{"id":"https://openalex.org/W3036957684","doi":"https://doi.org/10.23919/date48585.2020.9116290","title":"Design-flow Methodology for Secure Group Anonymous Authentication","display_name":"Design-flow Methodology for Secure Group Anonymous Authentication","publication_year":2020,"publication_date":"2020-03-01","ids":{"openalex":"https://openalex.org/W3036957684","doi":"https://doi.org/10.23919/date48585.2020.9116290","mag":"3036957684"},"language":"en","primary_location":{"id":"doi:10.23919/date48585.2020.9116290","is_oa":false,"landing_page_url":"https://doi.org/10.23919/date48585.2020.9116290","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102887756","display_name":"Rashmi Agrawal","orcid":"https://orcid.org/0000-0002-9461-0170"},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]},{"id":"https://openalex.org/I4210142473","display_name":"Adapti (Slovenia)","ror":"https://ror.org/04sdpvy45","country_code":"SI","type":"company","lineage":["https://openalex.org/I4210142473"]}],"countries":["SI","US"],"is_corresponding":true,"raw_author_name":"Rashmi Agrawal","raw_affiliation_strings":["Adaptive and Secure Computing Systems (ASCS) Laboratory, Boston University"],"affiliations":[{"raw_affiliation_string":"Adaptive and Secure Computing Systems (ASCS) Laboratory, Boston University","institution_ids":["https://openalex.org/I4210142473","https://openalex.org/I111088046"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021505206","display_name":"Lake Bu","orcid":"https://orcid.org/0000-0002-9450-6533"},"institutions":[{"id":"https://openalex.org/I1343143571","display_name":"Draper Laboratory","ror":"https://ror.org/04378d909","country_code":"US","type":"funder","lineage":["https://openalex.org/I1343143571"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lake Bu","raw_affiliation_strings":["The Charles Stark Draper Laboratory, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"The Charles Stark Draper Laboratory, Cambridge, MA","institution_ids":["https://openalex.org/I1343143571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076712370","display_name":"Eliakin del Rosario","orcid":null},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]},{"id":"https://openalex.org/I4210142473","display_name":"Adapti (Slovenia)","ror":"https://ror.org/04sdpvy45","country_code":"SI","type":"company","lineage":["https://openalex.org/I4210142473"]}],"countries":["SI","US"],"is_corresponding":false,"raw_author_name":"Eliakin Del Rosario","raw_affiliation_strings":["Adaptive and Secure Computing Systems (ASCS) Laboratory, Boston University"],"affiliations":[{"raw_affiliation_string":"Adaptive and Secure Computing Systems (ASCS) Laboratory, Boston University","institution_ids":["https://openalex.org/I4210142473","https://openalex.org/I111088046"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069200437","display_name":"Michel A. Kinsy","orcid":"https://orcid.org/0000-0002-1432-6939"},"institutions":[{"id":"https://openalex.org/I4210142473","display_name":"Adapti (Slovenia)","ror":"https://ror.org/04sdpvy45","country_code":"SI","type":"company","lineage":["https://openalex.org/I4210142473"]},{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["SI","US"],"is_corresponding":false,"raw_author_name":"Michel A. Kinsy","raw_affiliation_strings":["Adaptive and Secure Computing Systems (ASCS) Laboratory, Boston University"],"affiliations":[{"raw_affiliation_string":"Adaptive and Secure Computing Systems (ASCS) Laboratory, Boston University","institution_ids":["https://openalex.org/I4210142473","https://openalex.org/I111088046"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102887756"],"corresponding_institution_ids":["https://openalex.org/I111088046","https://openalex.org/I4210142473"],"apc_list":null,"apc_paid":null,"fwci":0.2669,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.63097642,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1544","last_page":"1549"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.76039719581604},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7577028274536133},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6554361581802368},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5327190160751343},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5141354203224182},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.47795867919921875},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.46904048323631287},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.45753055810928345},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4389949440956116},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4353153705596924},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.4117930829524994}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.76039719581604},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7577028274536133},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6554361581802368},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5327190160751343},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5141354203224182},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.47795867919921875},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.46904048323631287},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.45753055810928345},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4389949440956116},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4353153705596924},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.4117930829524994},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/date48585.2020.9116290","is_oa":false,"landing_page_url":"https://doi.org/10.23919/date48585.2020.9116290","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7300000190734863}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1565530534","https://openalex.org/W1574149717","https://openalex.org/W2021260181","https://openalex.org/W2133420971","https://openalex.org/W2137664544","https://openalex.org/W2293895957","https://openalex.org/W2800652629","https://openalex.org/W2911424200","https://openalex.org/W2963618387","https://openalex.org/W2964070845","https://openalex.org/W4205092462","https://openalex.org/W6745243287"],"related_works":["https://openalex.org/W2372678089","https://openalex.org/W2695299078","https://openalex.org/W2355956995","https://openalex.org/W2390768934","https://openalex.org/W2350048275","https://openalex.org/W2086874776","https://openalex.org/W1497930374","https://openalex.org/W2168345601","https://openalex.org/W2028268185","https://openalex.org/W2366964182"],"abstract_inverted_index":{"In":[0,22,69,105],"heterogeneous":[1],"distributed":[2],"systems,":[3,26],"computing":[4],"devices":[5,43],"and":[6,14,19,38,50,53,76,103,131],"software":[7],"components":[8,45],"often":[9],"come":[10],"from":[11],"different":[12,16],"providers":[13],"have":[15],"security,":[17],"trust,":[18],"privacy":[20,61],"levels.":[21],"many":[23],"of":[24,62],"these":[25],"the":[27,34,60,63,71,126],"need":[28,72],"frequently":[29],"arises":[30],"to":[31,36,41,74],"(i)":[32],"control":[33],"access":[35],"services":[37],"resources":[39],"granted":[40],"individual":[42],"or":[44,80],"in":[46],"a":[47,110,115],"context-aware":[48],"manner":[49],"(ii)":[51],"establish":[52],"enforce":[54],"data":[55],"sharing":[56],"policies":[57],"that":[58],"preserve":[59],"critical":[64],"information":[65],"on":[66],"end":[67],"users.":[68],"essence,":[70],"is":[73,90],"authenticate":[75],"anonymize":[77],"an":[78],"entity":[79],"device":[81],"simultaneously,":[82],"two":[83],"seemingly":[84],"contradictory":[85],"goals.":[86],"The":[87],"design":[88,112],"challenge":[89],"further":[91],"complicated":[92],"by":[93],"potential":[94],"security":[95,137],"problems,":[96],"such":[97],"as":[98],"man-in-the-middle":[99],"attacks,":[100],"hijacked":[101],"devices,":[102],"counterfeits.":[104],"this":[106],"work,":[107],"we":[108],"present":[109],"system":[111],"flow":[113],"for":[114,129],"trustworthy":[116],"group":[117],"anonymous":[118],"authentication":[119,130],"protocol":[120],"(GAAP),":[121],"which":[122],"not":[123],"only":[124],"fulfills":[125],"desired":[127],"functionality":[128],"privacy,":[132],"but":[133],"also":[134],"provides":[135],"strong":[136],"guarantees.":[138]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
