{"id":"https://openalex.org/W2015765008","doi":"https://doi.org/10.4304/jnw.9.11.3113-3119","title":"Broadcast Encryption Based on Bidirectional Remote Authentication Scheme","display_name":"Broadcast Encryption Based on Bidirectional Remote Authentication Scheme","publication_year":1969,"publication_date":"1969-12-31","ids":{"openalex":"https://openalex.org/W2015765008","doi":"https://doi.org/10.4304/jnw.9.11.3113-3119","mag":"2015765008"},"language":"en","primary_location":{"id":"doi:10.4304/jnw.9.11.3113-3119","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jnw.9.11.3113-3119","pdf_url":null,"source":{"id":"https://openalex.org/S189188848","display_name":"Journal of Networks","issn_l":"1796-2056","issn":["1796-2056"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100414902","display_name":"Lihua Zhang","orcid":"https://orcid.org/0000-0002-5353-6875"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lihua Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051513509","display_name":"Xichang Dai","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xichang Dai","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5078599762","display_name":"Haiquan Fan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Haiquan Fan","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100414902"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23977615,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"11","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.48739999532699585,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.48739999532699585,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.31520000100135803,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.013000000268220901,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.93529212474823},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6073673367500305},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.586641252040863},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5366033911705017},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48592033982276917},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4480323791503906}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.93529212474823},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6073673367500305},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.586641252040863},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5366033911705017},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48592033982276917},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4480323791503906},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4304/jnw.9.11.3113-3119","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jnw.9.11.3113-3119","pdf_url":null,"source":{"id":"https://openalex.org/S189188848","display_name":"Journal of Networks","issn_l":"1796-2056","issn":["1796-2056"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1601035152","https://openalex.org/W2048887528","https://openalex.org/W2076460533","https://openalex.org/W2108834246","https://openalex.org/W2113446256","https://openalex.org/W2156186849","https://openalex.org/W2170121772","https://openalex.org/W4234871063","https://openalex.org/W6662345531"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4289281780","https://openalex.org/W2359552542","https://openalex.org/W2374897487","https://openalex.org/W2242172122","https://openalex.org/W2912135041"],"abstract_inverted_index":{"In":[0],"order":[1],"to":[2,86,95],"ensure":[3],"the":[4,16,20,23,25,40,60,75,88,97,100,111,118,122,129,138],"established":[5],"mobile":[6],"Ad":[7,49],"hoc":[8,50],"networks":[9],"against":[10],"unauthorized":[11],"user":[12,130],"access,":[13],"we":[14,80],"need":[15],"identity":[17,139],"authentication":[18,29,43,140],"of":[19,74,91,99,141],"nodes":[21],"in":[22,30,48],"network.Using":[24],"password":[26,42,131],"for":[27],"remote":[28,41],"network":[31],"is":[32,53],"more":[33,35],"and":[34,68,78,94,121,143],"attractive.":[36],"This":[37],"paper":[38],"analyzes":[39],"scheme":[44,61,85,102,105],"based":[45],"on":[46],"threshold":[47],"network,":[51],"which":[52],"proposed":[54],"by":[55],"Chai.":[56],"We":[57],"find":[58],"that":[59],"cannot":[62],"prevent":[63,128],"passive":[64,92,112],"attacks,":[65],"counterfeit":[66],"attack,":[67,93,120],"server":[69,123],"spoofing":[70,124],"attacks.":[71],"Combining":[72],"advantages":[73],"broadcast":[76],"encryption":[77],"password,":[79],"propose":[81],"a":[82],"new":[83],"improved":[84],"solve":[87],"security":[89],"vulnerabilities":[90],"improve":[96],"performance":[98,147],"original":[101],"security.":[103],"The":[104],"obtains":[106],"many":[107],"merits:1)":[108],"it":[109,115,126,135],"overcomes":[110],"attack.":[113],"2)":[114],"can":[116,127,136],"resist":[117],"impersonation":[119],"attacks.3)":[125],"from":[132],"being":[133],"modified.4)":[134],"implemente":[137],"nodes,":[142],"has":[144],"better":[145],"calculation":[146]},"counts_by_year":[],"updated_date":"2026-03-03T08:47:05.690250","created_date":"2025-10-10T00:00:00"}
