{"id":"https://openalex.org/W2219878008","doi":"https://doi.org/10.1109/ictc.2015.7354563","title":"An encryption scheme based on trust for device-to-device communication on 5G","display_name":"An encryption scheme based on trust for device-to-device communication on 5G","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2219878008","doi":"https://doi.org/10.1109/ictc.2015.7354563","mag":"2219878008"},"language":"en","primary_location":{"id":"doi:10.1109/ictc.2015.7354563","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc.2015.7354563","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Information and Communication Technology Convergence (ICTC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077753379","display_name":"Gonzalo Huerta\u2010C\u00e1nepa","orcid":null},"institutions":[{"id":"https://openalex.org/I21067949","display_name":"Adolfo Ib\u00e1\u00f1ez University","ror":"https://ror.org/0326knt82","country_code":"CL","type":"education","lineage":["https://openalex.org/I21067949"]}],"countries":["CL"],"is_corresponding":true,"raw_author_name":"Gonzalo Huerta-Canepa","raw_affiliation_strings":["Faculty of Engineering and Science, Universidad Adolfo Ibanez, Vina del Mar, Chile"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering and Science, Universidad Adolfo Ibanez, Vina del Mar, Chile","institution_ids":["https://openalex.org/I21067949"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5077753379"],"corresponding_institution_ids":["https://openalex.org/I21067949"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.09867165,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"360","last_page":"362"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8487861156463623},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7508001327514648},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7388787269592285},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.5502708554267883},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5453360676765442},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.5208407044410706},{"id":"https://openalex.org/keywords/communications-system","display_name":"Communications system","score":0.42253023386001587},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37011557817459106}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8487861156463623},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7508001327514648},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7388787269592285},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.5502708554267883},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5453360676765442},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.5208407044410706},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.42253023386001587},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37011557817459106},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ictc.2015.7354563","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc.2015.7354563","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Information and Communication Technology Convergence (ICTC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W165036958","https://openalex.org/W1807025609","https://openalex.org/W1815588791","https://openalex.org/W1980906071","https://openalex.org/W2018736781","https://openalex.org/W2032998181","https://openalex.org/W2067261500","https://openalex.org/W2108072891","https://openalex.org/W2114094444","https://openalex.org/W2154282625","https://openalex.org/W2157034822","https://openalex.org/W2158420816","https://openalex.org/W3123200479","https://openalex.org/W6606753924","https://openalex.org/W6682753377","https://openalex.org/W7015651960"],"related_works":["https://openalex.org/W2050704528","https://openalex.org/W2514631144","https://openalex.org/W2384733347","https://openalex.org/W1560558670","https://openalex.org/W2038234362","https://openalex.org/W2379253205","https://openalex.org/W2947430584","https://openalex.org/W2352922062","https://openalex.org/W2059155883","https://openalex.org/W2377059850"],"abstract_inverted_index":{"Device-to-device":[0],"(D2D)":[1],"communication":[2,85,102],"extends":[3],"the":[4,62,84,87],"traditional":[5],"cellular":[6],"system":[7],"allowing":[8],"geographically":[9],"close":[10],"devices":[11],"to":[12,16,33,76,82],"communicate":[13],"directly,":[14],"leading":[15],"improved":[17],"spectral":[18],"efficiency":[19],"and":[20],"decreased":[21],"traffic":[22],"load":[23],"of":[24,43,69,95],"base":[25],"stations.":[26],"Nevertheless,":[27],"there":[28],"are":[29,58,67,73,80],"still":[30],"some":[31],"issue":[32],"solve":[34],"before":[35],"this":[36,48],"technology":[37],"can":[38],"become":[39],"a":[40],"reality.":[41],"One":[42],"them":[44],"is":[45],"security.":[46],"In":[47],"work,":[49],"we":[50],"propose":[51],"an":[52],"encryption":[53],"scheme":[54],"in":[55,100],"which":[56],"stereotypes":[57,66],"created":[59],"based":[60],"on":[61],"place":[63],"characteristics.":[64],"Such":[65],"composed":[68],"attributes.":[70],"These":[71,89],"attributes":[72],"then":[74],"leveraged":[75],"create":[77],"keys":[78,90],"that":[79],"used":[81,99],"encrypt":[83],"between":[86],"devices.":[88],"will":[91],"reflect":[92],"different":[93,101],"levels":[94],"trust":[96],"each":[97],"one":[98],"channels.":[103]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
