{"id":"https://openalex.org/W3000327922","doi":"https://doi.org/10.1145/3371676.3371682","title":"Mobile Phone Number Privacy Scheme Based on Lightweight Hash Mapping","display_name":"Mobile Phone Number Privacy Scheme Based on Lightweight Hash Mapping","publication_year":2019,"publication_date":"2019-11-15","ids":{"openalex":"https://openalex.org/W3000327922","doi":"https://doi.org/10.1145/3371676.3371682","mag":"3000327922"},"language":"en","primary_location":{"id":"doi:10.1145/3371676.3371682","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3371676.3371682","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109959966","display_name":"Qingqing Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qingqing Chang","raw_affiliation_strings":["College of Computer Science &amp; Technology, Nanjing Univ. of Aeronautics &amp; Astronautics, Nanjing, PRC"],"affiliations":[{"raw_affiliation_string":"College of Computer Science &amp; Technology, Nanjing Univ. of Aeronautics &amp; Astronautics, Nanjing, PRC","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084716692","display_name":"Shenghui Su","orcid":"https://orcid.org/0000-0001-7736-2884"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shenghui Su","raw_affiliation_strings":["College of Computer Science &amp; Technology, Nanjing Univ. of Aeronautics &amp; Astronautics, Nanjing, PRC and Public Security Innovation Center, Nanjing Univ. of Science &amp; Technology, Nanjing, PRC"],"affiliations":[{"raw_affiliation_string":"College of Computer Science &amp; Technology, Nanjing Univ. of Aeronautics &amp; Astronautics, Nanjing, PRC and Public Security Innovation Center, Nanjing Univ. of Science &amp; Technology, Nanjing, PRC","institution_ids":["https://openalex.org/I9842412"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5109959966"],"corresponding_institution_ids":["https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21644321,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"34","last_page":"39"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7746948003768921},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6350270509719849},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.6050984859466553},{"id":"https://openalex.org/keywords/gsm-services","display_name":"GSM services","score":0.5925779342651367},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5888196229934692},{"id":"https://openalex.org/keywords/mobile-identification-number","display_name":"Mobile identification number","score":0.5582966804504395},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5251650214195251},{"id":"https://openalex.org/keywords/mobile-database","display_name":"Mobile database","score":0.5152323842048645},{"id":"https://openalex.org/keywords/mobile-telephony","display_name":"Mobile telephony","score":0.5054047107696533},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.4819492995738983},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.4667914807796478},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4493999481201172},{"id":"https://openalex.org/keywords/mobile-station","display_name":"Mobile station","score":0.4320961534976959},{"id":"https://openalex.org/keywords/mobile-technology","display_name":"Mobile technology","score":0.2628381550312042},{"id":"https://openalex.org/keywords/mobile-radio","display_name":"Mobile radio","score":0.2086487114429474},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12993299961090088},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.12484544515609741}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7746948003768921},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6350270509719849},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.6050984859466553},{"id":"https://openalex.org/C205789325","wikidata":"https://www.wikidata.org/wiki/Q15811187","display_name":"GSM services","level":4,"score":0.5925779342651367},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5888196229934692},{"id":"https://openalex.org/C40105971","wikidata":"https://www.wikidata.org/wiki/Q3317648","display_name":"Mobile identification number","level":5,"score":0.5582966804504395},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5251650214195251},{"id":"https://openalex.org/C127353759","wikidata":"https://www.wikidata.org/wiki/Q6887091","display_name":"Mobile database","level":4,"score":0.5152323842048645},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.5054047107696533},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.4819492995738983},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.4667914807796478},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4493999481201172},{"id":"https://openalex.org/C207029474","wikidata":"https://www.wikidata.org/wiki/Q384018","display_name":"Mobile station","level":3,"score":0.4320961534976959},{"id":"https://openalex.org/C60952562","wikidata":"https://www.wikidata.org/wiki/Q6887246","display_name":"Mobile technology","level":3,"score":0.2628381550312042},{"id":"https://openalex.org/C2781307350","wikidata":"https://www.wikidata.org/wiki/Q6887221","display_name":"Mobile radio","level":2,"score":0.2086487114429474},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12993299961090088},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.12484544515609741},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3371676.3371682","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3371676.3371682","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W35428663","https://openalex.org/W2071376024","https://openalex.org/W2099391615","https://openalex.org/W2285957840","https://openalex.org/W2813085986","https://openalex.org/W2833444058","https://openalex.org/W2850549748","https://openalex.org/W2864784047","https://openalex.org/W6811933526"],"related_works":["https://openalex.org/W2084307667","https://openalex.org/W1974440652","https://openalex.org/W2756096634","https://openalex.org/W1982516639","https://openalex.org/W1992161503","https://openalex.org/W2131746547","https://openalex.org/W2237231908","https://openalex.org/W2138543523","https://openalex.org/W2595312624","https://openalex.org/W1547117562"],"abstract_inverted_index":{"The":[0,109],"mobile":[1,6,26,76,83,98],"phone":[2,27,77,84,99],"number":[3,28,78,85],"of":[4,13,24,74,106],"each":[5],"user":[7],"corresponds":[8],"to":[9,79,101],"a":[10,66,75],"call":[11,48,50],"record":[12],"the":[14,21,25,34,70,81,88,113],"communication":[15,35,107],"system":[16,36],"database.":[17],"This":[18],"paper":[19,64],"analyzes":[20],"security":[22],"risk":[23],"and":[29,54,97,120],"related":[30],"material":[31],"stored":[32],"in":[33],"database,":[37],"that":[38,112],"is,":[39],"inside":[40,118],"technicians":[41],"or":[42],"administrators":[43],"can":[44,115],"steal":[45],"obscurely":[46],"user's":[47,104],"number,":[49],"time,":[51],"SMS":[52],"content":[53],"other":[55],"important":[56],"information.":[57],"Aiming":[58],"at":[59],"these":[60],"hidden":[61],"dangers,":[62],"this":[63],"proposes":[65],"scheme":[67,89,114],"which":[68],"uses":[69],"lightweight":[71],"hash":[72,92],"digest":[73],"replace":[80],"original":[82],"delivery.":[86],"Additionally":[87],"considers":[90],"integratively":[91],"mapping,":[93],"hierarchical":[94],"database":[95],"management":[96],"charging":[100],"avoid":[102],"affecting":[103],"read":[105],"fees.":[108],"analysis":[110],"shows":[111],"effectively":[116],"prevent":[117],"jobs":[119],"resist":[121],"birthday":[122],"attacks.":[123]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
