{"id":"https://openalex.org/W4280599937","doi":"https://doi.org/10.1109/iwcmc55113.2022.9825252","title":"A New Security Solution Enhancing the Dynamic Array PIN Protocol","display_name":"A New Security Solution Enhancing the Dynamic Array PIN Protocol","publication_year":2022,"publication_date":"2022-05-30","ids":{"openalex":"https://openalex.org/W4280599937","doi":"https://doi.org/10.1109/iwcmc55113.2022.9825252"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc55113.2022.9825252","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9825252","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://hal.science/hal-03644089","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076941192","display_name":"Samir Chabbi","orcid":"https://orcid.org/0000-0001-8068-4489"},"institutions":[{"id":"https://openalex.org/I1288970718","display_name":"Mohamed-Cherif Messaadia University","ror":"https://ror.org/04pn9tn44","country_code":"DZ","type":"education","lineage":["https://openalex.org/I1288970718"]}],"countries":["DZ"],"is_corresponding":true,"raw_author_name":"Samir Chabbi","raw_affiliation_strings":["University of Souk Ahras,Department of Mathematics and Computer Science,Souk Ahras,Algeria,41000"],"affiliations":[{"raw_affiliation_string":"University of Souk Ahras,Department of Mathematics and Computer Science,Souk Ahras,Algeria,41000","institution_ids":["https://openalex.org/I1288970718"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041418831","display_name":"Nour El Madhoun","orcid":"https://orcid.org/0000-0001-7742-7748"},"institutions":[{"id":"https://openalex.org/I4210138808","display_name":"\u00c9cole Pour l'Informatique et les Techniques Avanc\u00e9es","ror":"https://ror.org/04r5ddq29","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210138808"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Nour El Madhoun","raw_affiliation_strings":["EPITA,Security and System Laboratory,Le Kremlin-Bic&#x00EA;tre,France,94270"],"affiliations":[{"raw_affiliation_string":"EPITA,Security and System Laboratory,Le Kremlin-Bic&#x00EA;tre,France,94270","institution_ids":["https://openalex.org/I4210138808"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076941192"],"corresponding_institution_ids":["https://openalex.org/I1288970718"],"apc_list":null,"apc_paid":null,"fwci":0.4377,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.59387959,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"4","issue":null,"first_page":"991","last_page":"996"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8794279098510742},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8182327747344971},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.737188994884491},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6350728273391724},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5416879653930664},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4666362404823303},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.44564640522003174},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39400601387023926},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3864314556121826}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8794279098510742},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8182327747344971},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.737188994884491},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6350728273391724},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5416879653930664},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4666362404823303},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.44564640522003174},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39400601387023926},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3864314556121826},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iwcmc55113.2022.9825252","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9825252","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-03644089v1","is_oa":true,"landing_page_url":"https://hal.science/hal-03644089","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Wireless Communications and Mobile Computing Conference (IWCMC 2022), May 2022, Dubrovnik, Ukraine","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-03644089v1","is_oa":true,"landing_page_url":"https://hal.science/hal-03644089","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Wireless Communications and Mobile Computing Conference (IWCMC 2022), May 2022, Dubrovnik, Ukraine","raw_type":"Conference papers"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2348322870","https://openalex.org/W2460366127","https://openalex.org/W2515593317","https://openalex.org/W2617627745","https://openalex.org/W2803549391","https://openalex.org/W2942069571","https://openalex.org/W2986377783","https://openalex.org/W3034161988","https://openalex.org/W3036980562","https://openalex.org/W3039616626","https://openalex.org/W3040495509","https://openalex.org/W3045818689","https://openalex.org/W3046442452","https://openalex.org/W3096321181","https://openalex.org/W3116637734","https://openalex.org/W3121564459","https://openalex.org/W3131202767","https://openalex.org/W3132693950","https://openalex.org/W3168582007","https://openalex.org/W3195568952","https://openalex.org/W4220874799","https://openalex.org/W6761814208","https://openalex.org/W6791038579","https://openalex.org/W6796073821"],"related_works":["https://openalex.org/W2114566185","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W2093529019","https://openalex.org/W87530933","https://openalex.org/W2282990539","https://openalex.org/W154233216","https://openalex.org/W2102905434","https://openalex.org/W2626486901","https://openalex.org/W1988007309"],"abstract_inverted_index":{"In":[0],"order":[1],"to":[2,37,54,62,90,104],"authenticate":[3],"a":[4,24,35,43,79,110],"user":[5,36],"on":[6,19],"an":[7],"Automated":[8],"Teller":[9],"Machine":[10],"(ATM)":[11],"using":[12],"Near":[13],"Field":[14],"Communication":[15],"(NFC)":[16],"technology":[17],"embedded":[18],"smartphones,":[20],"we":[21,66,82,102],"recently":[22],"proposed":[23],"new":[25,111],"approach":[26],"called":[27],"Dynamic":[28],"Array":[29],"PIN":[30,40],"Protocol":[31],"(DAP)":[32],"that":[33,48,68,84,114],"allows":[34],"enter":[38],"his":[39],"code":[41],"in":[42,99],"secure":[44],"manner.":[45],"We":[46],"proved":[47],"the":[49,85,116],"DAP":[50,69,86,117],"protocol":[51,87],"is":[52,70,88],"resistant":[53],"13":[55],"different":[56],"attacks.":[57],"Furthermore,":[58],"by":[59,108],"comparing":[60],"it":[61],"several":[63],"existing":[64],"solutions,":[65],"demonstrated":[67],"much":[71],"better":[72],"and":[73],"more":[74],"cost":[75],"effective.":[76],"However,":[77],"after":[78],"thorough":[80],"analysis,":[81],"discovered":[83],"vulnerable":[89],"multiple":[91],"eavesdropping":[92],"video":[93],"or":[94],"camera":[95],"records":[96],"attack.":[97],"Consequently,":[98],"this":[100,106],"paper,":[101],"aim":[103],"address":[105],"vulnerability":[107],"proposing":[109],"security":[112],"solution":[113],"improves":[115],"protocol.":[118]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
