{"id":"https://openalex.org/W3021021821","doi":"https://doi.org/10.1109/itnac46935.2019.9078020","title":"A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR Codes","display_name":"A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR Codes","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3021021821","doi":"https://doi.org/10.1109/itnac46935.2019.9078020","mag":"3021021821"},"language":"en","primary_location":{"id":"doi:10.1109/itnac46935.2019.9078020","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac46935.2019.9078020","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101656959","display_name":"Yong Jin","orcid":"https://orcid.org/0000-0003-2967-5557"},"institutions":[{"id":"https://openalex.org/I114531698","display_name":"Tokyo Institute of Technology","ror":"https://ror.org/0112mx960","country_code":"JP","type":"education","lineage":["https://openalex.org/I114531698"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Yong Jin","raw_affiliation_strings":["Tokyo Institute of Technology,Japan","Tokyo Institute of Technology, Japan"],"affiliations":[{"raw_affiliation_string":"Tokyo Institute of Technology,Japan","institution_ids":["https://openalex.org/I114531698"]},{"raw_affiliation_string":"Tokyo Institute of Technology, Japan","institution_ids":["https://openalex.org/I114531698"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054448019","display_name":"Masahiko Tomoishi","orcid":"https://orcid.org/0000-0001-5636-7774"},"institutions":[{"id":"https://openalex.org/I114531698","display_name":"Tokyo Institute of Technology","ror":"https://ror.org/0112mx960","country_code":"JP","type":"education","lineage":["https://openalex.org/I114531698"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masahiko Tomoishi","raw_affiliation_strings":["Tokyo Institute of Technology,Japan","Tokyo Institute of Technology, Japan"],"affiliations":[{"raw_affiliation_string":"Tokyo Institute of Technology,Japan","institution_ids":["https://openalex.org/I114531698"]},{"raw_affiliation_string":"Tokyo Institute of Technology, Japan","institution_ids":["https://openalex.org/I114531698"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101656959"],"corresponding_institution_ids":["https://openalex.org/I114531698"],"apc_list":null,"apc_paid":null,"fwci":0.1769,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58478241,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.8226428031921387},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7381674647331238},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.727526068687439},{"id":"https://openalex.org/keywords/man-in-the-middle-attack","display_name":"Man-in-the-middle attack","score":0.6945076584815979},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.6682484149932861},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6457632780075073},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5746460556983948},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5000383853912354},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.4730479121208191},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.46179863810539246},{"id":"https://openalex.org/keywords/shared-secret","display_name":"Shared secret","score":0.461618036031723},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.43542835116386414},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.4289698004722595},{"id":"https://openalex.org/keywords/ethernet","display_name":"Ethernet","score":0.42869114875793457},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3761991560459137},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2386508285999298},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2083539366722107}],"concepts":[{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.8226428031921387},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7381674647331238},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.727526068687439},{"id":"https://openalex.org/C196491621","wikidata":"https://www.wikidata.org/wiki/Q554830","display_name":"Man-in-the-middle attack","level":3,"score":0.6945076584815979},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.6682484149932861},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6457632780075073},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5746460556983948},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5000383853912354},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.4730479121208191},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.46179863810539246},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.461618036031723},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.43542835116386414},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.4289698004722595},{"id":"https://openalex.org/C172173386","wikidata":"https://www.wikidata.org/wiki/Q79984","display_name":"Ethernet","level":2,"score":0.42869114875793457},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3761991560459137},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2386508285999298},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2083539366722107}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itnac46935.2019.9078020","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac46935.2019.9078020","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1758578440","https://openalex.org/W1828150029","https://openalex.org/W1961623891","https://openalex.org/W2097725665","https://openalex.org/W2107580968","https://openalex.org/W2111427271","https://openalex.org/W2119363962","https://openalex.org/W2131948290","https://openalex.org/W2237106267","https://openalex.org/W2515070993","https://openalex.org/W2609302234","https://openalex.org/W2789343076","https://openalex.org/W2915352631","https://openalex.org/W2917937012","https://openalex.org/W4213362721","https://openalex.org/W4230238643","https://openalex.org/W4232820472","https://openalex.org/W4242138061","https://openalex.org/W4298358954"],"related_works":["https://openalex.org/W4205947986","https://openalex.org/W1582813804","https://openalex.org/W2169929745","https://openalex.org/W2183582611","https://openalex.org/W4214730958","https://openalex.org/W1671459658","https://openalex.org/W3021021821","https://openalex.org/W4206257450","https://openalex.org/W4392843628","https://openalex.org/W2945159176"],"abstract_inverted_index":{"End-to-end":[0],"key":[1,38,60,123,129,171,199],"exchange":[2,39,61,124,172,206],"for":[3,117],"the":[4,22,59,63,95,118,122,126,140,181,195,198,205,210,214,219,222],"subsequent":[5],"secret":[6],"sharing":[7],"and":[8,26,89,125,151,186,217],"secure":[9,36,169],"communication":[10],"between":[11,41,94],"two":[12,42,70,74,96,100],"remote":[13,43,97],"parties":[14,44,98],"has":[15,174],"been":[16,175,189],"an":[17],"important":[18],"issue":[19],"due":[20],"to":[21,108],"threats":[23],"of":[24,47,162,213,221],"eavesdropping":[25],"Man-In-The-Middle":[27],"(MITM)":[28],"attacks.":[29],"In":[30,58],"this":[31,163],"paper,":[32],"we":[33],"propose":[34],"a":[35,167],"end-to-end":[37,170],"mechanism":[40,216],"by":[45,69,194],"cooperation":[46],"multiple":[48,141],"devices":[49,102,142,182],"at":[50,103,143],"each":[51,104,144],"party":[52,105,145],"using":[53,99,183],"QR":[54,148],"(Quick":[55],"Response)":[56],"codes.":[57],"process,":[62],"data":[64,119,137],"transmission":[65,120,138],"will":[66,114,131,200],"be":[67,115,132,202],"conducted":[68],"different":[71,75,101],"applications":[72],"via":[73,82,91],"infrastructure":[76],"networks,":[77],"SMS":[78],"(Short":[79],"Message":[80],"Service)":[81],"cellular":[83,184],"network":[84,156,185],"(e.g.":[85],"LTE,":[86],"4G,":[87],"etc)":[88],"Email":[90],"Ethernet":[92,187],"respectively,":[93],"in":[106,177],"order":[107],"mitigate":[109],"security":[110],"risks.":[111],"Public-key":[112],"cryptography":[113],"adopted":[116],"during":[121,204],"corresponding":[127],"asymmetric":[128],"pair":[130],"used":[133],"only":[134,146],"once.":[135],"The":[136,159],"within":[139],"uses":[147],"codes":[149],"(scan":[150],"display)":[152],"without":[153],"involving":[154],"any":[155],"based":[157],"communication.":[158],"main":[160,211],"contribution":[161],"paper":[164],"is":[165],"that":[166],"novel":[168],"approach":[173],"proposed":[176,215],"which":[178],"unless":[179],"both":[180],"have":[188],"compromised":[190],"or":[191],"MITM":[192],"attacked":[193],"same":[196],"attacker":[197],"not":[201],"leaked":[203],"process.":[207],"We":[208],"verified":[209],"features":[212],"confirmed":[218],"effectiveness":[220],"design.":[223]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
