{"id":"https://openalex.org/W3168431088","doi":"https://doi.org/10.4018/ijisp.2021070103","title":"A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies","display_name":"A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies","publication_year":2021,"publication_date":"2021-06-07","ids":{"openalex":"https://openalex.org/W3168431088","doi":"https://doi.org/10.4018/ijisp.2021070103","mag":"3168431088"},"language":"en","primary_location":{"id":"doi:10.4018/ijisp.2021070103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijisp.2021070103","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056700063","display_name":"Nabil Kannouf","orcid":"https://orcid.org/0000-0001-6767-1026"},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Nabil Kannouf","raw_affiliation_strings":["Abdelmalek Essa\u00e2di University, Morocco"],"raw_orcid":"https://orcid.org/0000-0001-6767-1026","affiliations":[{"raw_affiliation_string":"Abdelmalek Essa\u00e2di University, Morocco","institution_ids":["https://openalex.org/I240042149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084964509","display_name":"Mohamed Labbi","orcid":"https://orcid.org/0000-0001-5110-5468"},"institutions":[{"id":"https://openalex.org/I4210108110","display_name":"Mohamed I University","ror":"https://ror.org/01ejxf797","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210108110"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mohamed Labbi","raw_affiliation_strings":["Mohamed I University, Morocco"],"raw_orcid":"https://orcid.org/0000-0001-5110-5468","affiliations":[{"raw_affiliation_string":"Mohamed I University, Morocco","institution_ids":["https://openalex.org/I4210108110"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025277549","display_name":"Yassine Chahid","orcid":"https://orcid.org/0000-0002-0907-073X"},"institutions":[{"id":"https://openalex.org/I4210108110","display_name":"Mohamed I University","ror":"https://ror.org/01ejxf797","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210108110"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Yassine Chahid","raw_affiliation_strings":["Mohamed I University, Morocco"],"raw_orcid":"https://orcid.org/0000-0002-0907-073X","affiliations":[{"raw_affiliation_string":"Mohamed I University, Morocco","institution_ids":["https://openalex.org/I4210108110"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050301079","display_name":"Mohammed Benabdellah","orcid":"https://orcid.org/0000-0001-6547-0853"},"institutions":[{"id":"https://openalex.org/I4210108110","display_name":"Mohamed I University","ror":"https://ror.org/01ejxf797","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210108110"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mohammed Benabdellah","raw_affiliation_strings":["Mohamed I University, Morocco"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Mohamed I University, Morocco","institution_ids":["https://openalex.org/I4210108110"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048731347","display_name":"Abdelmalek Azizi","orcid":"https://orcid.org/0000-0002-0634-1995"},"institutions":[{"id":"https://openalex.org/I4210108110","display_name":"Mohamed I University","ror":"https://ror.org/01ejxf797","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210108110"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Abdelmalek Azizi","raw_affiliation_strings":["Mohamed I University, Morocco"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Mohamed I University, Morocco","institution_ids":["https://openalex.org/I4210108110"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5056700063"],"corresponding_institution_ids":["https://openalex.org/I240042149"],"apc_list":null,"apc_paid":null,"fwci":0.3254,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.55915883,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"15","issue":"3","first_page":"33","last_page":"47"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9848999977111816,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9703999757766724,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8579772710800171},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7387079000473022},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6614612936973572},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5848772525787354},{"id":"https://openalex.org/keywords/random-number-generation","display_name":"Random number generation","score":0.48943963646888733},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.47790178656578064},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4770031273365021},{"id":"https://openalex.org/keywords/pseudorandom-number-generator","display_name":"Pseudorandom number generator","score":0.47295281291007996},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.459827184677124},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.442607581615448},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.43250736594200134},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4080169200897217},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35625922679901123},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20622646808624268},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.0721331536769867}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8579772710800171},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7387079000473022},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6614612936973572},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5848772525787354},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.48943963646888733},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.47790178656578064},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4770031273365021},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.47295281291007996},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.459827184677124},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.442607581615448},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.43250736594200134},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4080169200897217},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35625922679901123},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20622646808624268},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0721331536769867},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijisp.2021070103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijisp.2021070103","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jisp00:v:15:y:2021:i:3:p:33-47","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.2021070103","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1980981547","https://openalex.org/W2050204590","https://openalex.org/W2060059186","https://openalex.org/W2509090912","https://openalex.org/W3124543380"],"related_works":["https://openalex.org/W2104480405","https://openalex.org/W2772380824","https://openalex.org/W2062045810","https://openalex.org/W1534576401","https://openalex.org/W2988803943","https://openalex.org/W2068428530","https://openalex.org/W3124991594","https://openalex.org/W2775374936","https://openalex.org/W3111658143","https://openalex.org/W1989266974"],"abstract_inverted_index":{"In":[0,40,67],"RFID":[1],"technology,":[2],"communication":[3],"is":[4,23],"based":[5,80],"on":[6,81],"random":[7,78],"numbers,":[8],"and":[9,49,63],"the":[10,20,26,47,57,70,73,77,102],"numbers":[11,34],"used":[12],"there":[13],"are":[14,36,90,105],"pseudo-random":[15],"too":[16],"(PRN).":[17],"As":[18],"for":[19,108],"PRN,":[21],"it":[22],"generated":[24],"by":[25,96],"computational":[27],"tool":[28],"that":[29,35,53,104],"creates":[30],"a":[31],"sequence":[32],"of":[33,86],"generally":[37],"not":[38],"related.":[39],"cryptography,":[41],"we":[42,54],"usually":[43],"need":[44],"to":[45,61,75,100],"generate":[46],"encrypted":[48],"decrypted":[50],"keys,":[51],"so":[52],"can":[55],"use":[56,72],"genetic":[58],"algorithm":[59],"(GA)":[60],"find":[62,76],"present":[64],"those":[65],"keys.":[66],"this":[68,87],"paper,":[69],"authors":[71],"GA":[74,82],"keys":[79,103],"operators.":[83],"The":[84],"results":[85],"generation":[88],"attempt":[89],"tested":[91],"through":[92],"five":[93],"statistical":[94],"tests":[95],"which":[97],"they":[98],"try":[99],"determine":[101],"mostly":[106],"responsible":[107],"message-encryption.":[109]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
