{"id":"https://openalex.org/W4200404526","doi":"https://doi.org/10.1142/s0219265921410140","title":"Research on Key Security Detection Method of Cross Domain Information Sharing Based on PKG Trust Gateway","display_name":"Research on Key Security Detection Method of Cross Domain Information Sharing Based on PKG Trust Gateway","publication_year":2021,"publication_date":"2021-12-28","ids":{"openalex":"https://openalex.org/W4200404526","doi":"https://doi.org/10.1142/s0219265921410140"},"language":"en","primary_location":{"id":"doi:10.1142/s0219265921410140","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219265921410140","pdf_url":null,"source":{"id":"https://openalex.org/S63112013","display_name":"Journal of Interconnection Networks","issn_l":"0219-2659","issn":["0219-2659","1793-6713"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Interconnection Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031208828","display_name":"RunQi Li","orcid":null},"institutions":[{"id":"https://openalex.org/I44673925","display_name":"Inner Mongolia Medical University","ror":"https://ror.org/01mtxmr84","country_code":"CN","type":"funder","lineage":["https://openalex.org/I44673925"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"RunQi Li","raw_affiliation_strings":["College of Computer and Information, Inner Mongolia Medical University, Hohhot, Inner Mongolia Autonomous Region, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information, Inner Mongolia Medical University, Hohhot, Inner Mongolia Autonomous Region, P. R. China","institution_ids":["https://openalex.org/I44673925"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5031208828"],"corresponding_institution_ids":["https://openalex.org/I44673925"],"apc_list":null,"apc_paid":null,"fwci":0.3056,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.61698647,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"22","issue":"Supp01","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9369000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9369000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9222000241279602,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9156000018119812,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8118939995765686},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6104389429092407},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5718508958816528},{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.5026476383209229},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.491896390914917},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4637380838394165},{"id":"https://openalex.org/keywords/gateway","display_name":"Gateway (web page)","score":0.46059051156044006},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.45921799540519714},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.45329445600509644},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.43500733375549316},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.07245862483978271}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8118939995765686},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6104389429092407},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5718508958816528},{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.5026476383209229},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.491896390914917},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4637380838394165},{"id":"https://openalex.org/C2777710495","wikidata":"https://www.wikidata.org/wiki/Q5527195","display_name":"Gateway (web page)","level":2,"score":0.46059051156044006},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.45921799540519714},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45329445600509644},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.43500733375549316},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07245862483978271},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0219265921410140","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219265921410140","pdf_url":null,"source":{"id":"https://openalex.org/S63112013","display_name":"Journal of Interconnection Networks","issn_l":"0219-2659","issn":["0219-2659","1793-6713"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Interconnection Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1564285798","https://openalex.org/W2576625905","https://openalex.org/W2769892801","https://openalex.org/W2796670799","https://openalex.org/W2803496998","https://openalex.org/W2896256254","https://openalex.org/W2905839879","https://openalex.org/W2960540132","https://openalex.org/W2963852197","https://openalex.org/W2987538893","https://openalex.org/W2990976795","https://openalex.org/W3029861272","https://openalex.org/W3097792624","https://openalex.org/W3101674918","https://openalex.org/W3122187104","https://openalex.org/W3128165556","https://openalex.org/W3135190561","https://openalex.org/W3139394852","https://openalex.org/W3164819828","https://openalex.org/W4238642401"],"related_works":["https://openalex.org/W2915550258","https://openalex.org/W2544055464","https://openalex.org/W1552851303","https://openalex.org/W2771023301","https://openalex.org/W2391338828","https://openalex.org/W2548448382","https://openalex.org/W4238556280","https://openalex.org/W2513870387","https://openalex.org/W2145747991","https://openalex.org/W40231453"],"abstract_inverted_index":{"Aiming":[0],"at":[1],"the":[2,55,78,101,111,115,126,138,146,153,156,168,180,189,198,203],"problems":[3],"of":[4,59,71,89,91,125,129,155,170,188],"low":[5],"precision,":[6],"long":[7],"detection":[8,12,22,31,128,166,173,186,199,204],"time":[9],"and":[10,48,100,133,148,158,201],"poor":[11],"effect":[13,187],"in":[14,114],"current":[15],"cross":[16,25,63,82,160],"domain":[17,26,64,83,161],"information":[18,27,151,162,182],"sharing":[19,28,163],"key":[20,29,86,98,103,164,184],"security":[21,30,165,185],"methods,":[23],"a":[24],"method":[32,191],"based":[33,44,50],"on":[34,45],"PKG":[35,60,70,90],"trust":[36,73,79,93,116],"gateway":[37,80],"is":[38,68,75,95,106,192],"proposed.":[39,69],"By":[40],"analyzing":[41],"bilinear":[42],"pairing":[43],"elliptic":[46],"curve":[47],"identity":[49],"encryption":[51,147],"scheme,":[52],"according":[53],"to":[54,108],"independent":[56],"system":[57,120],"parameters":[58,132],"management":[61],"platform,":[62],"authentication":[65],"access":[66],"mechanism":[67,105],"different":[72,92,119],"domains":[74,94,117],"used":[76],"as":[77],"for":[81],"authentication.":[84],"The":[85,122,175],"escrow":[87],"problem":[88],"solved":[96],"through":[97,167],"sharing,":[99],"communication":[102],"agreement":[104],"established":[107],"mutually":[109],"authenticate":[110],"user":[112],"nodes":[113],"with":[118],"parameters.":[121],"formal":[123],"description":[124],"rule":[127],"cryptographic":[130],"functions,":[131],"other":[134],"information,":[135],"supported":[136],"by":[137],"dynamic":[139],"binary":[140],"analysis":[141],"platform":[142],"pin,":[143],"dynamically":[144],"records":[145],"decryption":[149],"process":[150],"during":[152],"operation":[154],"program,":[157],"realizes":[159],"design":[169],"correlation":[171],"vulnerability":[172],"algorithm.":[174],"experimental":[176],"results":[177],"show":[178],"that":[179],"cross-domain":[181],"shared":[183],"proposed":[190],"better,":[193],"which":[194],"can":[195],"effectively":[196],"improve":[197],"accuracy":[200],"shorten":[202],"time.":[205]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
