A Secure and Efficient Location Update Scheme for Next Generation Proxy Mobile IP in Distributed Environment Article Swipe
YOU?
·
· 2015
· Open Access
·
· DOI: https://doi.org/10.1016/j.procs.2015.07.488
Usage of wireless networks among the users is apparently high. But, efficiency of the network gets decreased because of the challenges in the network. In proxy mobile IPv6 (PMIPv6), the message exchange for location update by any mobile device is established in centralized environment. Here, the messages are sent and received through local mobility anchor with centralized feature. As a result, there is devastating traffic at local mobility anchor which increases the cost of network. Also, the location update in distributed mobility environment is vulnerable to attacks such as false binding update, man-in-the-middle, replay attack etc. Therefore, the development of location update scheme necessitates the security enhancement and reduction in cost. Hence, the present paper proposes a new secure and efficient location update scheme using tokenization. It eliminates the additional message exchanges such as proxy binding update, binding query and acknowledgements between the hosts required in the earlier works. Here, the traffic overhead is controlled by distributing the token of mobile node with mobile access gateway in distributed mobility environment. The security of the proposed scheme is validated using AVISPA – a security model checker. Finally, the analysis of security and performance evaluation demonstrates that the proposed scheme shows better security and significant reduction in the cost of signaling messages and data packet delivery.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1016/j.procs.2015.07.488
- OA Status
- diamond
- Cited By
- 5
- References
- 16
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W1858523359
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W1858523359Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1016/j.procs.2015.07.488Digital Object Identifier
- Title
-
A Secure and Efficient Location Update Scheme for Next Generation Proxy Mobile IP in Distributed EnvironmentWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2015Year of publication
- Publication date
-
2015-01-01Full publication date if available
- Authors
-
Senthilkumar Mathi, P.N. AnbarasiList of authors in order
- Landing page
-
https://doi.org/10.1016/j.procs.2015.07.488Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1016/j.procs.2015.07.488Direct OA link when available
- Concepts
-
Computer science, Computer network, Proxy Mobile IPv6, Mutual authentication, Network packet, Replay attack, Overhead (engineering), Default gateway, Mobile IP, Password, Operating systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
5Total citation count in OpenAlex
- Citations by year (recent)
-
2020: 1, 2019: 1, 2018: 1, 2017: 1, 2015: 1Per-year citation counts (last 5 years)
- References (count)
-
16Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W1858523359 |
|---|---|
| doi | https://doi.org/10.1016/j.procs.2015.07.488 |
| ids.doi | https://doi.org/10.1016/j.procs.2015.07.488 |
| ids.mag | 1858523359 |
| ids.openalex | https://openalex.org/W1858523359 |
| fwci | 0.50123666 |
| type | article |
| title | A Secure and Efficient Location Update Scheme for Next Generation Proxy Mobile IP in Distributed Environment |
| biblio.issue | |
| biblio.volume | 57 |
| biblio.last_page | 951 |
| biblio.first_page | 942 |
| topics[0].id | https://openalex.org/T10651 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.9994000196456909 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2208 |
| topics[0].subfield.display_name | Electrical and Electronic Engineering |
| topics[0].display_name | IPv6, Mobility, Handover, Networks, Security |
| topics[1].id | https://openalex.org/T11504 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9936000108718872 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Advanced Authentication Protocols Security |
| topics[2].id | https://openalex.org/T10246 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9634000062942505 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Mobile Ad Hoc Networks |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.9090592861175537 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C31258907 |
| concepts[1].level | 1 |
| concepts[1].score | 0.7625831365585327 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[1].display_name | Computer network |
| concepts[2].id | https://openalex.org/C2778610037 |
| concepts[2].level | 4 |
| concepts[2].score | 0.6321278214454651 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q7252889 |
| concepts[2].display_name | Proxy Mobile IPv6 |
| concepts[3].id | https://openalex.org/C2781221063 |
| concepts[3].level | 3 |
| concepts[3].score | 0.5591264367103577 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q6944186 |
| concepts[3].display_name | Mutual authentication |
| concepts[4].id | https://openalex.org/C158379750 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5411021709442139 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q214111 |
| concepts[4].display_name | Network packet |
| concepts[5].id | https://openalex.org/C11560541 |
| concepts[5].level | 3 |
| concepts[5].score | 0.48291513323783875 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1756025 |
| concepts[5].display_name | Replay attack |
| concepts[6].id | https://openalex.org/C2779960059 |
| concepts[6].level | 2 |
| concepts[6].score | 0.4275969862937927 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q7113681 |
| concepts[6].display_name | Overhead (engineering) |
| concepts[7].id | https://openalex.org/C187713609 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4258264899253845 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q2465461 |
| concepts[7].display_name | Default gateway |
| concepts[8].id | https://openalex.org/C82203111 |
| concepts[8].level | 3 |
| concepts[8].score | 0.3229537606239319 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q205936 |
| concepts[8].display_name | Mobile IP |
| concepts[9].id | https://openalex.org/C109297577 |
| concepts[9].level | 2 |
| concepts[9].score | 0.1919407844543457 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q161157 |
| concepts[9].display_name | Password |
| concepts[10].id | https://openalex.org/C111919701 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[10].display_name | Operating system |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.9090592861175537 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/computer-network |
| keywords[1].score | 0.7625831365585327 |
| keywords[1].display_name | Computer network |
| keywords[2].id | https://openalex.org/keywords/proxy-mobile-ipv6 |
| keywords[2].score | 0.6321278214454651 |
| keywords[2].display_name | Proxy Mobile IPv6 |
| keywords[3].id | https://openalex.org/keywords/mutual-authentication |
| keywords[3].score | 0.5591264367103577 |
| keywords[3].display_name | Mutual authentication |
| keywords[4].id | https://openalex.org/keywords/network-packet |
| keywords[4].score | 0.5411021709442139 |
| keywords[4].display_name | Network packet |
| keywords[5].id | https://openalex.org/keywords/replay-attack |
| keywords[5].score | 0.48291513323783875 |
| keywords[5].display_name | Replay attack |
| keywords[6].id | https://openalex.org/keywords/overhead |
| keywords[6].score | 0.4275969862937927 |
| keywords[6].display_name | Overhead (engineering) |
| keywords[7].id | https://openalex.org/keywords/default-gateway |
| keywords[7].score | 0.4258264899253845 |
| keywords[7].display_name | Default gateway |
| keywords[8].id | https://openalex.org/keywords/mobile-ip |
| keywords[8].score | 0.3229537606239319 |
| keywords[8].display_name | Mobile IP |
| keywords[9].id | https://openalex.org/keywords/password |
| keywords[9].score | 0.1919407844543457 |
| keywords[9].display_name | Password |
| language | en |
| locations[0].id | doi:10.1016/j.procs.2015.07.488 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S120348307 |
| locations[0].source.issn | 1877-0509 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1877-0509 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Procedia Computer Science |
| locations[0].source.host_organization | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_name | Elsevier BV |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_lineage_names | Elsevier BV |
| locations[0].license | cc-by-nc-nd |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Procedia Computer Science |
| locations[0].landing_page_url | https://doi.org/10.1016/j.procs.2015.07.488 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5018462739 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-7134-8448 |
| authorships[0].author.display_name | Senthilkumar Mathi |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I81556334 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham (University), Coimbatore - 641 112, India |
| authorships[0].institutions[0].id | https://openalex.org/I81556334 |
| authorships[0].institutions[0].ror | https://ror.org/03am10p12 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I81556334 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Amrita Vishwa Vidyapeetham |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Senthilkumar Mathi |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham (University), Coimbatore - 641 112, India |
| authorships[1].author.id | https://openalex.org/A5080981223 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | P.N. Anbarasi |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I81556334 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham (University), Coimbatore - 641 112, India |
| authorships[1].institutions[0].id | https://openalex.org/I81556334 |
| authorships[1].institutions[0].ror | https://ror.org/03am10p12 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I81556334 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Amrita Vishwa Vidyapeetham |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | P.N. Anbarasi |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham (University), Coimbatore - 641 112, India |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1016/j.procs.2015.07.488 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | A Secure and Efficient Location Update Scheme for Next Generation Proxy Mobile IP in Distributed Environment |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10651 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.9994000196456909 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2208 |
| primary_topic.subfield.display_name | Electrical and Electronic Engineering |
| primary_topic.display_name | IPv6, Mobility, Handover, Networks, Security |
| related_works | https://openalex.org/W807097251, https://openalex.org/W2127880976, https://openalex.org/W2119520755, https://openalex.org/W2187425543, https://openalex.org/W2082895023, https://openalex.org/W2240531867, https://openalex.org/W2903498931, https://openalex.org/W1985227832, https://openalex.org/W2012573940, https://openalex.org/W2046143260 |
| cited_by_count | 5 |
| counts_by_year[0].year | 2020 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2019 |
| counts_by_year[1].cited_by_count | 1 |
| counts_by_year[2].year | 2018 |
| counts_by_year[2].cited_by_count | 1 |
| counts_by_year[3].year | 2017 |
| counts_by_year[3].cited_by_count | 1 |
| counts_by_year[4].year | 2015 |
| counts_by_year[4].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1016/j.procs.2015.07.488 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S120348307 |
| best_oa_location.source.issn | 1877-0509 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1877-0509 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Procedia Computer Science |
| best_oa_location.source.host_organization | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_name | Elsevier BV |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_lineage_names | Elsevier BV |
| best_oa_location.license | cc-by-nc-nd |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Procedia Computer Science |
| best_oa_location.landing_page_url | https://doi.org/10.1016/j.procs.2015.07.488 |
| primary_location.id | doi:10.1016/j.procs.2015.07.488 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S120348307 |
| primary_location.source.issn | 1877-0509 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1877-0509 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Procedia Computer Science |
| primary_location.source.host_organization | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_name | Elsevier BV |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_lineage_names | Elsevier BV |
| primary_location.license | cc-by-nc-nd |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Procedia Computer Science |
| primary_location.landing_page_url | https://doi.org/10.1016/j.procs.2015.07.488 |
| publication_date | 2015-01-01 |
| publication_year | 2015 |
| referenced_works | https://openalex.org/W6703228860, https://openalex.org/W4205670688, https://openalex.org/W2117857609, https://openalex.org/W6698335775, https://openalex.org/W1499405437, https://openalex.org/W2249768258, https://openalex.org/W2038374990, https://openalex.org/W2131789459, https://openalex.org/W7055485407, https://openalex.org/W2015807035, https://openalex.org/W1546245031, https://openalex.org/W2086270974, https://openalex.org/W2028335694, https://openalex.org/W1532865348, https://openalex.org/W2060716410, https://openalex.org/W2336405989 |
| referenced_works_count | 16 |
| abstract_inverted_index.a | 59, 116, 181 |
| abstract_inverted_index.As | 58 |
| abstract_inverted_index.In | 24 |
| abstract_inverted_index.It | 126 |
| abstract_inverted_index.as | 88, 133 |
| abstract_inverted_index.at | 65 |
| abstract_inverted_index.by | 35, 155 |
| abstract_inverted_index.in | 21, 41, 79, 109, 145, 166, 204 |
| abstract_inverted_index.is | 7, 39, 62, 83, 153, 176 |
| abstract_inverted_index.of | 1, 12, 18, 73, 99, 159, 172, 188, 207 |
| abstract_inverted_index.to | 85 |
| abstract_inverted_index.The | 170 |
| abstract_inverted_index.and | 49, 107, 119, 139, 190, 201, 210 |
| abstract_inverted_index.any | 36 |
| abstract_inverted_index.are | 47 |
| abstract_inverted_index.for | 32 |
| abstract_inverted_index.new | 117 |
| abstract_inverted_index.the | 5, 13, 19, 22, 29, 45, 71, 76, 97, 104, 112, 128, 142, 146, 150, 157, 173, 186, 195, 205 |
| abstract_inverted_index.– | 180 |
| abstract_inverted_index.But, | 10 |
| abstract_inverted_index.IPv6 | 27 |
| abstract_inverted_index.cost | 72, 206 |
| abstract_inverted_index.data | 211 |
| abstract_inverted_index.etc. | 95 |
| abstract_inverted_index.gets | 15 |
| abstract_inverted_index.node | 161 |
| abstract_inverted_index.sent | 48 |
| abstract_inverted_index.such | 87, 132 |
| abstract_inverted_index.that | 194 |
| abstract_inverted_index.with | 55, 162 |
| abstract_inverted_index.Also, | 75 |
| abstract_inverted_index.Here, | 44, 149 |
| abstract_inverted_index.Usage | 0 |
| abstract_inverted_index.among | 4 |
| abstract_inverted_index.cost. | 110 |
| abstract_inverted_index.false | 89 |
| abstract_inverted_index.high. | 9 |
| abstract_inverted_index.hosts | 143 |
| abstract_inverted_index.local | 52, 66 |
| abstract_inverted_index.model | 183 |
| abstract_inverted_index.paper | 114 |
| abstract_inverted_index.proxy | 25, 134 |
| abstract_inverted_index.query | 138 |
| abstract_inverted_index.shows | 198 |
| abstract_inverted_index.there | 61 |
| abstract_inverted_index.token | 158 |
| abstract_inverted_index.users | 6 |
| abstract_inverted_index.using | 124, 178 |
| abstract_inverted_index.which | 69 |
| abstract_inverted_index.AVISPA | 179 |
| abstract_inverted_index.Hence, | 111 |
| abstract_inverted_index.access | 164 |
| abstract_inverted_index.anchor | 54, 68 |
| abstract_inverted_index.attack | 94 |
| abstract_inverted_index.better | 199 |
| abstract_inverted_index.device | 38 |
| abstract_inverted_index.mobile | 26, 37, 160, 163 |
| abstract_inverted_index.packet | 212 |
| abstract_inverted_index.replay | 93 |
| abstract_inverted_index.scheme | 102, 123, 175, 197 |
| abstract_inverted_index.secure | 118 |
| abstract_inverted_index.update | 34, 78, 101, 122 |
| abstract_inverted_index.works. | 148 |
| abstract_inverted_index.attacks | 86 |
| abstract_inverted_index.because | 17 |
| abstract_inverted_index.between | 141 |
| abstract_inverted_index.binding | 90, 135, 137 |
| abstract_inverted_index.earlier | 147 |
| abstract_inverted_index.gateway | 165 |
| abstract_inverted_index.message | 30, 130 |
| abstract_inverted_index.network | 14 |
| abstract_inverted_index.present | 113 |
| abstract_inverted_index.result, | 60 |
| abstract_inverted_index.through | 51 |
| abstract_inverted_index.traffic | 64, 151 |
| abstract_inverted_index.update, | 91, 136 |
| abstract_inverted_index.Finally, | 185 |
| abstract_inverted_index.analysis | 187 |
| abstract_inverted_index.checker. | 184 |
| abstract_inverted_index.exchange | 31 |
| abstract_inverted_index.feature. | 57 |
| abstract_inverted_index.location | 33, 77, 100, 121 |
| abstract_inverted_index.messages | 46, 209 |
| abstract_inverted_index.mobility | 53, 67, 81, 168 |
| abstract_inverted_index.network. | 23, 74 |
| abstract_inverted_index.networks | 3 |
| abstract_inverted_index.overhead | 152 |
| abstract_inverted_index.proposed | 174, 196 |
| abstract_inverted_index.proposes | 115 |
| abstract_inverted_index.received | 50 |
| abstract_inverted_index.required | 144 |
| abstract_inverted_index.security | 105, 171, 182, 189, 200 |
| abstract_inverted_index.wireless | 2 |
| abstract_inverted_index.(PMIPv6), | 28 |
| abstract_inverted_index.decreased | 16 |
| abstract_inverted_index.delivery. | 213 |
| abstract_inverted_index.efficient | 120 |
| abstract_inverted_index.exchanges | 131 |
| abstract_inverted_index.increases | 70 |
| abstract_inverted_index.reduction | 108, 203 |
| abstract_inverted_index.signaling | 208 |
| abstract_inverted_index.validated | 177 |
| abstract_inverted_index.Therefore, | 96 |
| abstract_inverted_index.additional | 129 |
| abstract_inverted_index.apparently | 8 |
| abstract_inverted_index.challenges | 20 |
| abstract_inverted_index.controlled | 154 |
| abstract_inverted_index.efficiency | 11 |
| abstract_inverted_index.eliminates | 127 |
| abstract_inverted_index.evaluation | 192 |
| abstract_inverted_index.vulnerable | 84 |
| abstract_inverted_index.centralized | 42, 56 |
| abstract_inverted_index.devastating | 63 |
| abstract_inverted_index.development | 98 |
| abstract_inverted_index.distributed | 80, 167 |
| abstract_inverted_index.enhancement | 106 |
| abstract_inverted_index.environment | 82 |
| abstract_inverted_index.established | 40 |
| abstract_inverted_index.performance | 191 |
| abstract_inverted_index.significant | 202 |
| abstract_inverted_index.demonstrates | 193 |
| abstract_inverted_index.distributing | 156 |
| abstract_inverted_index.environment. | 43, 169 |
| abstract_inverted_index.necessitates | 103 |
| abstract_inverted_index.tokenization. | 125 |
| abstract_inverted_index.acknowledgements | 140 |
| abstract_inverted_index.man-in-the-middle, | 92 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| citation_normalized_percentile.value | 0.72240835 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |