{"id":"https://openalex.org/W1893199011","doi":"https://doi.org/10.3233/jcs-130483","title":"Special Issue: Advances in Security for Communication Networks","display_name":"Special Issue: Advances in Security for Communication Networks","publication_year":2013,"publication_date":"2013-11-22","ids":{"openalex":"https://openalex.org/W1893199011","doi":"https://doi.org/10.3233/jcs-130483","mag":"1893199011"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-130483","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-130483","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs483?id=journal-of-computer-security%2Fjcs483","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs483?id=journal-of-computer-security%2Fjcs483","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011010448","display_name":"Ivan Visconti","orcid":"https://orcid.org/0000-0003-2381-5846"},"institutions":[{"id":"https://openalex.org/I131729948","display_name":"University of Salerno","ror":"https://ror.org/0192m2k53","country_code":"IT","type":"education","lineage":["https://openalex.org/I131729948"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Ivan Visconti","raw_affiliation_strings":["University of Salerno, Italy. E-mail: visconti@unisa.it"],"affiliations":[{"raw_affiliation_string":"University of Salerno, Italy. E-mail: visconti@unisa.it","institution_ids":["https://openalex.org/I131729948"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5011010448"],"corresponding_institution_ids":["https://openalex.org/I131729948"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0750223,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":"5","first_page":"599","last_page":"600"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.20579999685287476,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.20579999685287476,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6776440143585205},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4891522228717804}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6776440143585205},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4891522228717804}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3233/jcs-130483","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-130483","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs483?id=journal-of-computer-security%2Fjcs483","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:iris.uniroma1.it:11573/1718820","is_oa":false,"landing_page_url":"https://hdl.handle.net/11573/1718820","pdf_url":null,"source":{"id":"https://openalex.org/S4377196107","display_name":"IRIS Research product catalog (Sapienza University of Rome)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/other"}],"best_oa_location":{"id":"doi:10.3233/jcs-130483","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-130483","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs483?id=journal-of-computer-security%2Fjcs483","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1893199011.pdf","grobid_xml":"https://content.openalex.org/works/W1893199011.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2130043461","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"The":[0],"success":[1],"of":[2,6,23,33,36,61,84,130,155,158,168,212,245,251,325],"the":[3,20,30,46,59,62,128,156,209,257,267,326],"Internet":[4],"and":[5,27,35,39,137,193,215,238,291,321],"communication":[7,66,99,176],"networks":[8,67,100],"in":[9,29,65,98,112,124,143,172,175,200,280,309,318,329],"general,":[10],"opened":[11],"new":[12],"intriguing":[13],"challenges":[14,171],"for":[15,18],"protocol":[16,220],"designers.Consider,":[17],"example,":[19],"classic":[21],"notion":[22,43],"\"secure":[24],"computation\"":[25],"introduced":[26,111],"achieved":[28],"seminal":[31],"works":[32],"Yao":[34],"Goldreich,":[37],"Micali":[38],"Wigderson.While":[40],"such":[41,169],"a":[42,76,197,219,296,315],"considers":[44],"only":[45],"stand-alone":[47],"setting,":[48],"where":[49],"parties":[50,72,79],"are":[51,73,249,314],"connected":[52,74],"to":[53,75,93,102,114,126,145,256,304],"each":[54],"other":[55],"but":[56],"isolated":[57],"from":[58],"rest":[60],"world,":[63],"security":[64,97,107,135,174],"is":[68],"more":[69,131],"demanding.Indeed,":[70],"when":[71],"network":[77,147],"(i.e.,":[78],"can":[80,301],"run":[81],"several":[82],"instances":[83],"protocols":[85,136],"concurrently),":[86],"secure":[87,203],"computation":[88],"has":[89],"been":[90,110,122,141],"proved":[91],"impossible":[92],"achieve.Therefore,":[94],"achieving":[95],"information":[96,173,201],"required":[101],"solve":[103],"various":[104,166,260],"open":[105],"problems.New":[106],"notions":[108],"have":[109,121,140,259],"order":[113,125,144],"better":[115],"model":[116],"real-world":[117],"scenarios.New":[118],"hardness":[119],"assumptions":[120],"used":[123,303],"enable":[127],"construction":[129,264],"powerful":[132,316],"cryptographic":[133],"primitives.New":[134],"proof":[138],"techniques":[139],"developed":[142],"defeat":[146],"attacks":[148],"mounted":[149],"by":[150,183,231,266,284],"malicious":[151],"adversaries.This":[152],"special":[153],"issue":[154],"Journal":[157],"Computer":[159],"Security":[160],"includes":[161],"six":[162],"papers":[163],"that":[164,223,253,300],"cover":[165],"aspects":[167],"recent":[170],"networks.The":[177],"paper":[178,227,277],"\"5PM:":[179],"Secure":[180],"pattern":[181,204],"matching\"":[182],"Joshua":[184],"Baron,":[185],"Karim":[186],"El":[187],"Defrawy,":[188],"Kirill":[189],"Minkovich,":[190],"Rafail":[191],"Ostrovsky":[192],"Eric":[194],"Tressler":[195],"addresses":[196],"popular":[198],"problem":[199],"security:":[202],"matching.The":[205],"authors":[206,268],"focus":[207],"on":[208,270],"specific":[210],"case":[211],"single-character":[213],"wildcards":[214],"substring":[216],"matching.They":[217],"show":[218],"called":[221],"5PM":[222],"outperforms":[224],"previous":[225,306],"constructions.The":[226],"\"Short":[228],"blind":[229,246],"signatures\"":[230],"Olivier":[232],"Blazy,":[233],"Georg":[234],"Fuchsbauer,":[235],"David":[236],"Pointcheval":[237],"Damien":[239],"Vergnaud":[240],"introduces":[241],"an":[242],"improved":[243],"form":[244],"signatures.Blind":[247],"signatures":[248,250,272],"messages":[252],"remain":[254],"hidden":[255],"signer.They":[258],"applications":[261,320],"(e.g.,":[262],"e-cash).The":[263],"given":[265],"focuses":[269],"short":[271],"obtained":[273],"with":[274],"minimal":[275],"interactions.The":[276],"\"Field":[278],"switching":[279],"BGV-style":[281],"homomorphic":[282,310],"encryption\"":[283],"Craig":[285],"Gentry,":[286],"Shai":[287],"Halevi,":[288],"Chris":[289],"Peikert":[290],"Nigel":[292],"P.":[293],"Smart":[294],"proposes":[295],"general":[297],"fieldswitching":[298],"transformation":[299],"be":[302],"outperform":[305],"transformations":[307],"needed":[308],"encryption":[311],"schemes.Such":[312],"schemes":[313],"tool":[317],"client-server":[319],"certainly":[322],"represent":[323],"one":[324],"main":[327],"novelties":[328],"Cryptography.":[330]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
