Secure Key Management Based Mobile Authentication in Cloud Article Swipe
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.32604/csse.2022.021845
Authentication is important to the security of user data in a mobile cloud environment. Because of the server’s user credentials, it is subject to attacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC) by producing a secret number that isn’t stored in the phone, which protects against privileged insider attacks. The user and server generate a nonce for dynamic user identity and agree on a session secret key for safe communication. The passwords are not stored on the computer or provided in plain text, they are resistant to replay, guessing, and stolen verification attacks. The suggested protocol uses a one-way hash function and XOR operations, with the client having remote access to a large number of servers over a secure communication channel. Concentrates on HMAC and SHA3 for Collision Free Hashing and to overcome length extension attacks. HMACs are substantially less affected by collisions than their underlying hashing algorithms alone. So adding an HMAC to an MD5 or SHA hash would make it substantially more difficult to break via a rainbow table.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.32604/csse.2022.021845
- https://www.techscience.com/ueditor/files/csse/TSP_CSSE-43-3/TSP_CSSE_21845/TSP_CSSE_21845.pdf
- OA Status
- diamond
- Cited By
- 8
- References
- 30
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4285136362
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4285136362Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.32604/csse.2022.021845Digital Object Identifier
- Title
-
Secure Key Management Based Mobile Authentication in CloudWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2022Year of publication
- Publication date
-
2022-01-01Full publication date if available
- Authors
-
S. Shanmuga Priya, D. Yuvaraj, T. Satyanarayana Murthy, Varghese S. Chooralil, Sethu Krishnan, P. Banumathy, P. SundaravadivelList of authors in order
- Landing page
-
https://doi.org/10.32604/csse.2022.021845Publisher landing page
- PDF URL
-
https://www.techscience.com/ueditor/files/csse/TSP_CSSE-43-3/TSP_CSSE_21845/TSP_CSSE_21845.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://www.techscience.com/ueditor/files/csse/TSP_CSSE-43-3/TSP_CSSE_21845/TSP_CSSE_21845.pdfDirect OA link when available
- Concepts
-
Computer science, Cryptographic nonce, Hash function, Replay attack, Hash-based message authentication code, Computer security, Password, Cryptographic hash function, Hash chain, Computer network, Authentication (law), Mutual authentication, Multi-factor authentication, Session key, Key (lock), Login, Authentication protocol, Encryption, Cryptography, Message authentication codeTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
8Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1, 2024: 4, 2023: 3Per-year citation counts (last 5 years)
- References (count)
-
30Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4285136362 |
|---|---|
| doi | https://doi.org/10.32604/csse.2022.021845 |
| ids.doi | https://doi.org/10.32604/csse.2022.021845 |
| ids.openalex | https://openalex.org/W4285136362 |
| fwci | 3.03992888 |
| type | article |
| title | Secure Key Management Based Mobile Authentication in Cloud |
| biblio.issue | 3 |
| biblio.volume | 43 |
| biblio.last_page | 896 |
| biblio.first_page | 887 |
| topics[0].id | https://openalex.org/T11800 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998000264167786 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | User Authentication and Security Systems |
| topics[1].id | https://openalex.org/T11504 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9988999962806702 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Advanced Authentication Protocols Security |
| topics[2].id | https://openalex.org/T11614 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9965000152587891 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Cloud Data Security Solutions |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8208152055740356 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C9996903 |
| concepts[1].level | 3 |
| concepts[1].score | 0.7783244848251343 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q1749235 |
| concepts[1].display_name | Cryptographic nonce |
| concepts[2].id | https://openalex.org/C99138194 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5793118476867676 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q183427 |
| concepts[2].display_name | Hash function |
| concepts[3].id | https://openalex.org/C11560541 |
| concepts[3].level | 3 |
| concepts[3].score | 0.5645725727081299 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1756025 |
| concepts[3].display_name | Replay attack |
| concepts[4].id | https://openalex.org/C100485629 |
| concepts[4].level | 4 |
| concepts[4].score | 0.564357340335846 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1669397 |
| concepts[4].display_name | Hash-based message authentication code |
| concepts[5].id | https://openalex.org/C38652104 |
| concepts[5].level | 1 |
| concepts[5].score | 0.5521345734596252 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[5].display_name | Computer security |
| concepts[6].id | https://openalex.org/C109297577 |
| concepts[6].level | 2 |
| concepts[6].score | 0.5510962605476379 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q161157 |
| concepts[6].display_name | Password |
| concepts[7].id | https://openalex.org/C7608002 |
| concepts[7].level | 3 |
| concepts[7].score | 0.5133427977561951 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q477202 |
| concepts[7].display_name | Cryptographic hash function |
| concepts[8].id | https://openalex.org/C135783594 |
| concepts[8].level | 3 |
| concepts[8].score | 0.49054354429244995 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q5678864 |
| concepts[8].display_name | Hash chain |
| concepts[9].id | https://openalex.org/C31258907 |
| concepts[9].level | 1 |
| concepts[9].score | 0.4860232472419739 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[9].display_name | Computer network |
| concepts[10].id | https://openalex.org/C148417208 |
| concepts[10].level | 2 |
| concepts[10].score | 0.46314215660095215 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q4825882 |
| concepts[10].display_name | Authentication (law) |
| concepts[11].id | https://openalex.org/C2781221063 |
| concepts[11].level | 3 |
| concepts[11].score | 0.45172423124313354 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q6944186 |
| concepts[11].display_name | Mutual authentication |
| concepts[12].id | https://openalex.org/C194699767 |
| concepts[12].level | 4 |
| concepts[12].score | 0.4225379228591919 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q7878662 |
| concepts[12].display_name | Multi-factor authentication |
| concepts[13].id | https://openalex.org/C191197275 |
| concepts[13].level | 3 |
| concepts[13].score | 0.4190170466899872 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q1755775 |
| concepts[13].display_name | Session key |
| concepts[14].id | https://openalex.org/C26517878 |
| concepts[14].level | 2 |
| concepts[14].score | 0.4135752320289612 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[14].display_name | Key (lock) |
| concepts[15].id | https://openalex.org/C113324615 |
| concepts[15].level | 2 |
| concepts[15].score | 0.4104643166065216 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q472302 |
| concepts[15].display_name | Login |
| concepts[16].id | https://openalex.org/C21564112 |
| concepts[16].level | 3 |
| concepts[16].score | 0.37146812677383423 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q4825885 |
| concepts[16].display_name | Authentication protocol |
| concepts[17].id | https://openalex.org/C148730421 |
| concepts[17].level | 2 |
| concepts[17].score | 0.3243231773376465 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[17].display_name | Encryption |
| concepts[18].id | https://openalex.org/C178489894 |
| concepts[18].level | 2 |
| concepts[18].score | 0.29099327325820923 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[18].display_name | Cryptography |
| concepts[19].id | https://openalex.org/C141492731 |
| concepts[19].level | 3 |
| concepts[19].score | 0.2848755121231079 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q1052621 |
| concepts[19].display_name | Message authentication code |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8208152055740356 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/cryptographic-nonce |
| keywords[1].score | 0.7783244848251343 |
| keywords[1].display_name | Cryptographic nonce |
| keywords[2].id | https://openalex.org/keywords/hash-function |
| keywords[2].score | 0.5793118476867676 |
| keywords[2].display_name | Hash function |
| keywords[3].id | https://openalex.org/keywords/replay-attack |
| keywords[3].score | 0.5645725727081299 |
| keywords[3].display_name | Replay attack |
| keywords[4].id | https://openalex.org/keywords/hash-based-message-authentication-code |
| keywords[4].score | 0.564357340335846 |
| keywords[4].display_name | Hash-based message authentication code |
| keywords[5].id | https://openalex.org/keywords/computer-security |
| keywords[5].score | 0.5521345734596252 |
| keywords[5].display_name | Computer security |
| keywords[6].id | https://openalex.org/keywords/password |
| keywords[6].score | 0.5510962605476379 |
| keywords[6].display_name | Password |
| keywords[7].id | https://openalex.org/keywords/cryptographic-hash-function |
| keywords[7].score | 0.5133427977561951 |
| keywords[7].display_name | Cryptographic hash function |
| keywords[8].id | https://openalex.org/keywords/hash-chain |
| keywords[8].score | 0.49054354429244995 |
| keywords[8].display_name | Hash chain |
| keywords[9].id | https://openalex.org/keywords/computer-network |
| keywords[9].score | 0.4860232472419739 |
| keywords[9].display_name | Computer network |
| keywords[10].id | https://openalex.org/keywords/authentication |
| keywords[10].score | 0.46314215660095215 |
| keywords[10].display_name | Authentication (law) |
| keywords[11].id | https://openalex.org/keywords/mutual-authentication |
| keywords[11].score | 0.45172423124313354 |
| keywords[11].display_name | Mutual authentication |
| keywords[12].id | https://openalex.org/keywords/multi-factor-authentication |
| keywords[12].score | 0.4225379228591919 |
| keywords[12].display_name | Multi-factor authentication |
| keywords[13].id | https://openalex.org/keywords/session-key |
| keywords[13].score | 0.4190170466899872 |
| keywords[13].display_name | Session key |
| keywords[14].id | https://openalex.org/keywords/key |
| keywords[14].score | 0.4135752320289612 |
| keywords[14].display_name | Key (lock) |
| keywords[15].id | https://openalex.org/keywords/login |
| keywords[15].score | 0.4104643166065216 |
| keywords[15].display_name | Login |
| keywords[16].id | https://openalex.org/keywords/authentication-protocol |
| keywords[16].score | 0.37146812677383423 |
| keywords[16].display_name | Authentication protocol |
| keywords[17].id | https://openalex.org/keywords/encryption |
| keywords[17].score | 0.3243231773376465 |
| keywords[17].display_name | Encryption |
| keywords[18].id | https://openalex.org/keywords/cryptography |
| keywords[18].score | 0.29099327325820923 |
| keywords[18].display_name | Cryptography |
| keywords[19].id | https://openalex.org/keywords/message-authentication-code |
| keywords[19].score | 0.2848755121231079 |
| keywords[19].display_name | Message authentication code |
| language | en |
| locations[0].id | doi:10.32604/csse.2022.021845 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210214087 |
| locations[0].source.issn | 0267-6192 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 0267-6192 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Computer Systems Science and Engineering |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://www.techscience.com/ueditor/files/csse/TSP_CSSE-43-3/TSP_CSSE_21845/TSP_CSSE_21845.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Computer Systems Science and Engineering |
| locations[0].landing_page_url | https://doi.org/10.32604/csse.2022.021845 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5110561382 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-5981-0559 |
| authorships[0].author.display_name | S. Shanmuga Priya |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, M.I.E.T Engineering College, Trichy, Tamilnadu, India |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | S. Shanmuga Priya |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Computer Science and Engineering, M.I.E.T Engineering College, Trichy, Tamilnadu, India |
| authorships[1].author.id | https://openalex.org/A5082911694 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-2745-8092 |
| authorships[1].author.display_name | D. Yuvaraj |
| authorships[1].countries | IQ |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I1294182474 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Cihan University, Duhok, Kurdistan Region, Iraq |
| authorships[1].institutions[0].id | https://openalex.org/I1294182474 |
| authorships[1].institutions[0].ror | https://ror.org/03hevjm30 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I1294182474 |
| authorships[1].institutions[0].country_code | IQ |
| authorships[1].institutions[0].display_name | Cihan University-Erbil |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | D. Yuvaraj |
| authorships[1].is_corresponding | True |
| authorships[1].raw_affiliation_strings | Department of Computer Science and Engineering, Cihan University, Duhok, Kurdistan Region, Iraq |
| authorships[2].author.id | https://openalex.org/A5074108609 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-6320-8496 |
| authorships[2].author.display_name | T. Satyanarayana Murthy |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Bapatla Engineering College, Bapatla, Andhra Pradesh, India |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | T. Satyanarayana Murthy |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Computer Science and Engineering, Bapatla Engineering College, Bapatla, Andhra Pradesh, India |
| authorships[3].author.id | https://openalex.org/A5016830690 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-3203-6695 |
| authorships[3].author.display_name | Varghese S. Chooralil |
| authorships[3].countries | IN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I4210113677 |
| authorships[3].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Rajagiri School of Engineering and Technology, Kakkanad, Kerala, India |
| authorships[3].institutions[0].id | https://openalex.org/I4210113677 |
| authorships[3].institutions[0].ror | https://ror.org/01zb5kv44 |
| authorships[3].institutions[0].type | healthcare |
| authorships[3].institutions[0].lineage | https://openalex.org/I4210113677 |
| authorships[3].institutions[0].country_code | IN |
| authorships[3].institutions[0].display_name | Rajagiri Hospital |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Varghese S. Chooralil |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Department of Computer Science and Engineering, Rajagiri School of Engineering and Technology, Kakkanad, Kerala, India |
| authorships[4].author.id | https://openalex.org/A5089103541 |
| authorships[4].author.orcid | |
| authorships[4].author.display_name | Sethu Krishnan |
| authorships[4].countries | IN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I15664174 |
| authorships[4].affiliations[0].raw_affiliation_string | Department Electronics and Communication Engineering, SACS MAVMM Engineering College, Madurai, Tamilnadu, India |
| authorships[4].institutions[0].id | https://openalex.org/I15664174 |
| authorships[4].institutions[0].ror | https://ror.org/05ghahk68 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I15664174 |
| authorships[4].institutions[0].country_code | IN |
| authorships[4].institutions[0].display_name | Madurai Medical College |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | S. Navaneetha Krishnan |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Department Electronics and Communication Engineering, SACS MAVMM Engineering College, Madurai, Tamilnadu, India |
| authorships[5].author.id | https://openalex.org/A5025078092 |
| authorships[5].author.orcid | |
| authorships[5].author.display_name | P. Banumathy |
| authorships[5].affiliations[0].raw_affiliation_string | Department of Information Technology, Karaikal Polytechnic College, Varichikudy-Karaikal, India |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | P. Banumathy |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Department of Information Technology, Karaikal Polytechnic College, Varichikudy-Karaikal, India |
| authorships[6].author.id | https://openalex.org/A5003876519 |
| authorships[6].author.orcid | |
| authorships[6].author.display_name | P. Sundaravadivel |
| authorships[6].countries | IN |
| authorships[6].affiliations[0].institution_ids | https://openalex.org/I15664174 |
| authorships[6].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, SACS MAVMM Engineering College, Madurai, India |
| authorships[6].institutions[0].id | https://openalex.org/I15664174 |
| authorships[6].institutions[0].ror | https://ror.org/05ghahk68 |
| authorships[6].institutions[0].type | education |
| authorships[6].institutions[0].lineage | https://openalex.org/I15664174 |
| authorships[6].institutions[0].country_code | IN |
| authorships[6].institutions[0].display_name | Madurai Medical College |
| authorships[6].author_position | last |
| authorships[6].raw_author_name | P. SundaraVadivel |
| authorships[6].is_corresponding | False |
| authorships[6].raw_affiliation_strings | Department of Computer Science and Engineering, SACS MAVMM Engineering College, Madurai, India |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.techscience.com/ueditor/files/csse/TSP_CSSE-43-3/TSP_CSSE_21845/TSP_CSSE_21845.pdf |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Secure Key Management Based Mobile Authentication in Cloud |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11800 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998000264167786 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | User Authentication and Security Systems |
| related_works | https://openalex.org/W199184564, https://openalex.org/W1980803971, https://openalex.org/W2594692618, https://openalex.org/W2995980218, https://openalex.org/W2949128119, https://openalex.org/W2806947103, https://openalex.org/W2603122561, https://openalex.org/W2767098552, https://openalex.org/W75701350, https://openalex.org/W3045614563 |
| cited_by_count | 8 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 4 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 3 |
| locations_count | 1 |
| best_oa_location.id | doi:10.32604/csse.2022.021845 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210214087 |
| best_oa_location.source.issn | 0267-6192 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 0267-6192 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Computer Systems Science and Engineering |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://www.techscience.com/ueditor/files/csse/TSP_CSSE-43-3/TSP_CSSE_21845/TSP_CSSE_21845.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Computer Systems Science and Engineering |
| best_oa_location.landing_page_url | https://doi.org/10.32604/csse.2022.021845 |
| primary_location.id | doi:10.32604/csse.2022.021845 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210214087 |
| primary_location.source.issn | 0267-6192 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 0267-6192 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Computer Systems Science and Engineering |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://www.techscience.com/ueditor/files/csse/TSP_CSSE-43-3/TSP_CSSE_21845/TSP_CSSE_21845.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Computer Systems Science and Engineering |
| primary_location.landing_page_url | https://doi.org/10.32604/csse.2022.021845 |
| publication_date | 2022-01-01 |
| publication_year | 2022 |
| referenced_works | https://openalex.org/W6692826848, https://openalex.org/W6703647523, https://openalex.org/W2750981665, https://openalex.org/W2173077903, https://openalex.org/W2041098119, https://openalex.org/W2149336128, https://openalex.org/W6686194449, https://openalex.org/W2041262722, https://openalex.org/W2038085759, https://openalex.org/W2979805828, https://openalex.org/W2909113638, https://openalex.org/W2141134830, https://openalex.org/W2058107309, https://openalex.org/W2075955477, https://openalex.org/W2058151630, https://openalex.org/W3154125869, https://openalex.org/W6776009497, https://openalex.org/W6981567970, https://openalex.org/W4239967937, https://openalex.org/W6769925076, https://openalex.org/W2976283364, https://openalex.org/W6756715095, https://openalex.org/W6763393492, https://openalex.org/W2980804824, https://openalex.org/W3203990852, https://openalex.org/W2339424512, https://openalex.org/W2902320941, https://openalex.org/W3016023839, https://openalex.org/W2260969275, https://openalex.org/W2183128967 |
| referenced_works_count | 30 |
| abstract_inverted_index.a | 10, 29, 58, 78, 87, 121, 135, 141, 192 |
| abstract_inverted_index.It | 35 |
| abstract_inverted_index.So | 173 |
| abstract_inverted_index.To | 25 |
| abstract_inverted_index.an | 175, 178 |
| abstract_inverted_index.by | 56, 165 |
| abstract_inverted_index.in | 9, 64, 104 |
| abstract_inverted_index.is | 1, 21, 33 |
| abstract_inverted_index.it | 20, 185 |
| abstract_inverted_index.of | 6, 15, 37, 138 |
| abstract_inverted_index.on | 86, 99, 146 |
| abstract_inverted_index.or | 102, 180 |
| abstract_inverted_index.to | 3, 23, 110, 134, 155, 177, 189 |
| abstract_inverted_index.MD5 | 179 |
| abstract_inverted_index.SHA | 181 |
| abstract_inverted_index.The | 48, 73, 94, 117 |
| abstract_inverted_index.XOR | 126 |
| abstract_inverted_index.and | 43, 45, 75, 84, 113, 125, 148, 154 |
| abstract_inverted_index.are | 96, 108, 161 |
| abstract_inverted_index.for | 80, 91, 150 |
| abstract_inverted_index.key | 46, 90 |
| abstract_inverted_index.not | 97 |
| abstract_inverted_index.the | 4, 16, 52, 65, 100, 129 |
| abstract_inverted_index.via | 191 |
| abstract_inverted_index.(RC) | 55 |
| abstract_inverted_index.Free | 152 |
| abstract_inverted_index.HMAC | 147, 176 |
| abstract_inverted_index.SHA3 | 149 |
| abstract_inverted_index.data | 8, 27 |
| abstract_inverted_index.hash | 123, 182 |
| abstract_inverted_index.less | 163 |
| abstract_inverted_index.make | 184 |
| abstract_inverted_index.more | 187 |
| abstract_inverted_index.over | 140 |
| abstract_inverted_index.safe | 92 |
| abstract_inverted_index.than | 167 |
| abstract_inverted_index.that | 61 |
| abstract_inverted_index.they | 107 |
| abstract_inverted_index.user | 7, 18, 49, 74, 82 |
| abstract_inverted_index.uses | 120 |
| abstract_inverted_index.with | 51, 128 |
| abstract_inverted_index.HMACs | 160 |
| abstract_inverted_index.agree | 85 |
| abstract_inverted_index.break | 190 |
| abstract_inverted_index.cloud | 12 |
| abstract_inverted_index.large | 136 |
| abstract_inverted_index.nonce | 79 |
| abstract_inverted_index.novel | 30 |
| abstract_inverted_index.plain | 105 |
| abstract_inverted_index.text, | 106 |
| abstract_inverted_index.their | 168 |
| abstract_inverted_index.three | 38 |
| abstract_inverted_index.which | 67 |
| abstract_inverted_index.would | 183 |
| abstract_inverted_index.Center | 54 |
| abstract_inverted_index.access | 133 |
| abstract_inverted_index.adding | 174 |
| abstract_inverted_index.alone. | 172 |
| abstract_inverted_index.client | 130 |
| abstract_inverted_index.having | 131 |
| abstract_inverted_index.length | 157 |
| abstract_inverted_index.login, | 42 |
| abstract_inverted_index.mobile | 11 |
| abstract_inverted_index.number | 60, 137 |
| abstract_inverted_index.phone, | 66 |
| abstract_inverted_index.remote | 132 |
| abstract_inverted_index.secret | 59, 89 |
| abstract_inverted_index.secure | 142 |
| abstract_inverted_index.server | 76 |
| abstract_inverted_index.stolen | 114 |
| abstract_inverted_index.stored | 63, 98 |
| abstract_inverted_index.table. | 194 |
| abstract_inverted_index.Because | 14 |
| abstract_inverted_index.Hashing | 153 |
| abstract_inverted_index.against | 69 |
| abstract_inverted_index.dynamic | 81 |
| abstract_inverted_index.hashing | 170 |
| abstract_inverted_index.insider | 71 |
| abstract_inverted_index.isn’t | 62 |
| abstract_inverted_index.one-way | 122 |
| abstract_inverted_index.phases: | 40 |
| abstract_inverted_index.rainbow | 193 |
| abstract_inverted_index.replay, | 111 |
| abstract_inverted_index.servers | 139 |
| abstract_inverted_index.session | 88 |
| abstract_inverted_index.subject | 22 |
| abstract_inverted_index.affected | 164 |
| abstract_inverted_index.attacks. | 24, 72, 116, 159 |
| abstract_inverted_index.channel. | 144 |
| abstract_inverted_index.computer | 101 |
| abstract_inverted_index.consists | 36 |
| abstract_inverted_index.function | 124 |
| abstract_inverted_index.generate | 77 |
| abstract_inverted_index.identity | 83 |
| abstract_inverted_index.maintain | 26 |
| abstract_inverted_index.overcome | 156 |
| abstract_inverted_index.protects | 68 |
| abstract_inverted_index.protocol | 119 |
| abstract_inverted_index.provided | 103 |
| abstract_inverted_index.security | 5 |
| abstract_inverted_index.Collision | 151 |
| abstract_inverted_index.difficult | 188 |
| abstract_inverted_index.extension | 158 |
| abstract_inverted_index.guessing, | 112 |
| abstract_inverted_index.important | 2 |
| abstract_inverted_index.mechanism | 32 |
| abstract_inverted_index.passwords | 95 |
| abstract_inverted_index.producing | 57 |
| abstract_inverted_index.proposed. | 34 |
| abstract_inverted_index.registers | 50 |
| abstract_inverted_index.resistant | 109 |
| abstract_inverted_index.suggested | 118 |
| abstract_inverted_index.agreement. | 47 |
| abstract_inverted_index.algorithms | 171 |
| abstract_inverted_index.collisions | 166 |
| abstract_inverted_index.privileged | 70 |
| abstract_inverted_index.server’s | 17 |
| abstract_inverted_index.underlying | 169 |
| abstract_inverted_index.independent | 39 |
| abstract_inverted_index.operations, | 127 |
| abstract_inverted_index.Concentrates | 145 |
| abstract_inverted_index.Registration | 53 |
| abstract_inverted_index.credentials, | 19 |
| abstract_inverted_index.environment. | 13 |
| abstract_inverted_index.verification | 115 |
| abstract_inverted_index.Registration, | 41 |
| abstract_inverted_index.communication | 143 |
| abstract_inverted_index.substantially | 162, 186 |
| abstract_inverted_index.Authentication | 0 |
| abstract_inverted_index.authentication | 31, 44 |
| abstract_inverted_index.communication. | 93 |
| abstract_inverted_index.authentication, | 28 |
| cited_by_percentile_year.max | 98 |
| cited_by_percentile_year.min | 91 |
| corresponding_author_ids | https://openalex.org/A5082911694 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 7 |
| corresponding_institution_ids | https://openalex.org/I1294182474 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.7599999904632568 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.91164693 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |