{"id":"https://openalex.org/W2485886373","doi":"https://doi.org/10.2498/cit.1002101","title":"Mixnets: Implementation and Performance Evaluation of Decryption and Re-encryption Types","display_name":"Mixnets: Implementation and Performance Evaluation of Decryption and Re-encryption Types","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W2485886373","doi":"https://doi.org/10.2498/cit.1002101","mag":"2485886373"},"language":"en","primary_location":{"id":"doi:10.2498/cit.1002101","is_oa":true,"landing_page_url":"https://doi.org/10.2498/cit.1002101","pdf_url":"http://cit.fer.hr/index.php/CIT/article/download/2101/1559","source":{"id":"https://openalex.org/S98565333","display_name":"Journal of Computing and Information Technology","issn_l":"1330-1136","issn":["1330-1136","1846-3908"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310314807","host_organization_name":"Faculty of Electrical Engineering and Computing, University of Zagreb","host_organization_lineage":["https://openalex.org/P4310314807"],"host_organization_lineage_names":["Faculty of Electrical Engineering and Computing, University of Zagreb"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computing and Information Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://cit.fer.hr/index.php/CIT/article/download/2101/1559","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055059150","display_name":"Pance Ribarski","orcid":null},"institutions":[{"id":"https://openalex.org/I76245029","display_name":"Saints Cyril and Methodius University of Skopje","ror":"https://ror.org/02wk2vx54","country_code":"MK","type":"education","lineage":["https://openalex.org/I76245029"]}],"countries":["MK"],"is_corresponding":true,"raw_author_name":"Pance Ribarski","raw_affiliation_strings":["Faculty of Computer Science and Engineering, University Ss. Cyril and Methodius, Skopje, Macedonia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science and Engineering, University Ss. Cyril and Methodius, Skopje, Macedonia","institution_ids":["https://openalex.org/I76245029"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005698634","display_name":"Ljupcho Antovski","orcid":"https://orcid.org/0000-0003-0666-9808"},"institutions":[{"id":"https://openalex.org/I76245029","display_name":"Saints Cyril and Methodius University of Skopje","ror":"https://ror.org/02wk2vx54","country_code":"MK","type":"education","lineage":["https://openalex.org/I76245029"]}],"countries":["MK"],"is_corresponding":false,"raw_author_name":"Ljupcho Antovski","raw_affiliation_strings":["Faculty of Computer Science and Engineering, University Ss. Cyril and Methodius, Skopje, Macedonia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science and Engineering, University Ss. Cyril and Methodius, Skopje, Macedonia","institution_ids":["https://openalex.org/I76245029"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5055059150"],"corresponding_institution_ids":["https://openalex.org/I76245029"],"apc_list":{"value":450,"currency":"EUR","value_usd":485},"apc_paid":{"value":450,"currency":"EUR","value_usd":485},"fwci":1.2844,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.84834669,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"20","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9056699275970459},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8102442622184753},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5271052122116089},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5001254081726074},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4596834182739258},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.43177860975265503},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.4305487871170044},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3767136037349701},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.31286370754241943}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9056699275970459},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8102442622184753},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5271052122116089},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5001254081726074},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4596834182739258},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.43177860975265503},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.4305487871170044},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3767136037349701},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.31286370754241943}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.2498/cit.1002101","is_oa":true,"landing_page_url":"https://doi.org/10.2498/cit.1002101","pdf_url":"http://cit.fer.hr/index.php/CIT/article/download/2101/1559","source":{"id":"https://openalex.org/S98565333","display_name":"Journal of Computing and Information Technology","issn_l":"1330-1136","issn":["1330-1136","1846-3908"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310314807","host_organization_name":"Faculty of Electrical Engineering and Computing, University of Zagreb","host_organization_lineage":["https://openalex.org/P4310314807"],"host_organization_lineage_names":["Faculty of Electrical Engineering and Computing, University of Zagreb"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computing and Information Technology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.2498/cit.1002101","is_oa":true,"landing_page_url":"https://doi.org/10.2498/cit.1002101","pdf_url":"http://cit.fer.hr/index.php/CIT/article/download/2101/1559","source":{"id":"https://openalex.org/S98565333","display_name":"Journal of Computing and Information Technology","issn_l":"1330-1136","issn":["1330-1136","1846-3908"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310314807","host_organization_name":"Faculty of Electrical Engineering and Computing, University of Zagreb","host_organization_lineage":["https://openalex.org/P4310314807"],"host_organization_lineage_names":["Faculty of Electrical Engineering and Computing, University of Zagreb"],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computing and Information Technology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2485886373.pdf","grobid_xml":"https://content.openalex.org/works/W2485886373.grobid-xml"},"referenced_works_count":8,"referenced_works":["https://openalex.org/W1484719800","https://openalex.org/W1585790764","https://openalex.org/W2103647628","https://openalex.org/W2108834246","https://openalex.org/W2128735745","https://openalex.org/W2141420453","https://openalex.org/W2269328400","https://openalex.org/W2911825405"],"related_works":["https://openalex.org/W2083338789","https://openalex.org/W1490787830","https://openalex.org/W1504651774","https://openalex.org/W2528467228","https://openalex.org/W1493446239","https://openalex.org/W2391717201","https://openalex.org/W1984757784","https://openalex.org/W2162118494","https://openalex.org/W1860988706","https://openalex.org/W1979547103"],"abstract_inverted_index":{"The":[0,17],"anonymous":[1,12],"channels":[2],"have":[3,36],"been":[4,37],"the":[5,25,29,32,49,53,77,87,91,96,102,110,115,118,123],"essence":[6],"of":[7,31,63,89,94,98,105,128],"numerous":[8],"protocols":[9],"that":[10],"include":[11],"message":[13],"passing":[14],"between":[15],"peers.":[16],"mixnet":[18],"structure":[19],"is":[20],"one":[21,67],"way":[22],"to":[23,46,121],"accomplish":[24],"anonymity":[26],".":[27],"Since":[28],"publication":[30],"Chaumian":[33],"mixnet,":[34],"there":[35],"many":[38],"practical":[39,119],"implementations.":[40],"There":[41],"are":[42],"two":[43],"main":[44],"approaches":[45],"implement":[47],"mixnets:":[48],"decryption":[50,68],"(Chaumian)":[51],"and":[52,69,81,101],"re-encryption":[54,71],"mixnets.":[55],"In":[56,109],"this":[57],"paper":[58],"we":[59,113],"analyze":[60],"four":[61],"types":[62],"mixnets,":[64],"from":[65,117],"which":[66,126],"three":[70],"types.":[72],"They":[73],"were":[74],"implemented":[75],"in":[76],"Java":[78],"programing":[79],"language":[80],"evaluated":[82],"on":[83],"several":[84],"criterias":[85],"as:":[86],"number":[88,93,97],"messages,":[90],"total":[92],"nodes,":[95,100],"threshold":[99],"key":[103],"length":[104],"underlying":[106],"crypto":[107],"system.":[108],"results":[111,116],"section":[112],"compare":[114],"tests":[120],"answer":[122],"research":[124],"question,":[125],"type":[127],"mixnets":[129],"has":[130],"better":[131],"features.":[132]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
