{"id":"https://openalex.org/W2892023508","doi":"https://doi.org/10.1155/2018/7209475","title":"A Fog Computing Security: 2\u2010Adic Complexity of Balanced Sequences","display_name":"A Fog Computing Security: 2\u2010Adic Complexity of Balanced Sequences","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2892023508","doi":"https://doi.org/10.1155/2018/7209475","mag":"2892023508"},"language":"en","primary_location":{"id":"doi:10.1155/2018/7209475","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/7209475","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2018/7209475.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/wcmc/2018/7209475.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013269015","display_name":"Huijuan Wang","orcid":"https://orcid.org/0000-0002-3862-0323"},"institutions":[{"id":"https://openalex.org/I4210109739","display_name":"First Research Institute of the Ministry of Public Security","ror":"https://ror.org/01dkhme60","country_code":"CN","type":"facility","lineage":["https://openalex.org/I1302611135","https://openalex.org/I4210109739"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wang Hui-Juan","raw_affiliation_strings":["The Information Security Department, The First Research Institute of the Ministry of Public Security of P.R.C., Beijing 100084"],"raw_orcid":"https://orcid.org/0000-0002-3862-0323","affiliations":[{"raw_affiliation_string":"The Information Security Department, The First Research Institute of the Ministry of Public Security of P.R.C., Beijing 100084","institution_ids":["https://openalex.org/I4210109739"]}]},{"author_position":"last","author":{"id":null,"display_name":"Jiang Yong","orcid":null},"institutions":[{"id":"https://openalex.org/I4210109739","display_name":"First Research Institute of the Ministry of Public Security","ror":"https://ror.org/01dkhme60","country_code":"CN","type":"facility","lineage":["https://openalex.org/I1302611135","https://openalex.org/I4210109739"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiang Yong","raw_affiliation_strings":["The Information Security Department, The First Research Institute of the Ministry of Public Security of P.R.C., Beijing 100084, China","The Information Security Department, The First Research Institute of the Ministry of Public Security of P.R.C., Beijing 100084"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The Information Security Department, The First Research Institute of the Ministry of Public Security of P.R.C., Beijing 100084, China","institution_ids":["https://openalex.org/I4210109739"]},{"raw_affiliation_string":"The Information Security Department, The First Research Institute of the Ministry of Public Security of P.R.C., Beijing 100084","institution_ids":["https://openalex.org/I4210109739"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5013269015"],"corresponding_institution_ids":["https://openalex.org/I4210109739"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":0.106,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.45956604,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2018","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13234","display_name":"advanced mathematical theories","score":0.9632999897003174,"subfield":{"id":"https://openalex.org/subfields/2610","display_name":"Mathematical Physics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9564999938011169,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7765233516693115},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.7344034910202026},{"id":"https://openalex.org/keywords/exponential-function","display_name":"Exponential function","score":0.4950629770755768},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4923650026321411},{"id":"https://openalex.org/keywords/power-consumption","display_name":"Power consumption","score":0.4892456531524658},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.46358299255371094},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4590190649032593},{"id":"https://openalex.org/keywords/fog-computing","display_name":"Fog computing","score":0.45684611797332764},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41718336939811707},{"id":"https://openalex.org/keywords/periodic-sequence","display_name":"Periodic sequence","score":0.4133046269416809},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3818832039833069},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.3339608311653137},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2683429419994354},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.18741834163665771},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16959556937217712},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.0798528790473938}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7765233516693115},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.7344034910202026},{"id":"https://openalex.org/C151376022","wikidata":"https://www.wikidata.org/wiki/Q168698","display_name":"Exponential function","level":2,"score":0.4950629770755768},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4923650026321411},{"id":"https://openalex.org/C2984118289","wikidata":"https://www.wikidata.org/wiki/Q29954","display_name":"Power consumption","level":3,"score":0.4892456531524658},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.46358299255371094},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4590190649032593},{"id":"https://openalex.org/C2986652147","wikidata":"https://www.wikidata.org/wiki/Q21809931","display_name":"Fog computing","level":3,"score":0.45684611797332764},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41718336939811707},{"id":"https://openalex.org/C120241303","wikidata":"https://www.wikidata.org/wiki/Q3503302","display_name":"Periodic sequence","level":2,"score":0.4133046269416809},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3818832039833069},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.3339608311653137},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2683429419994354},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.18741834163665771},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16959556937217712},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0798528790473938},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2018/7209475","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/7209475","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2018/7209475.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d5a239067891451d920b31d1a2da5e65","is_oa":false,"landing_page_url":"https://doaj.org/article/d5a239067891451d920b31d1a2da5e65","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Mobile Computing, Vol 2018 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2018/7209475","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/7209475","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2018/7209475.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.8799999952316284}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2892023508.pdf","grobid_xml":"https://content.openalex.org/works/W2892023508.grobid-xml"},"referenced_works_count":1,"referenced_works":["https://openalex.org/W2123423914"],"related_works":["https://openalex.org/W2917050157","https://openalex.org/W4285171995","https://openalex.org/W3162567192","https://openalex.org/W4285292330","https://openalex.org/W4315836333","https://openalex.org/W2067082554","https://openalex.org/W2897986445","https://openalex.org/W88489696","https://openalex.org/W3165492765","https://openalex.org/W2109405615"],"abstract_inverted_index":{"In":[0],"the":[1,5,16,20,23,38,44,49,55,64,74,78],"fog":[2,33,50,90],"computing":[3,51],"environment,":[4],"periodic":[6,24,45,68,79],"sequence":[7,25,47,70,81],"can":[8],"provide":[9],"sufficient":[10],"authentication":[11],"code":[12],"and":[13,71],"also":[14],"reduce":[15],"power":[17],"consumption":[18],"in":[19,32,48,89],"verification.":[21],"But":[22],"faces":[26],"a":[27,59],"known":[28],"full\u2010cycle":[29],"attack":[30,41],"threat":[31,86],"computing.":[34,91],"This":[35],"paper":[36],"studies":[37],"2\u2010adic":[39,65,75],"complexity":[40,76],"ability":[42],"of":[43,67,77],"balance":[46,69],"environment.":[52],"It":[53],"uses":[54],"exponential":[56],"function":[57],"as":[58],"new":[60],"approach":[61],"to":[62],"study":[63],"properties":[66],"presents":[72],"that":[73],"balanced":[80],"is":[82],"not":[83],"an":[84],"attacking":[85],"when":[87],"used":[88]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
