https://openalex.org/W2107165730","https://openalex.org/W2138779125","https://openalex.org/W2141409546","https://openalex.org/W2151834701","https://openalex.org/W2184726657","https://openalex.org/W2751862591","https://openalex.org/W2753933954","https://openalex.org/W2942537621","https://openalex.org/W6676436548","https://openalex.org/W6682125947"],"related_works":["https://openalex.org/W2166668397","https://openalex.org/W2116285675","https://openalex.org/W1533309011","https://openalex.org/W3048245612","https://openalex.org/W1980599209","https://openalex.org/W4220718301","https://openalex.org/W1555715488","https://openalex.org/W1991172351","https://openalex.org/W1510656496","https://openalex.org/W2061637199"],"abstract_inverted_index":{"Message":[0,48],"Authentication":[1,49],"Codes":[2],"(MACs)":[3],"are":[4,162,182],"very":[5],"sensitive":[6],"to":[7,128],"any":[8],"modification":[9],"in":[10,23,39,184],"the":[11,24,71,98,110,129,139,147,171,177,185],"message.":[12,25],"The":[13,143],"verification":[14],"fails":[15],"even":[16],"if":[17],"there":[18,75],"is":[19,52,61,76],"a":[20,34,89,105],"slight":[21],"change":[22],"However,":[26],"special":[27],"algorithms":[28,173],"have":[29],"been":[30],"introduced":[31],"that":[32],"tolerate":[33],"small":[35],"amount":[36],"of":[37,55,95,107,121,131,168,170],"noise":[38,56],"messages":[40],"as":[41,92,174,176],"required":[42],"by":[43,84],"some":[44,152],"applications.":[45],"Noise":[46],"Tolerant":[47],"Code":[50],"(NTMAC)":[51],"an":[53,93],"example":[54],"tolerant":[57],"authenticator":[58],"algorithm.":[59],"NTMAC":[60,102,115],"block":[62,72],"oriented":[63],"and":[64,104,124,156,179],"unlike":[65],"MAC":[66],"it":[67],"localizes":[68],"errors":[69,161],"at":[70],"level.":[73],"Nevertheless,":[74],"no":[77],"efficient":[78],"way":[79],"for":[80,151],"correcting":[81],"erroneous":[82,122],"blocks":[83,123,132],"NTMAC.":[85],"This":[86],"paper":[87],"presents":[88],"novel":[90],"algorithm":[91],"enhancement":[94],"NTMAC,":[96],"called":[97,109,141],"Error":[99,111],"Correcting":[100,112],"-":[101,113],"(EC-NTMAC)":[103],"variant":[106],"EC-NTMAC,":[108],"Weighted":[114],"(EC-WNTMAC).":[116],"EC-NTMAC":[117,127,148],"introduces":[118],"error":[119],"correction":[120,130],"EC-WNTMAC":[125],"extends":[126],"based":[133],"on":[134],"their":[135],"importance":[136],"level":[137],"or":[138],"so":[140],"weight.":[142],"later":[144],"approach":[145],"makes":[146],"more":[149],"suitable":[150],"applications":[153],"like":[154],"image":[155],"multimedia":[157],"communications":[158],"where":[159],"few":[160],"acceptable.":[163],"Simulation":[164],"results,":[165],"showing":[166],"capabilities":[167],"both":[169],"proposed":[172],"well":[175],"performance":[178],"security":[180],"considerations":[181],"given":[183],"paper.":[186]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
