{"id":"https://openalex.org/W3184834610","doi":"https://doi.org/10.5220/0010502903950402","title":"Signer and Message Ambiguity from a Variety of Keys","display_name":"Signer and Message Ambiguity from a Variety of Keys","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3184834610","doi":"https://doi.org/10.5220/0010502903950402","mag":"3184834610"},"language":"en","primary_location":{"id":"doi:10.5220/0010502903950402","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0010502903950402","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0010502903950402","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017048395","display_name":"George Te\u015feleanu","orcid":"https://orcid.org/0000-0003-3953-2744"},"institutions":[{"id":"https://openalex.org/I58077936","display_name":"Romanian Academy","ror":"https://ror.org/0561n6946","country_code":"RO","type":"archive","lineage":["https://openalex.org/I58077936"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"George Te\u015feleanu","raw_affiliation_strings":["Advanced Technologies Institute, 10 Dinu Vintil\u0103, Bucharest, Romania, --- Select a Country ---","Simion Stoilow Institute of Mathematics of the Romanian Academy, 21 Calea Grivitei, Bucharest, Romania, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Advanced Technologies Institute, 10 Dinu Vintil\u0103, Bucharest, Romania, --- Select a Country ---","institution_ids":[]},{"raw_affiliation_string":"Simion Stoilow Institute of Mathematics of the Romanian Academy, 21 Calea Grivitei, Bucharest, Romania, --- Select a Country ---","institution_ids":["https://openalex.org/I58077936"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5017048395"],"corresponding_institution_ids":["https://openalex.org/I58077936"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0768442,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"395","last_page":"402"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14394","display_name":"Cognitive Science and Education Research","score":0.21969999372959137,"subfield":{"id":"https://openalex.org/subfields/2805","display_name":"Cognitive Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T14394","display_name":"Cognitive Science and Education Research","score":0.21969999372959137,"subfield":{"id":"https://openalex.org/subfields/2805","display_name":"Cognitive Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.21950000524520874,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7400482892990112},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.6722110509872437},{"id":"https://openalex.org/keywords/ambiguity","display_name":"Ambiguity","score":0.6382744312286377},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3488638997077942},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.15755322575569153},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13741642236709595}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7400482892990112},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.6722110509872437},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.6382744312286377},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3488638997077942},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.15755322575569153},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13741642236709595}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0010502903950402","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0010502903950402","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th International Conference on Security and Cryptography","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0010502903950402","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0010502903950402","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2353179089","https://openalex.org/W2923538289","https://openalex.org/W2353125546","https://openalex.org/W2470643824","https://openalex.org/W4400595174","https://openalex.org/W2349635380","https://openalex.org/W4353089801","https://openalex.org/W2353819554"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
