{"id":"https://openalex.org/W2022179216","doi":"https://doi.org/10.1145/1352793.1352861","title":"Architecture of secure cross-platform and network communications","display_name":"Architecture of secure cross-platform and network communications","publication_year":2008,"publication_date":"2008-01-31","ids":{"openalex":"https://openalex.org/W2022179216","doi":"https://doi.org/10.1145/1352793.1352861","mag":"2022179216"},"language":"en","primary_location":{"id":"doi:10.1145/1352793.1352861","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1352793.1352861","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd international conference on Ubiquitous information management and communication","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051803761","display_name":"Weijia Jia","orcid":"https://orcid.org/0000-0002-0231-3196"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Weijia Jia","raw_affiliation_strings":["City Univeristy of Hong Kong, Kowloon, SAR Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"City Univeristy of Hong Kong, Kowloon, SAR Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058189024","display_name":"Bin Dai","orcid":"https://orcid.org/0000-0002-7893-6218"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Dai Bin","raw_affiliation_strings":["City Univeristy of Hong Kong, Kowloon, SAR Hong Kong, China and HuaZhong Univeristy of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"City Univeristy of Hong Kong, Kowloon, SAR Hong Kong, China and HuaZhong Univeristy of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047430406","display_name":"Lin Liao","orcid":"https://orcid.org/0000-0002-7661-870X"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Lin Liao","raw_affiliation_strings":["City Univeristy of Hong Kong, Kowloon, SAR Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"City Univeristy of Hong Kong, Kowloon, SAR Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5051803761"],"corresponding_institution_ids":["https://openalex.org/I168719708"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.08094816,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"321","last_page":"328"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.731722354888916},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.584358274936676},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5523371696472168},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5453181266784668},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5411021709442139},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4889460802078247},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4887716472148895},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.414783775806427},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12406837940216064},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1137685775756836}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.731722354888916},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.584358274936676},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5523371696472168},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5453181266784668},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5411021709442139},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4889460802078247},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4887716472148895},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.414783775806427},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12406837940216064},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1137685775756836},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1352793.1352861","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1352793.1352861","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd international conference on Ubiquitous information management and communication","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G29312525","display_name":null,"funder_award_id":"7002102","funder_id":"https://openalex.org/F4320309893","funder_display_name":"City University of Hong Kong"},{"id":"https://openalex.org/G7318588064","display_name":null,"funder_award_id":"CityU 113906","funder_id":"https://openalex.org/F4320321592","funder_display_name":"Research Grants Council, University Grants Committee"}],"funders":[{"id":"https://openalex.org/F4320309893","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23"},{"id":"https://openalex.org/F4320321108","display_name":"Academy of Finland","ror":"https://ror.org/05k73zm37"},{"id":"https://openalex.org/F4320321592","display_name":"Research Grants Council, University Grants Committee","ror":"https://ror.org/00djwmt25"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W51411100","https://openalex.org/W120660591","https://openalex.org/W194756579","https://openalex.org/W1482214173","https://openalex.org/W1515716392","https://openalex.org/W1526747343","https://openalex.org/W1556597491","https://openalex.org/W1996789571","https://openalex.org/W2077099041","https://openalex.org/W2097042314","https://openalex.org/W2111654482","https://openalex.org/W2116662625","https://openalex.org/W2133282516","https://openalex.org/W2141477834","https://openalex.org/W2150293933","https://openalex.org/W2155899844"],"related_works":["https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W4229499248","https://openalex.org/W2566006169","https://openalex.org/W1567818861","https://openalex.org/W2987774938","https://openalex.org/W4256492088","https://openalex.org/W632915154","https://openalex.org/W2055733372","https://openalex.org/W3022067003"],"abstract_inverted_index":{"The":[0,20],"convenience":[1],"of":[2,8,31,59,74,85],"Wireless":[3],"LAN":[4],"and":[5,33,36,43,70,90,96,106],"the":[6,12,29,47,65,72,75,92,97,108,112,115],"deployment":[7],"3G":[9],"network":[10],"make":[11],"cross":[13,41,98,116],"platform/network":[14],"services":[15],"(CPS)":[16],"are":[17,103],"getting":[18],"popular.":[19],"core":[21],"reasons":[22],"for":[23,25],"vulnerabilities":[24],"CPS":[26,77,89],"stems":[27],"from":[28],"transform":[30],"data":[32,60],"control":[34],"messages":[35],"protocol":[37],"translation":[38],"occurred":[39],"in":[40,68,88,114],"networks":[42],"platforms":[44],"operations.":[45],"During":[46],"translation/transcoding,":[48],"new":[49],"threats":[50,66],"could":[51],"be":[52],"introduced":[53],"as":[54],"it":[55],"may":[56],"go":[57],"beyond":[58],"cryptography.":[61],"We":[62,79],"particularly":[63],"investigate":[64],"facing":[67],"Internet-3G-WiFi":[69],"propose":[71,107],"architecture":[73],"secure":[76],"(SCPS).":[78],"illustrate":[80],"newly":[81],"defined":[82],"five":[83],"types":[84],"attacks":[86,94,100,113],"uniquely":[87],"analyze":[91],"traditional":[93],"(TA)":[95],"platform":[99],"(CPA)":[101],"which":[102],"conducted":[104],"mode":[105],"corresponding":[109],"countermeasures":[110],"to":[111],"platform.":[117]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
