{"id":"https://openalex.org/W2605078163","doi":"https://doi.org/10.1109/tifs.2017.2756567","title":"GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks","display_name":"GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks","publication_year":2017,"publication_date":"2017-09-25","ids":{"openalex":"https://openalex.org/W2605078163","doi":"https://doi.org/10.1109/tifs.2017.2756567","mag":"2605078163"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2756567","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2756567","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008490487","display_name":"Ruei-Hau Hsu","orcid":null},"institutions":[{"id":"https://openalex.org/I115228651","display_name":"Agency for Science, Technology and Research","ror":"https://ror.org/036wvzt09","country_code":"SG","type":"government","lineage":["https://openalex.org/I115228651"]},{"id":"https://openalex.org/I144291393","display_name":"Data Storage Institute","ror":"https://ror.org/03k5xes38","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I144291393"]},{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Ruei-Hau Hsu","raw_affiliation_strings":["Agency for Science, Technology and Research, Data Storage Institute, Singapore","iTrust, Centre for Research in Cyber Security, Singapore University of Technology and Design, Singapore"],"affiliations":[{"raw_affiliation_string":"Agency for Science, Technology and Research, Data Storage Institute, Singapore","institution_ids":["https://openalex.org/I144291393","https://openalex.org/I115228651"]},{"raw_affiliation_string":"iTrust, Centre for Research in Cyber Security, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023489409","display_name":"Jemin Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I193352282","display_name":"Daegu Gyeongbuk Institute of Science and Technology","ror":"https://ror.org/03frjya69","country_code":"KR","type":"education","lineage":["https://openalex.org/I193352282"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jemin Lee","raw_affiliation_strings":["Department of Information and Communication Engineering, Daegu Gyeongbuk Institute of Science and Technology, Daegu, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Engineering, Daegu Gyeongbuk Institute of Science and Technology, Daegu, South Korea","institution_ids":["https://openalex.org/I193352282"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030858163","display_name":"Tony Q. S. Quek","orcid":"https://orcid.org/0000-0002-4037-3149"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Tony Q. S. Quek","raw_affiliation_strings":["Information Systems Technology and Design Pillar, Singapore University of Technology and Design, Singapore"],"affiliations":[{"raw_affiliation_string":"Information Systems Technology and Design Pillar, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111510639","display_name":"Jyh-Cheng Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Jyh-Cheng Chen","raw_affiliation_strings":["Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5008490487"],"corresponding_institution_ids":["https://openalex.org/I115228651","https://openalex.org/I144291393","https://openalex.org/I152815399"],"apc_list":null,"apc_paid":null,"fwci":14.6887,"has_fulltext":false,"cited_by_count":63,"citation_normalized_percentile":{"value":0.98829668,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"13","issue":"2","first_page":"449","last_page":"464"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8524484634399414},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7252210378646851},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6083312034606934},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5647153258323669},{"id":"https://openalex.org/keywords/communication-in-small-groups","display_name":"Communication in small groups","score":0.5203968286514282},{"id":"https://openalex.org/keywords/group-key","display_name":"Group key","score":0.500478982925415},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.4817647933959961},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4560002386569977},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.4363248348236084},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4101428985595703},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34720200300216675},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.22243312001228333},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1914900243282318}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8524484634399414},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7252210378646851},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6083312034606934},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5647153258323669},{"id":"https://openalex.org/C44871818","wikidata":"https://www.wikidata.org/wiki/Q5154139","display_name":"Communication in small groups","level":2,"score":0.5203968286514282},{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.500478982925415},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.4817647933959961},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4560002386569977},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.4363248348236084},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4101428985595703},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34720200300216675},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.22243312001228333},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1914900243282318},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2017.2756567","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2756567","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4409368750","display_name":null,"funder_award_id":"2017R1C1B2009280","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W189397779","https://openalex.org/W1517333100","https://openalex.org/W1532961226","https://openalex.org/W1546891011","https://openalex.org/W1610688607","https://openalex.org/W1851253658","https://openalex.org/W1921672120","https://openalex.org/W1977749987","https://openalex.org/W1993087005","https://openalex.org/W2015454706","https://openalex.org/W2018462118","https://openalex.org/W2023472100","https://openalex.org/W2032309315","https://openalex.org/W2091041197","https://openalex.org/W2096114719","https://openalex.org/W2097638666","https://openalex.org/W2099803980","https://openalex.org/W2099825284","https://openalex.org/W2102091280","https://openalex.org/W2106103615","https://openalex.org/W2106337664","https://openalex.org/W2115967491","https://openalex.org/W2129956927","https://openalex.org/W2131300413","https://openalex.org/W2131353907","https://openalex.org/W2136757778","https://openalex.org/W2139910984","https://openalex.org/W2146201483","https://openalex.org/W2148156724","https://openalex.org/W2151648452","https://openalex.org/W2152924492","https://openalex.org/W2167272529","https://openalex.org/W2172174332","https://openalex.org/W2316444051","https://openalex.org/W2334737379","https://openalex.org/W2556834368","https://openalex.org/W4210300416","https://openalex.org/W6636423917","https://openalex.org/W6640233077","https://openalex.org/W6678835178"],"related_works":["https://openalex.org/W2161971476","https://openalex.org/W2188441851","https://openalex.org/W2163893531","https://openalex.org/W2127035401","https://openalex.org/W2148864619","https://openalex.org/W3082525907","https://openalex.org/W2397435724","https://openalex.org/W1992591017","https://openalex.org/W4205185683","https://openalex.org/W2185503478"],"abstract_inverted_index":{"Device-to-device":[0],"(D2D)":[1],"communication":[2],"is":[3],"mainly":[4],"launched":[5],"by":[6,61,73,82,140,172],"the":[7,35,42,52,56,68,75,122,135,150,159,163,168,173,179,182,191,197],"transmission":[8],"requirements":[9,199],"between":[10],"devices":[11,33,54,156],"for":[12,34,95,114],"specific":[13],"applications":[14,43,78],"such":[15],"as":[16,108,110],"proximity":[17,60],"services":[18],"in":[19,59,144],"long-term":[20],"evolution":[21],"advanced":[22],"networks,":[23],"and":[24,37,89,112,116,127,177],"each":[25,47],"application":[26],"will":[27],"form":[28],"a":[29],"group":[30,58,63,71,101],"of":[31,44,55,70,77,124,137,162,181,200],"registered":[32],"network-covered":[36,88],"network-absent":[38,90],"D2D":[39,45,96,145,201],"communications.":[40,146,202],"During":[41],"communication,":[46],"device":[48],"needs":[49],"to":[50,67,98,105,133,157,196],"identify":[51],"other":[53],"same":[57],"their":[62],"identity.":[64],"This":[65],"leads":[66],"exposure":[69],"information,":[72],"which":[74],"usage":[76],"can":[79],"be":[80],"analyzed":[81],"eavesdroppers.":[83],"Hence,":[84],"this":[85],"paper":[86],"introduces":[87],"authenticated":[91],"key":[92],"exchange":[93],"protocols":[94,139,152,193],"communications":[97],"guarantee":[99],"accountable":[100],"anonymity,":[102],"end-to-end":[103],"security":[104,123],"network":[106],"operators,":[107],"well":[109],"traceability":[111],"revocability":[113],"accounting":[115],"management":[117],"requirements.":[118],"We":[119,165],"formally":[120],"prove":[121,178],"those":[125],"protocols,":[126],"also":[128,166],"develop":[129],"an":[130],"analytic":[131,175,183],"model":[132,176,184],"evaluate":[134,158,167],"quality":[136],"authentication":[138,141,169],"success":[142,170],"rate":[143,171],"Besides,":[147],"we":[148],"implement":[149],"proposed":[151,174,192],"on":[153],"android":[154],"mobile":[155],"computation":[160],"costs":[161],"protocols.":[164],"correctness":[180],"via":[185],"simulation.":[186],"Those":[187],"evaluations":[188],"show":[189],"that":[190],"are":[194],"feasible":[195],"performance":[198]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":14},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2026-04-03T22:45:19.894376","created_date":"2025-10-10T00:00:00"}
