{"id":"https://openalex.org/W2811124517","doi":"https://doi.org/10.3233/jifs-169745","title":"Intelligent encryption algorithm for network communication parallel data of information release terminal","display_name":"Intelligent encryption algorithm for network communication parallel data of information release terminal","publication_year":2018,"publication_date":"2018-06-28","ids":{"openalex":"https://openalex.org/W2811124517","doi":"https://doi.org/10.3233/jifs-169745","mag":"2811124517"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-169745","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-169745","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100526387","display_name":"Yang Xiao-hong","orcid":"https://orcid.org/0000-0001-6985-3173"},"institutions":[{"id":"https://openalex.org/I154833797","display_name":"Lingnan Normal University","ror":"https://ror.org/01h6ecw13","country_code":"CN","type":"education","lineage":["https://openalex.org/I154833797"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohong Yang","raw_affiliation_strings":["Network and Information Technology Center, Lingnan Normal University, Zhanjiang, China"],"affiliations":[{"raw_affiliation_string":"Network and Information Technology Center, Lingnan Normal University, Zhanjiang, China","institution_ids":["https://openalex.org/I154833797"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025621341","display_name":"Donghong Yang","orcid":"https://orcid.org/0009-0002-4518-8994"},"institutions":[{"id":"https://openalex.org/I79223203","display_name":"Guangdong Ocean University","ror":"https://ror.org/0462wa640","country_code":"CN","type":"education","lineage":["https://openalex.org/I79223203"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Donghong Yang","raw_affiliation_strings":["Electronics and Information Engineering College, Guangdong Ocean University, Zhanjiang, China"],"affiliations":[{"raw_affiliation_string":"Electronics and Information Engineering College, Guangdong Ocean University, Zhanjiang, China","institution_ids":["https://openalex.org/I79223203"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048552997","display_name":"S. Aue","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Aue","raw_affiliation_strings":["LOREAL Res and Innovat, Rue Pierre Dreyfus, F-92110 Clichy, France"],"affiliations":[{"raw_affiliation_string":"LOREAL Res and Innovat, Rue Pierre Dreyfus, F-92110 Clichy, France","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5025621341"],"corresponding_institution_ids":["https://openalex.org/I79223203"],"apc_list":null,"apc_paid":null,"fwci":0.1045,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.43140227,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"35","issue":"4","first_page":"4245","last_page":"4255"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9639000296592712,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8231345415115356},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7427809834480286},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.7297667860984802},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6841228604316711},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6258935332298279},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5510929226875305},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.47653254866600037},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46603816747665405},{"id":"https://openalex.org/keywords/terminal","display_name":"Terminal (telecommunication)","score":0.429992139339447},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4260876774787903},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.41349589824676514},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.40153539180755615},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38376104831695557},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3524753749370575},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27993980050086975}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8231345415115356},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7427809834480286},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.7297667860984802},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6841228604316711},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6258935332298279},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5510929226875305},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.47653254866600037},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46603816747665405},{"id":"https://openalex.org/C2779664074","wikidata":"https://www.wikidata.org/wiki/Q3518405","display_name":"Terminal (telecommunication)","level":2,"score":0.429992139339447},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4260876774787903},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.41349589824676514},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.40153539180755615},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38376104831695557},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3524753749370575},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27993980050086975}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-169745","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-169745","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1488118723","https://openalex.org/W1556794428","https://openalex.org/W1586011495","https://openalex.org/W1830572398","https://openalex.org/W2028653280","https://openalex.org/W2049277103","https://openalex.org/W2202044034","https://openalex.org/W2255162882","https://openalex.org/W2511830748","https://openalex.org/W2537447541","https://openalex.org/W2561013577","https://openalex.org/W2564774718","https://openalex.org/W2566739183","https://openalex.org/W2568915520","https://openalex.org/W2587317349","https://openalex.org/W2742440882","https://openalex.org/W2751163593","https://openalex.org/W2752831391","https://openalex.org/W2780777486","https://openalex.org/W2782466765","https://openalex.org/W2789027102","https://openalex.org/W2962680612","https://openalex.org/W3099892037","https://openalex.org/W7055167637"],"related_works":["https://openalex.org/W2997530193","https://openalex.org/W2942137924","https://openalex.org/W4236344152","https://openalex.org/W4310649982","https://openalex.org/W1589129854","https://openalex.org/W2802117553","https://openalex.org/W2939324531","https://openalex.org/W2011667854","https://openalex.org/W4294104609","https://openalex.org/W3204260572"],"abstract_inverted_index":{"The":[0,65],"traditional":[1],"algorithm":[2,36,187],"does":[3],"not":[4],"take":[5],"account":[6],"of":[7,11,21,42,90,104,177],"the":[8,54,81,84,88,91,95,100,102,105,110,132,145,149,152,158,164,169,175,185],"authentication":[9,67,93],"problem":[10],"terminal":[12,45,98,108],"and":[13,25,59,73,99,135,148,166,191],"server.":[14],"It":[15],"has":[16,188],"poor":[17],"security,":[18],"heavy":[19],"computation":[20],"encryption":[22,35,160],"or":[23],"decryption,":[24],"low":[26],"efficiency.":[27,192],"To":[28],"address":[29],"these":[30],"problems,":[31],"a":[32,77],"new":[33],"intelligent":[34],"for":[37,83],"network":[38],"communication":[39,133],"parallel":[40,120],"data":[41,68,125],"information":[43,96,106,124],"release":[44,97,107,111,123],"is":[46,69,116,127,138,154,171],"proposed":[47,186],"in":[48,94,131],"this":[49],"paper.":[50],"After":[51,87,143,162],"users\u2019":[52],"registration,":[53],"registered":[55],"ID,":[56],"user":[57,103],"password,":[58],"two":[60],"random":[61],"numbers":[62],"are":[63],"entered.":[64],"first":[66,85],"obtained":[70],"by":[71],"calculating":[72],"then":[74],"transferred":[75],"through":[76],"secure":[78],"channel":[79],"to":[80,157,174],"server":[82],"authentication.":[86],"success":[89],"identity":[92],"server,":[101],"obtains":[109],"authority.":[112],"Self-inverse":[113],"key":[114,141,150,167],"matrix":[115,147],"generated":[117],"with":[118,140],"MapReduce":[119],"mechanism.":[121],"Source":[122],"file":[126],"divided":[128],"into":[129],"blocks":[130],"process,":[134],"each":[136],"block":[137],"encrypted":[139,155],"matrix.":[142],"dividing":[144],"plaintext":[146,153,170],"matrix,":[151,168],"according":[156,173],"Hill":[159,178],"principle.":[161,180],"obtaining":[163],"ciphertext":[165],"decrypted":[172],"principle":[176],"decryption":[179],"Experimental":[181],"results":[182],"show":[183],"that":[184],"high":[189],"security":[190]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
