{"id":"https://openalex.org/W2792573880","doi":"https://doi.org/10.1117/12.2284465","title":"Vehicle security encryption based on unlicensed encryption","display_name":"Vehicle security encryption based on unlicensed encryption","publication_year":2018,"publication_date":"2018-03-08","ids":{"openalex":"https://openalex.org/W2792573880","doi":"https://doi.org/10.1117/12.2284465","mag":"2792573880"},"language":"en","primary_location":{"id":"doi:10.1117/12.2284465","is_oa":false,"landing_page_url":"https://doi.org/10.1117/12.2284465","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MIPPR 2017: Remote Sensing Image Processing, Geographic Information Systems, and Other Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109608708","display_name":"Haomin Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210116001","display_name":"Guiyang University","ror":"https://ror.org/025edj240","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210116001"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"haomin huang","raw_affiliation_strings":["Guiyang Univ. (China)"],"affiliations":[{"raw_affiliation_string":"Guiyang Univ. (China)","institution_ids":["https://openalex.org/I4210116001"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063850099","display_name":"Jing Song","orcid":"https://orcid.org/0000-0001-5979-2952"},"institutions":[{"id":"https://openalex.org/I4210116001","display_name":"Guiyang University","ror":"https://ror.org/025edj240","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210116001"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Song","raw_affiliation_strings":["Guiyang Univ. (China)"],"affiliations":[{"raw_affiliation_string":"Guiyang Univ. (China)","institution_ids":["https://openalex.org/I4210116001"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054871312","display_name":"Zhijia Xu","orcid":"https://orcid.org/0000-0002-9183-6924"},"institutions":[{"id":"https://openalex.org/I4210116001","display_name":"Guiyang University","ror":"https://ror.org/025edj240","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210116001"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhijia Xu","raw_affiliation_strings":["Guiyang Univ. (China)"],"affiliations":[{"raw_affiliation_string":"Guiyang Univ. (China)","institution_ids":["https://openalex.org/I4210116001"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061229339","display_name":"Xiaoke Ding","orcid":null},"institutions":[{"id":"https://openalex.org/I4210116001","display_name":"Guiyang University","ror":"https://ror.org/025edj240","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210116001"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoke Ding","raw_affiliation_strings":["Guiyang Univ. (China)"],"affiliations":[{"raw_affiliation_string":"Guiyang Univ. (China)","institution_ids":["https://openalex.org/I4210116001"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052585462","display_name":"Wei Deng","orcid":"https://orcid.org/0009-0003-5244-1000"},"institutions":[{"id":"https://openalex.org/I4210116001","display_name":"Guiyang University","ror":"https://ror.org/025edj240","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210116001"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Deng","raw_affiliation_strings":["Guiyang Univ. (China)"],"affiliations":[{"raw_affiliation_string":"Guiyang Univ. (China)","institution_ids":["https://openalex.org/I4210116001"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5109608708"],"corresponding_institution_ids":["https://openalex.org/I4210116001"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02190178,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"23","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14270","display_name":"Simulation and Modeling Applications","score":0.703000009059906,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14270","display_name":"Simulation and Modeling Applications","score":0.703000009059906,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12941","display_name":"Embedded Systems and FPGA Design","score":0.6836000084877014,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.6680999994277954,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8472621440887451},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6888370513916016},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.618905246257782},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5808269381523132},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5537944436073303},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.5384765267372131},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5234641432762146},{"id":"https://openalex.org/keywords/disk-encryption-theory","display_name":"Disk encryption theory","score":0.5110501050949097},{"id":"https://openalex.org/keywords/disk-encryption","display_name":"Disk encryption","score":0.4878077805042267},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.47555965185165405},{"id":"https://openalex.org/keywords/system-on-a-chip","display_name":"System on a chip","score":0.423663854598999},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.32012060284614563},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2746201157569885},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1745033860206604},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16874122619628906},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.1542082130908966}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8472621440887451},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6888370513916016},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.618905246257782},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5808269381523132},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5537944436073303},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.5384765267372131},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5234641432762146},{"id":"https://openalex.org/C122874069","wikidata":"https://www.wikidata.org/wiki/Q5282312","display_name":"Disk encryption theory","level":5,"score":0.5110501050949097},{"id":"https://openalex.org/C9368797","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"Disk encryption","level":4,"score":0.4878077805042267},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.47555965185165405},{"id":"https://openalex.org/C118021083","wikidata":"https://www.wikidata.org/wiki/Q610398","display_name":"System on a chip","level":2,"score":0.423663854598999},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.32012060284614563},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2746201157569885},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1745033860206604},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16874122619628906},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.1542082130908966},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1117/12.2284465","is_oa":false,"landing_page_url":"https://doi.org/10.1117/12.2284465","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MIPPR 2017: Remote Sensing Image Processing, Geographic Information Systems, and Other Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1967408113","https://openalex.org/W4313218192","https://openalex.org/W2915067502","https://openalex.org/W2231057570","https://openalex.org/W4366307041","https://openalex.org/W4308992061","https://openalex.org/W4250199380","https://openalex.org/W3004922236","https://openalex.org/W2612351067","https://openalex.org/W2076683831"],"abstract_inverted_index":{"The":[0,53],"current":[1],"vehicle":[2,23],"key":[3],"is":[4,18],"easy":[5],"to":[6],"be":[7],"destroyed":[8],"and":[9,37,74],"damage,":[10],"proposing":[11],"the":[12,20,28,34,43,58,67,71],"use":[13],"of":[14,22,31],"elliptical":[15],"encryption":[16,29],"algorithm":[17],"improving":[19],"reliability":[21],"security":[24],"system.":[25],"Based":[26],"on":[27],"rules":[30],"elliptic":[32],"curve,":[33],"chip\u2019s":[35],"framework":[36],"hardware":[38],"structure":[39],"are":[40],"designed,":[41],"then":[42],"chip":[44],"calculation":[45,69],"process":[46],"simulation":[47,54],"has":[48,55],"been":[49,56],"analyzed":[50],"by":[51],"software.":[52],"achieved":[57],"expected":[59],"target.":[60],"Finally,":[61],"some":[62],"issues":[63],"pointed":[64],"out":[65],"in":[66],"data":[68],"about":[70],"chip's":[72],"storage\u3001control":[73],"other":[75],"modules.":[76]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
