Security Enhancement of Blowfish Block Cipher Article Swipe
YOU?
·
· 2016
· Open Access
·
· DOI: https://doi.org/10.1007/978-981-10-3433-6_28
Cryptography is the first line of defense to protect the data from intruder. Symmetric cryptography and asymmetric cryptography are two cryptographic based algorithms that serve the security goals: confidentiality, availability, authentication and integrity. Asymmetric algorithms are known as public key cryptography that uses two keys: one public key for encryption and second private for decryption while symmetric algorithms are known as private key cryptography that uses the single private key for encryption and decryption. Symmetric algorithms are less costly compare to asymmetric algorithms. Normally asymmetric algorithms are used to distribute the secret sharing key of symmetric algorithm and symmetric algorithms are used for data encryption. Wide range of symmetric algorithms exists like Blowfish, DES, 3DES, AES, Twofish, RC2, RC5, CAST-128, and IDEA. Among these symmetric algorithms, AES and Blowfish give better throughput compare to other symmetric ciphers. In this article, we proposed the scheme to enhance the Blowfish block cipher security. In proposed scheme, total numbers of Blowfish rounds are altered by skipping few Blowfish rounds using round key. As a result, proposed scheme increase additional Blowfish cipher security against brute-force attack apart from minimum to maximum size of Blowfish key. In addition to that the proposed scheme also decreases encryption and decryption execution time of Blowfish cipher.
Related Topics
- Type
- book-chapter
- Language
- en
- Landing Page
- https://doi.org/10.1007/978-981-10-3433-6_28
- OA Status
- hybrid
- Cited By
- 11
- References
- 10
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2569689464
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2569689464Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1007/978-981-10-3433-6_28Digital Object Identifier
- Title
-
Security Enhancement of Blowfish Block CipherWork title
- Type
-
book-chapterOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2016Year of publication
- Publication date
-
2016-01-01Full publication date if available
- Authors
-
R. B. Patel, Pariza KambojList of authors in order
- Landing page
-
https://doi.org/10.1007/978-981-10-3433-6_28Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1007/978-981-10-3433-6_28Direct OA link when available
- Concepts
-
Computer science, Symmetric-key algorithm, Block cipher, Encryption, Cryptography, Cipher, Public-key cryptography, Theoretical computer science, Computer security, Algorithm, Computer networkTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
11Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1, 2024: 1, 2023: 2, 2022: 2, 2021: 1Per-year citation counts (last 5 years)
- References (count)
-
10Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2569689464 |
|---|---|
| doi | https://doi.org/10.1007/978-981-10-3433-6_28 |
| ids.doi | https://doi.org/10.1007/978-981-10-3433-6_28 |
| ids.mag | 2569689464 |
| ids.openalex | https://openalex.org/W2569689464 |
| fwci | 1.00332905 |
| type | book-chapter |
| title | Security Enhancement of Blowfish Block Cipher |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 238 |
| biblio.first_page | 231 |
| topics[0].id | https://openalex.org/T10951 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Cryptographic Implementations and Security |
| topics[1].id | https://openalex.org/T11017 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 1.0 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1707 |
| topics[1].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[1].display_name | Chaos-based Image/Signal Encryption |
| topics[2].id | https://openalex.org/T11130 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9990000128746033 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Coding theory and cryptography |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.7336790561676025 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C65302260 |
| concepts[1].level | 4 |
| concepts[1].score | 0.7306466102600098 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q327675 |
| concepts[1].display_name | Symmetric-key algorithm |
| concepts[2].id | https://openalex.org/C106544461 |
| concepts[2].level | 3 |
| concepts[2].score | 0.6124826073646545 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q543151 |
| concepts[2].display_name | Block cipher |
| concepts[3].id | https://openalex.org/C148730421 |
| concepts[3].level | 2 |
| concepts[3].score | 0.47328445315361023 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[3].display_name | Encryption |
| concepts[4].id | https://openalex.org/C178489894 |
| concepts[4].level | 2 |
| concepts[4].score | 0.4715183973312378 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[4].display_name | Cryptography |
| concepts[5].id | https://openalex.org/C2780221543 |
| concepts[5].level | 3 |
| concepts[5].score | 0.46841731667518616 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q4681865 |
| concepts[5].display_name | Cipher |
| concepts[6].id | https://openalex.org/C203062551 |
| concepts[6].level | 3 |
| concepts[6].score | 0.41254380345344543 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q201339 |
| concepts[6].display_name | Public-key cryptography |
| concepts[7].id | https://openalex.org/C80444323 |
| concepts[7].level | 1 |
| concepts[7].score | 0.39876240491867065 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q2878974 |
| concepts[7].display_name | Theoretical computer science |
| concepts[8].id | https://openalex.org/C38652104 |
| concepts[8].level | 1 |
| concepts[8].score | 0.3403586447238922 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[8].display_name | Computer security |
| concepts[9].id | https://openalex.org/C11413529 |
| concepts[9].level | 1 |
| concepts[9].score | 0.3377033472061157 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[9].display_name | Algorithm |
| concepts[10].id | https://openalex.org/C31258907 |
| concepts[10].level | 1 |
| concepts[10].score | 0.3324795067310333 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[10].display_name | Computer network |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.7336790561676025 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/symmetric-key-algorithm |
| keywords[1].score | 0.7306466102600098 |
| keywords[1].display_name | Symmetric-key algorithm |
| keywords[2].id | https://openalex.org/keywords/block-cipher |
| keywords[2].score | 0.6124826073646545 |
| keywords[2].display_name | Block cipher |
| keywords[3].id | https://openalex.org/keywords/encryption |
| keywords[3].score | 0.47328445315361023 |
| keywords[3].display_name | Encryption |
| keywords[4].id | https://openalex.org/keywords/cryptography |
| keywords[4].score | 0.4715183973312378 |
| keywords[4].display_name | Cryptography |
| keywords[5].id | https://openalex.org/keywords/cipher |
| keywords[5].score | 0.46841731667518616 |
| keywords[5].display_name | Cipher |
| keywords[6].id | https://openalex.org/keywords/public-key-cryptography |
| keywords[6].score | 0.41254380345344543 |
| keywords[6].display_name | Public-key cryptography |
| keywords[7].id | https://openalex.org/keywords/theoretical-computer-science |
| keywords[7].score | 0.39876240491867065 |
| keywords[7].display_name | Theoretical computer science |
| keywords[8].id | https://openalex.org/keywords/computer-security |
| keywords[8].score | 0.3403586447238922 |
| keywords[8].display_name | Computer security |
| keywords[9].id | https://openalex.org/keywords/algorithm |
| keywords[9].score | 0.3377033472061157 |
| keywords[9].display_name | Algorithm |
| keywords[10].id | https://openalex.org/keywords/computer-network |
| keywords[10].score | 0.3324795067310333 |
| keywords[10].display_name | Computer network |
| language | en |
| locations[0].id | doi:10.1007/978-981-10-3433-6_28 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2764900261 |
| locations[0].source.issn | 1865-0929, 1865-0937 |
| locations[0].source.type | book series |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1865-0929 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Communications in computer and information science |
| locations[0].source.host_organization | https://openalex.org/P4310319900 |
| locations[0].source.host_organization_name | Springer Science+Business Media |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| locations[0].source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| locations[0].license | cc-by-nc |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | book-chapter |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Communications in Computer and Information Science |
| locations[0].landing_page_url | https://doi.org/10.1007/978-981-10-3433-6_28 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5060221158 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-9983-028X |
| authorships[0].author.display_name | R. B. Patel |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I137674396 |
| authorships[0].affiliations[0].raw_affiliation_string | Faculty of Technology, RK University, Rajkot, 360020, Gujarat, India |
| authorships[0].institutions[0].id | https://openalex.org/I137674396 |
| authorships[0].institutions[0].ror | https://ror.org/057ap5t09 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I137674396 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | RK University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Rajan Patel |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | Faculty of Technology, RK University, Rajkot, 360020, Gujarat, India |
| authorships[1].author.id | https://openalex.org/A5049090636 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Pariza Kamboj |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I42014448 |
| authorships[1].affiliations[0].raw_affiliation_string | Sarvajanik College of Engineering and Technology, Surat, 395001, Gujarat, India |
| authorships[1].institutions[0].id | https://openalex.org/I42014448 |
| authorships[1].institutions[0].ror | https://ror.org/02y394t43 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I42014448 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Sardar Vallabhbhai National Institute of Technology Surat |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Pariza Kamboj |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Sarvajanik College of Engineering and Technology, Surat, 395001, Gujarat, India |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1007/978-981-10-3433-6_28 |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Security Enhancement of Blowfish Block Cipher |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10951 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Cryptographic Implementations and Security |
| related_works | https://openalex.org/W1638546798, https://openalex.org/W2117179505, https://openalex.org/W4390979909, https://openalex.org/W4389575897, https://openalex.org/W1524307340, https://openalex.org/W2348979250, https://openalex.org/W3080116368, https://openalex.org/W2150878966, https://openalex.org/W2092816212, https://openalex.org/W1980393268 |
| cited_by_count | 11 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 1 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 2 |
| counts_by_year[3].year | 2022 |
| counts_by_year[3].cited_by_count | 2 |
| counts_by_year[4].year | 2021 |
| counts_by_year[4].cited_by_count | 1 |
| counts_by_year[5].year | 2020 |
| counts_by_year[5].cited_by_count | 1 |
| counts_by_year[6].year | 2019 |
| counts_by_year[6].cited_by_count | 2 |
| counts_by_year[7].year | 2018 |
| counts_by_year[7].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1007/978-981-10-3433-6_28 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2764900261 |
| best_oa_location.source.issn | 1865-0929, 1865-0937 |
| best_oa_location.source.type | book series |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1865-0929 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Communications in computer and information science |
| best_oa_location.source.host_organization | https://openalex.org/P4310319900 |
| best_oa_location.source.host_organization_name | Springer Science+Business Media |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| best_oa_location.license | cc-by-nc |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | book-chapter |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Communications in Computer and Information Science |
| best_oa_location.landing_page_url | https://doi.org/10.1007/978-981-10-3433-6_28 |
| primary_location.id | doi:10.1007/978-981-10-3433-6_28 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2764900261 |
| primary_location.source.issn | 1865-0929, 1865-0937 |
| primary_location.source.type | book series |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1865-0929 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Communications in computer and information science |
| primary_location.source.host_organization | https://openalex.org/P4310319900 |
| primary_location.source.host_organization_name | Springer Science+Business Media |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| primary_location.source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| primary_location.license | cc-by-nc |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | book-chapter |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Communications in Computer and Information Science |
| primary_location.landing_page_url | https://doi.org/10.1007/978-981-10-3433-6_28 |
| publication_date | 2016-01-01 |
| publication_year | 2016 |
| referenced_works | https://openalex.org/W1563625594, https://openalex.org/W2335588581, https://openalex.org/W2157172156, https://openalex.org/W2010204579, https://openalex.org/W2124603743, https://openalex.org/W1527701244, https://openalex.org/W2329430925, https://openalex.org/W2028345003, https://openalex.org/W2024116832, https://openalex.org/W2119725000 |
| referenced_works_count | 10 |
| abstract_inverted_index.a | 170 |
| abstract_inverted_index.As | 169 |
| abstract_inverted_index.In | 137, 151, 191 |
| abstract_inverted_index.as | 37, 60 |
| abstract_inverted_index.by | 161 |
| abstract_inverted_index.is | 1 |
| abstract_inverted_index.of | 5, 94, 107, 156, 188, 205 |
| abstract_inverted_index.to | 7, 80, 88, 133, 144, 185, 193 |
| abstract_inverted_index.we | 140 |
| abstract_inverted_index.AES | 126 |
| abstract_inverted_index.and | 15, 31, 50, 72, 97, 120, 127, 201 |
| abstract_inverted_index.are | 18, 35, 58, 76, 86, 100, 159 |
| abstract_inverted_index.few | 163 |
| abstract_inverted_index.for | 48, 53, 70, 102 |
| abstract_inverted_index.key | 39, 47, 62, 69, 93 |
| abstract_inverted_index.one | 45 |
| abstract_inverted_index.the | 2, 9, 25, 66, 90, 142, 146, 195 |
| abstract_inverted_index.two | 19, 43 |
| abstract_inverted_index.AES, | 115 |
| abstract_inverted_index.DES, | 113 |
| abstract_inverted_index.RC2, | 117 |
| abstract_inverted_index.RC5, | 118 |
| abstract_inverted_index.Wide | 105 |
| abstract_inverted_index.also | 198 |
| abstract_inverted_index.data | 10, 103 |
| abstract_inverted_index.from | 11, 183 |
| abstract_inverted_index.give | 129 |
| abstract_inverted_index.key. | 168, 190 |
| abstract_inverted_index.less | 77 |
| abstract_inverted_index.like | 111 |
| abstract_inverted_index.line | 4 |
| abstract_inverted_index.size | 187 |
| abstract_inverted_index.that | 23, 41, 64, 194 |
| abstract_inverted_index.this | 138 |
| abstract_inverted_index.time | 204 |
| abstract_inverted_index.used | 87, 101 |
| abstract_inverted_index.uses | 42, 65 |
| abstract_inverted_index.3DES, | 114 |
| abstract_inverted_index.Among | 122 |
| abstract_inverted_index.IDEA. | 121 |
| abstract_inverted_index.apart | 182 |
| abstract_inverted_index.based | 21 |
| abstract_inverted_index.block | 148 |
| abstract_inverted_index.first | 3 |
| abstract_inverted_index.keys: | 44 |
| abstract_inverted_index.known | 36, 59 |
| abstract_inverted_index.other | 134 |
| abstract_inverted_index.range | 106 |
| abstract_inverted_index.round | 167 |
| abstract_inverted_index.serve | 24 |
| abstract_inverted_index.these | 123 |
| abstract_inverted_index.total | 154 |
| abstract_inverted_index.using | 166 |
| abstract_inverted_index.while | 55 |
| abstract_inverted_index.attack | 181 |
| abstract_inverted_index.better | 130 |
| abstract_inverted_index.cipher | 149, 177 |
| abstract_inverted_index.costly | 78 |
| abstract_inverted_index.exists | 110 |
| abstract_inverted_index.goals: | 27 |
| abstract_inverted_index.public | 38, 46 |
| abstract_inverted_index.rounds | 158, 165 |
| abstract_inverted_index.scheme | 143, 173, 197 |
| abstract_inverted_index.second | 51 |
| abstract_inverted_index.secret | 91 |
| abstract_inverted_index.single | 67 |
| abstract_inverted_index.against | 179 |
| abstract_inverted_index.altered | 160 |
| abstract_inverted_index.cipher. | 207 |
| abstract_inverted_index.compare | 79, 132 |
| abstract_inverted_index.defense | 6 |
| abstract_inverted_index.enhance | 145 |
| abstract_inverted_index.maximum | 186 |
| abstract_inverted_index.minimum | 184 |
| abstract_inverted_index.numbers | 155 |
| abstract_inverted_index.private | 52, 61, 68 |
| abstract_inverted_index.protect | 8 |
| abstract_inverted_index.result, | 171 |
| abstract_inverted_index.scheme, | 153 |
| abstract_inverted_index.sharing | 92 |
| abstract_inverted_index.Blowfish | 128, 147, 157, 164, 176, 189, 206 |
| abstract_inverted_index.Normally | 83 |
| abstract_inverted_index.Twofish, | 116 |
| abstract_inverted_index.addition | 192 |
| abstract_inverted_index.article, | 139 |
| abstract_inverted_index.ciphers. | 136 |
| abstract_inverted_index.increase | 174 |
| abstract_inverted_index.proposed | 141, 152, 172, 196 |
| abstract_inverted_index.security | 26, 178 |
| abstract_inverted_index.skipping | 162 |
| abstract_inverted_index.Blowfish, | 112 |
| abstract_inverted_index.CAST-128, | 119 |
| abstract_inverted_index.Symmetric | 13, 74 |
| abstract_inverted_index.algorithm | 96 |
| abstract_inverted_index.decreases | 199 |
| abstract_inverted_index.execution | 203 |
| abstract_inverted_index.intruder. | 12 |
| abstract_inverted_index.security. | 150 |
| abstract_inverted_index.symmetric | 56, 95, 98, 108, 124, 135 |
| abstract_inverted_index.Asymmetric | 33 |
| abstract_inverted_index.additional | 175 |
| abstract_inverted_index.algorithms | 22, 34, 57, 75, 85, 99, 109 |
| abstract_inverted_index.asymmetric | 16, 81, 84 |
| abstract_inverted_index.decryption | 54, 202 |
| abstract_inverted_index.distribute | 89 |
| abstract_inverted_index.encryption | 49, 71, 200 |
| abstract_inverted_index.integrity. | 32 |
| abstract_inverted_index.throughput | 131 |
| abstract_inverted_index.algorithms, | 125 |
| abstract_inverted_index.algorithms. | 82 |
| abstract_inverted_index.brute-force | 180 |
| abstract_inverted_index.decryption. | 73 |
| abstract_inverted_index.encryption. | 104 |
| abstract_inverted_index.Cryptography | 0 |
| abstract_inverted_index.cryptography | 14, 17, 40, 63 |
| abstract_inverted_index.availability, | 29 |
| abstract_inverted_index.cryptographic | 20 |
| abstract_inverted_index.authentication | 30 |
| abstract_inverted_index.confidentiality, | 28 |
| cited_by_percentile_year.max | 96 |
| cited_by_percentile_year.min | 89 |
| corresponding_author_ids | https://openalex.org/A5060221158 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| corresponding_institution_ids | https://openalex.org/I137674396 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.5600000023841858 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.77644725 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |