{"id":"https://openalex.org/W3048368515","doi":"https://doi.org/10.3233/jifs-189144","title":"A secured signcryption scheme for e-payment system using hyper elliptic curve","display_name":"A secured signcryption scheme for e-payment system using hyper elliptic curve","publication_year":2020,"publication_date":"2020-08-11","ids":{"openalex":"https://openalex.org/W3048368515","doi":"https://doi.org/10.3233/jifs-189144","mag":"3048368515"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-189144","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-189144","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031631739","display_name":"Malathi Devarajan","orcid":null},"institutions":[{"id":"https://openalex.org/I932239252","display_name":"SASTRA University","ror":"https://ror.org/032jk8892","country_code":"IN","type":"education","lineage":["https://openalex.org/I932239252"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Malathi Devarajan","raw_affiliation_strings":["School of Computing, SASTRA Deemed University, Thanjavur, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"School of Computing, SASTRA Deemed University, Thanjavur, Tamil Nadu, India","institution_ids":["https://openalex.org/I932239252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066996995","display_name":"N. Sasikaladevi","orcid":null},"institutions":[{"id":"https://openalex.org/I932239252","display_name":"SASTRA University","ror":"https://ror.org/032jk8892","country_code":"IN","type":"education","lineage":["https://openalex.org/I932239252"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"N. Sasikaladevi","raw_affiliation_strings":["School of Computing, SASTRA Deemed University, Thanjavur, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"School of Computing, SASTRA Deemed University, Thanjavur, Tamil Nadu, India","institution_ids":["https://openalex.org/I932239252"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5031631739"],"corresponding_institution_ids":["https://openalex.org/I932239252"],"apc_list":null,"apc_paid":null,"fwci":0.2743,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.64134883,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"39","issue":"6","first_page":"8237","last_page":"8247"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.9911020994186401},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7286038398742676},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.5788050889968872},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.5439966917037964},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5438852310180664},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5431115627288818},{"id":"https://openalex.org/keywords/payment-system","display_name":"Payment system","score":0.4623379111289978},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.455679714679718},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.44538843631744385},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.4142373502254486},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.324013352394104},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.28686386346817017},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2263718545436859},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11648598313331604},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.07899805903434753}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.9911020994186401},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7286038398742676},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.5788050889968872},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.5439966917037964},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5438852310180664},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5431115627288818},{"id":"https://openalex.org/C2776983043","wikidata":"https://www.wikidata.org/wiki/Q986008","display_name":"Payment system","level":3,"score":0.4623379111289978},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.455679714679718},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.44538843631744385},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.4142373502254486},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.324013352394104},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.28686386346817017},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2263718545436859},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11648598313331604},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07899805903434753},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-189144","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-189144","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W827356921","https://openalex.org/W1601001795","https://openalex.org/W1980252607","https://openalex.org/W1982734506","https://openalex.org/W1986603155","https://openalex.org/W2002635145","https://openalex.org/W2009088652","https://openalex.org/W2026130590","https://openalex.org/W2073345934","https://openalex.org/W2113840257","https://openalex.org/W2165526921","https://openalex.org/W2199306310","https://openalex.org/W2754156730","https://openalex.org/W2790612120","https://openalex.org/W2913511931","https://openalex.org/W2966135632","https://openalex.org/W3128228167","https://openalex.org/W4230068426","https://openalex.org/W4250344549","https://openalex.org/W4255286282","https://openalex.org/W6789967209"],"related_works":["https://openalex.org/W2043038862","https://openalex.org/W2380984046","https://openalex.org/W2382100709","https://openalex.org/W4239903230","https://openalex.org/W2359295969","https://openalex.org/W1973703321","https://openalex.org/W4235052381","https://openalex.org/W1591098212","https://openalex.org/W3202719367","https://openalex.org/W2556724601"],"abstract_inverted_index":{"With":[0],"the":[1,61,121,140,151],"growing":[2],"trend":[3],"of":[4,60,120,133],"Communication":[5],"Technologies":[6],"(ICT),":[7],"buying":[8],"goods":[9],"through":[10,125],"online":[11,19],"has":[12],"been":[13],"increased":[14],"drastically.":[15],"Besides,":[16],"e-payment":[17,41,76,109],"makes":[18],"purchase":[20],"easier":[21],"and":[22,35,116,137,149,156],"made":[23],"our":[24],"daily":[25],"life":[26],"more":[27],"convenient.":[28],"However,":[29],"there":[30],"exists":[31],"a":[32,44,126],"user":[33,85],"privacy":[34],"data":[36],"security":[37,119],"issue":[38],"in":[39,79,105],"conventional":[40],"systems.":[42],"Thus,":[43],"hyper":[45],"elliptic":[46],"curve":[47],"based":[48],"signcryption":[49,96,100],"scheme":[50,101],"is":[51,63,78,92,123,154],"proposed":[52,99],"to":[53,83,94,111],"achieve":[54],"reduced":[55],"computational":[56,152],"cost.":[57],"Because,":[58],"most":[59],"payment":[62],"processed":[64],"on":[65],"resource":[66],"constraint":[67],"devices":[68],"like":[69,108],"smart":[70],"phone,":[71],"hence":[72],"an":[73,87],"energy":[74],"efficient":[75],"system":[77,110,122],"requisite.":[80],"In":[81],"order":[82],"ensure":[84,112],"authenticity,":[86],"aadhaar":[88],"number":[89],"(unique":[90],"identity)":[91],"used":[93],"generate":[95],"key.":[97],"The":[98,118],"can":[102],"be":[103],"implemented":[104],"real-time":[106],"applications":[107],"confidentiality,":[113],"privacy,":[114],"authenticity":[115],"integrity.":[117],"validated":[124],"simulation":[127],"tool":[128],"\u2013":[129],"AVISPA":[130],"(Automated":[131],"Validation":[132],"Internet":[134],"Security":[135],"Protocols":[136],"Applications).":[138],"Further,":[139],"resistivity":[141],"against":[142],"various":[143],"cryptographic":[144],"attacks":[145],"was":[146],"analyzed":[147],"informally":[148],"also":[150],"cost":[153],"estimated":[155],"compared":[157],"with":[158],"other":[159],"related":[160],"schemes.":[161]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-22T08:09:32.410652","created_date":"2025-10-10T00:00:00"}
