STALE: A Scalable and Secure Trans-Border Authentication Scheme Leveraging Email and ECDH Key Exchange Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.3390/electronics14122399
In trans-border data (data transferred or accessed across national jurisdictions) exchange scenarios, identity authentication mechanisms serve as critical components for ensuring data security and privacy protection, with their effectiveness directly impacting the compliance and reliability of transnational operations. However, existing identity authentication systems face multiple challenges in trans-border contexts. Firstly, the transnational transfer of identity data struggles to meet the varying data-compliance requirements across different jurisdictions. Secondly, centralized authentication architectures exhibit vulnerabilities in trust chains, where single points of failure may lead to systemic risks. Thirdly, the inefficiency of certificate verification in traditional Public Key Infrastructure (PKI) systems fails to meet the real-time response demands of globalized business operations. These limitations severely constrain real-time identity verification in international business scenarios. To address these issues, this study proposes a trans-border distributed certificate-free identity authentication framework (STALE). The methodology adopts three key innovations. Firstly, it utilizes email addresses as unique user identifiers combined with a Certificateless Public Key Cryptography (CL-PKC) system for key distribution, eliminating both single-point dependency on traditional Certificate Authorities (CAs) and the key escrow issues inherent in Identity-Based Cryptography (IBC). Secondly, an enhanced Elliptic Curve Diffie–Hellman (ECDH) key-exchange protocol is introduced, employing forward-secure session key negotiation to significantly improve communication security in trans-border network environments. Finally, a distributed identity ledger is implemented, using the FISCO BCOS blockchain, enabling decentralized storage and verification of identity information while ensuring data immutability, full traceability, and General Data Protection Regulation (GDPR) compliance. Our experimental results demonstrate that the proposed method exhibits significant advantages in authentication efficiency, communication overhead, and computational cost compared to existing solutions.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.3390/electronics14122399
- https://www.mdpi.com/2079-9292/14/12/2399/pdf?version=1749722607
- OA Status
- gold
- References
- 45
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4411242781
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4411242781Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.3390/electronics14122399Digital Object Identifier
- Title
-
STALE: A Scalable and Secure Trans-Border Authentication Scheme Leveraging Email and ECDH Key ExchangeWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-06-12Full publication date if available
- Authors
-
Jieyun Zheng, Mudi Xu, Jianqing Li, Benfeng Chen, Zhizhong Tan, Anyu Wang, Yulong Zhang, Yan Liu, Kai-Xin Zhang, Li‐Rong Zheng, Wenyong WangList of authors in order
- Landing page
-
https://doi.org/10.3390/electronics14122399Publisher landing page
- PDF URL
-
https://www.mdpi.com/2079-9292/14/12/2399/pdf?version=1749722607Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://www.mdpi.com/2079-9292/14/12/2399/pdf?version=1749722607Direct OA link when available
- Concepts
-
Authentication (law), Key exchange, Computer network, Scalability, Scheme (mathematics), Key (lock), Computer science, Computer security, Public-key cryptography, Mathematics, Operating system, Encryption, Mathematical analysisTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
45Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4411242781 |
|---|---|
| doi | https://doi.org/10.3390/electronics14122399 |
| ids.doi | https://doi.org/10.3390/electronics14122399 |
| ids.openalex | https://openalex.org/W4411242781 |
| fwci | 0.0 |
| type | article |
| title | STALE: A Scalable and Secure Trans-Border Authentication Scheme Leveraging Email and ECDH Key Exchange |
| biblio.issue | 12 |
| biblio.volume | 14 |
| biblio.last_page | 2399 |
| biblio.first_page | 2399 |
| topics[0].id | https://openalex.org/T10237 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9987999796867371 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Cryptography and Data Security |
| topics[1].id | https://openalex.org/T11504 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9987000226974487 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Advanced Authentication Protocols Security |
| topics[2].id | https://openalex.org/T10651 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.9986000061035156 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2208 |
| topics[2].subfield.display_name | Electrical and Electronic Engineering |
| topics[2].display_name | IPv6, Mobility, Handover, Networks, Security |
| is_xpac | False |
| apc_list.value | 2000 |
| apc_list.currency | CHF |
| apc_list.value_usd | 2165 |
| apc_paid.value | 2000 |
| apc_paid.currency | CHF |
| apc_paid.value_usd | 2165 |
| concepts[0].id | https://openalex.org/C148417208 |
| concepts[0].level | 2 |
| concepts[0].score | 0.6489594578742981 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q4825882 |
| concepts[0].display_name | Authentication (law) |
| concepts[1].id | https://openalex.org/C99674996 |
| concepts[1].level | 4 |
| concepts[1].score | 0.6469182372093201 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q1414155 |
| concepts[1].display_name | Key exchange |
| concepts[2].id | https://openalex.org/C31258907 |
| concepts[2].level | 1 |
| concepts[2].score | 0.6450613737106323 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[2].display_name | Computer network |
| concepts[3].id | https://openalex.org/C48044578 |
| concepts[3].level | 2 |
| concepts[3].score | 0.6328834891319275 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q727490 |
| concepts[3].display_name | Scalability |
| concepts[4].id | https://openalex.org/C77618280 |
| concepts[4].level | 2 |
| concepts[4].score | 0.6128743290901184 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1155772 |
| concepts[4].display_name | Scheme (mathematics) |
| concepts[5].id | https://openalex.org/C26517878 |
| concepts[5].level | 2 |
| concepts[5].score | 0.6123744249343872 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[5].display_name | Key (lock) |
| concepts[6].id | https://openalex.org/C41008148 |
| concepts[6].level | 0 |
| concepts[6].score | 0.598750114440918 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[6].display_name | Computer science |
| concepts[7].id | https://openalex.org/C38652104 |
| concepts[7].level | 1 |
| concepts[7].score | 0.4358154535293579 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[7].display_name | Computer security |
| concepts[8].id | https://openalex.org/C203062551 |
| concepts[8].level | 3 |
| concepts[8].score | 0.2916916608810425 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q201339 |
| concepts[8].display_name | Public-key cryptography |
| concepts[9].id | https://openalex.org/C33923547 |
| concepts[9].level | 0 |
| concepts[9].score | 0.07101473212242126 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[9].display_name | Mathematics |
| concepts[10].id | https://openalex.org/C111919701 |
| concepts[10].level | 1 |
| concepts[10].score | 0.06625035405158997 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[10].display_name | Operating system |
| concepts[11].id | https://openalex.org/C148730421 |
| concepts[11].level | 2 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[11].display_name | Encryption |
| concepts[12].id | https://openalex.org/C134306372 |
| concepts[12].level | 1 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[12].display_name | Mathematical analysis |
| keywords[0].id | https://openalex.org/keywords/authentication |
| keywords[0].score | 0.6489594578742981 |
| keywords[0].display_name | Authentication (law) |
| keywords[1].id | https://openalex.org/keywords/key-exchange |
| keywords[1].score | 0.6469182372093201 |
| keywords[1].display_name | Key exchange |
| keywords[2].id | https://openalex.org/keywords/computer-network |
| keywords[2].score | 0.6450613737106323 |
| keywords[2].display_name | Computer network |
| keywords[3].id | https://openalex.org/keywords/scalability |
| keywords[3].score | 0.6328834891319275 |
| keywords[3].display_name | Scalability |
| keywords[4].id | https://openalex.org/keywords/scheme |
| keywords[4].score | 0.6128743290901184 |
| keywords[4].display_name | Scheme (mathematics) |
| keywords[5].id | https://openalex.org/keywords/key |
| keywords[5].score | 0.6123744249343872 |
| keywords[5].display_name | Key (lock) |
| keywords[6].id | https://openalex.org/keywords/computer-science |
| keywords[6].score | 0.598750114440918 |
| keywords[6].display_name | Computer science |
| keywords[7].id | https://openalex.org/keywords/computer-security |
| keywords[7].score | 0.4358154535293579 |
| keywords[7].display_name | Computer security |
| keywords[8].id | https://openalex.org/keywords/public-key-cryptography |
| keywords[8].score | 0.2916916608810425 |
| keywords[8].display_name | Public-key cryptography |
| keywords[9].id | https://openalex.org/keywords/mathematics |
| keywords[9].score | 0.07101473212242126 |
| keywords[9].display_name | Mathematics |
| keywords[10].id | https://openalex.org/keywords/operating-system |
| keywords[10].score | 0.06625035405158997 |
| keywords[10].display_name | Operating system |
| language | en |
| locations[0].id | doi:10.3390/electronics14122399 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210202905 |
| locations[0].source.issn | 2079-9292 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2079-9292 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Electronics |
| locations[0].source.host_organization | https://openalex.org/P4310310987 |
| locations[0].source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310310987 |
| locations[0].source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://www.mdpi.com/2079-9292/14/12/2399/pdf?version=1749722607 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Electronics |
| locations[0].landing_page_url | https://doi.org/10.3390/electronics14122399 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5112469799 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Jieyun Zheng |
| authorships[0].countries | CN, MO |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I111950717 |
| authorships[0].affiliations[0].raw_affiliation_string | School of Computer Science and Engineering, Macau University of Science and Technology, Macau 999078, China |
| authorships[0].affiliations[1].institution_ids | https://openalex.org/I32820368 |
| authorships[0].affiliations[1].raw_affiliation_string | Guangdong Institute of Intelligence Science and Technology, Zhuhai 519031, China |
| authorships[0].institutions[0].id | https://openalex.org/I32820368 |
| authorships[0].institutions[0].ror | https://ror.org/01wq2p249 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I32820368 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Guangdong Polytechnic of Science and Technology |
| authorships[0].institutions[1].id | https://openalex.org/I111950717 |
| authorships[0].institutions[1].ror | https://ror.org/03jqs2n27 |
| authorships[0].institutions[1].type | education |
| authorships[0].institutions[1].lineage | https://openalex.org/I111950717, https://openalex.org/I4391767947 |
| authorships[0].institutions[1].country_code | MO |
| authorships[0].institutions[1].display_name | Macau University of Science and Technology |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Jiexin Zheng |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Guangdong Institute of Intelligence Science and Technology, Zhuhai 519031, China, School of Computer Science and Engineering, Macau University of Science and Technology, Macau 999078, China |
| authorships[1].author.id | https://openalex.org/A5099587583 |
| authorships[1].author.orcid | https://orcid.org/0009-0001-2091-5203 |
| authorships[1].author.display_name | Mudi Xu |
| authorships[1].countries | MO |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I111950717 |
| authorships[1].affiliations[0].raw_affiliation_string | School of Computer Science and Engineering, Macau University of Science and Technology, Macau 999078, China |
| authorships[1].institutions[0].id | https://openalex.org/I111950717 |
| authorships[1].institutions[0].ror | https://ror.org/03jqs2n27 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I111950717, https://openalex.org/I4391767947 |
| authorships[1].institutions[0].country_code | MO |
| authorships[1].institutions[0].display_name | Macau University of Science and Technology |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Mudi Xu |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | School of Computer Science and Engineering, Macau University of Science and Technology, Macau 999078, China |
| authorships[2].author.id | https://openalex.org/A5100641152 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-6768-1483 |
| authorships[2].author.display_name | Jianqing Li |
| authorships[2].countries | MO |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I111950717 |
| authorships[2].affiliations[0].raw_affiliation_string | School of Computer Science and Engineering, Macau University of Science and Technology, Macau 999078, China |
| authorships[2].institutions[0].id | https://openalex.org/I111950717 |
| authorships[2].institutions[0].ror | https://ror.org/03jqs2n27 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I111950717, https://openalex.org/I4391767947 |
| authorships[2].institutions[0].country_code | MO |
| authorships[2].institutions[0].display_name | Macau University of Science and Technology |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Jianqing Li |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | School of Computer Science and Engineering, Macau University of Science and Technology, Macau 999078, China |
| authorships[3].author.id | https://openalex.org/A5033822869 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Benfeng Chen |
| authorships[3].countries | HK |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I200769079, https://openalex.org/I889458895 |
| authorships[3].affiliations[0].raw_affiliation_string | AI Thrust, The Hong Kong University of Science and Technology (Guangzhou), Guangzhou 510000, China |
| authorships[3].institutions[0].id | https://openalex.org/I200769079 |
| authorships[3].institutions[0].ror | https://ror.org/00q4vv597 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I200769079 |
| authorships[3].institutions[0].country_code | HK |
| authorships[3].institutions[0].display_name | Hong Kong University of Science and Technology |
| authorships[3].institutions[1].id | https://openalex.org/I889458895 |
| authorships[3].institutions[1].ror | https://ror.org/02zhqgq86 |
| authorships[3].institutions[1].type | education |
| authorships[3].institutions[1].lineage | https://openalex.org/I889458895 |
| authorships[3].institutions[1].country_code | HK |
| authorships[3].institutions[1].display_name | University of Hong Kong |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Benfeng Chen |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | AI Thrust, The Hong Kong University of Science and Technology (Guangzhou), Guangzhou 510000, China |
| authorships[4].author.id | https://openalex.org/A5099587584 |
| authorships[4].author.orcid | https://orcid.org/0000-0003-4507-1868 |
| authorships[4].author.display_name | Zhizhong Tan |
| authorships[4].countries | MO |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I111950717 |
| authorships[4].affiliations[0].raw_affiliation_string | School of Computer Science and Engineering, Macau University of Science and Technology, Macau 999078, China |
| authorships[4].institutions[0].id | https://openalex.org/I111950717 |
| authorships[4].institutions[0].ror | https://ror.org/03jqs2n27 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I111950717, https://openalex.org/I4391767947 |
| authorships[4].institutions[0].country_code | MO |
| authorships[4].institutions[0].display_name | Macau University of Science and Technology |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Zhizhong Tan |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | School of Computer Science and Engineering, Macau University of Science and Technology, Macau 999078, China |
| authorships[5].author.id | https://openalex.org/A5109158100 |
| authorships[5].author.orcid | |
| authorships[5].author.display_name | Anyu Wang |
| authorships[5].affiliations[0].raw_affiliation_string | Tanka Inc., Redwood City, CA 94065, USA |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Anyu Wang |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Tanka Inc., Redwood City, CA 94065, USA |
| authorships[6].author.id | https://openalex.org/A5038512295 |
| authorships[6].author.orcid | https://orcid.org/0000-0002-7505-6370 |
| authorships[6].author.display_name | Yulong Zhang |
| authorships[6].countries | CN |
| authorships[6].affiliations[0].institution_ids | https://openalex.org/I3018263800 |
| authorships[6].affiliations[0].raw_affiliation_string | School of Information Engineering, Huzhou University, Huzhou 313000, China |
| authorships[6].institutions[0].id | https://openalex.org/I3018263800 |
| authorships[6].institutions[0].ror | https://ror.org/04mvpxy20 |
| authorships[6].institutions[0].type | education |
| authorships[6].institutions[0].lineage | https://openalex.org/I3018263800 |
| authorships[6].institutions[0].country_code | CN |
| authorships[6].institutions[0].display_name | Huzhou University |
| authorships[6].author_position | middle |
| authorships[6].raw_author_name | Shuo Zhang |
| authorships[6].is_corresponding | False |
| authorships[6].raw_affiliation_strings | School of Information Engineering, Huzhou University, Huzhou 313000, China |
| authorships[7].author.id | https://openalex.org/A5018510847 |
| authorships[7].author.orcid | https://orcid.org/0000-0001-6138-283X |
| authorships[7].author.display_name | Yan Liu |
| authorships[7].countries | MO |
| authorships[7].affiliations[0].institution_ids | https://openalex.org/I111950717 |
| authorships[7].affiliations[0].raw_affiliation_string | School of Computer Science and Engineering, Macau University of Science and Technology, Macau 999078, China |
| authorships[7].institutions[0].id | https://openalex.org/I111950717 |
| authorships[7].institutions[0].ror | https://ror.org/03jqs2n27 |
| authorships[7].institutions[0].type | education |
| authorships[7].institutions[0].lineage | https://openalex.org/I111950717, https://openalex.org/I4391767947 |
| authorships[7].institutions[0].country_code | MO |
| authorships[7].institutions[0].display_name | Macau University of Science and Technology |
| authorships[7].author_position | middle |
| authorships[7].raw_author_name | Yan Liu |
| authorships[7].is_corresponding | False |
| authorships[7].raw_affiliation_strings | School of Computer Science and Engineering, Macau University of Science and Technology, Macau 999078, China |
| authorships[8].author.id | https://openalex.org/A5001953711 |
| authorships[8].author.orcid | |
| authorships[8].author.display_name | Kai-Xin Zhang |
| authorships[8].countries | CN |
| authorships[8].affiliations[0].institution_ids | https://openalex.org/I32820368 |
| authorships[8].affiliations[0].raw_affiliation_string | Guangdong Institute of Intelligence Science and Technology, Zhuhai 519031, China |
| authorships[8].institutions[0].id | https://openalex.org/I32820368 |
| authorships[8].institutions[0].ror | https://ror.org/01wq2p249 |
| authorships[8].institutions[0].type | education |
| authorships[8].institutions[0].lineage | https://openalex.org/I32820368 |
| authorships[8].institutions[0].country_code | CN |
| authorships[8].institutions[0].display_name | Guangdong Polytechnic of Science and Technology |
| authorships[8].author_position | middle |
| authorships[8].raw_author_name | Kevin Qi Zhang |
| authorships[8].is_corresponding | False |
| authorships[8].raw_affiliation_strings | Guangdong Institute of Intelligence Science and Technology, Zhuhai 519031, China |
| authorships[9].author.id | https://openalex.org/A5101565820 |
| authorships[9].author.orcid | https://orcid.org/0000-0001-9588-0239 |
| authorships[9].author.display_name | Li‐Rong Zheng |
| authorships[9].countries | CN |
| authorships[9].affiliations[0].institution_ids | https://openalex.org/I32820368 |
| authorships[9].affiliations[0].raw_affiliation_string | Guangdong Institute of Intelligence Science and Technology, Zhuhai 519031, China |
| authorships[9].institutions[0].id | https://openalex.org/I32820368 |
| authorships[9].institutions[0].ror | https://ror.org/01wq2p249 |
| authorships[9].institutions[0].type | education |
| authorships[9].institutions[0].lineage | https://openalex.org/I32820368 |
| authorships[9].institutions[0].country_code | CN |
| authorships[9].institutions[0].display_name | Guangdong Polytechnic of Science and Technology |
| authorships[9].author_position | middle |
| authorships[9].raw_author_name | Lirong Zheng |
| authorships[9].is_corresponding | False |
| authorships[9].raw_affiliation_strings | Guangdong Institute of Intelligence Science and Technology, Zhuhai 519031, China |
| authorships[10].author.id | https://openalex.org/A5028467074 |
| authorships[10].author.orcid | |
| authorships[10].author.display_name | Wenyong Wang |
| authorships[10].countries | MO |
| authorships[10].affiliations[0].institution_ids | https://openalex.org/I111950717 |
| authorships[10].affiliations[0].raw_affiliation_string | School of Computer Science and Engineering, Macau University of Science and Technology, Macau 999078, China |
| authorships[10].institutions[0].id | https://openalex.org/I111950717 |
| authorships[10].institutions[0].ror | https://ror.org/03jqs2n27 |
| authorships[10].institutions[0].type | education |
| authorships[10].institutions[0].lineage | https://openalex.org/I111950717, https://openalex.org/I4391767947 |
| authorships[10].institutions[0].country_code | MO |
| authorships[10].institutions[0].display_name | Macau University of Science and Technology |
| authorships[10].author_position | last |
| authorships[10].raw_author_name | Wenyong Wang |
| authorships[10].is_corresponding | False |
| authorships[10].raw_affiliation_strings | School of Computer Science and Engineering, Macau University of Science and Technology, Macau 999078, China |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.mdpi.com/2079-9292/14/12/2399/pdf?version=1749722607 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | STALE: A Scalable and Secure Trans-Border Authentication Scheme Leveraging Email and ECDH Key Exchange |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10237 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9987999796867371 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Cryptography and Data Security |
| related_works | https://openalex.org/W2389214306, https://openalex.org/W2965083567, https://openalex.org/W4235240664, https://openalex.org/W1838576100, https://openalex.org/W2095886385, https://openalex.org/W2889616422, https://openalex.org/W2242172122, https://openalex.org/W2284062947, https://openalex.org/W4302812179, https://openalex.org/W2888183313 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.3390/electronics14122399 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210202905 |
| best_oa_location.source.issn | 2079-9292 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2079-9292 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Electronics |
| best_oa_location.source.host_organization | https://openalex.org/P4310310987 |
| best_oa_location.source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310310987 |
| best_oa_location.source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://www.mdpi.com/2079-9292/14/12/2399/pdf?version=1749722607 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Electronics |
| best_oa_location.landing_page_url | https://doi.org/10.3390/electronics14122399 |
| primary_location.id | doi:10.3390/electronics14122399 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210202905 |
| primary_location.source.issn | 2079-9292 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2079-9292 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Electronics |
| primary_location.source.host_organization | https://openalex.org/P4310310987 |
| primary_location.source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310310987 |
| primary_location.source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://www.mdpi.com/2079-9292/14/12/2399/pdf?version=1749722607 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Electronics |
| primary_location.landing_page_url | https://doi.org/10.3390/electronics14122399 |
| publication_date | 2025-06-12 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W6686848843, https://openalex.org/W2912465987, https://openalex.org/W2043157586, https://openalex.org/W1996421816, https://openalex.org/W2018075246, https://openalex.org/W4391183074, https://openalex.org/W4390352357, https://openalex.org/W6868966365, https://openalex.org/W2981575511, https://openalex.org/W2768376125, https://openalex.org/W2789957932, https://openalex.org/W2796928104, https://openalex.org/W3135598087, https://openalex.org/W3017717155, https://openalex.org/W1598016060, https://openalex.org/W2022198423, https://openalex.org/W3193734186, https://openalex.org/W4391069436, https://openalex.org/W6848082837, https://openalex.org/W4281657061, https://openalex.org/W2315222646, https://openalex.org/W2906371635, https://openalex.org/W2480682359, https://openalex.org/W2039043123, https://openalex.org/W3016174556, https://openalex.org/W4306645197, https://openalex.org/W4395014386, https://openalex.org/W4311624773, https://openalex.org/W3015351670, https://openalex.org/W4391342180, https://openalex.org/W4205871108, https://openalex.org/W4316021905, https://openalex.org/W3212420727, https://openalex.org/W4391769773, https://openalex.org/W3044519060, https://openalex.org/W2481712439, https://openalex.org/W6809161066, https://openalex.org/W2795285856, https://openalex.org/W4400083373, https://openalex.org/W3118799686, https://openalex.org/W4288057794, https://openalex.org/W4214705283, https://openalex.org/W4312971983, https://openalex.org/W4399927683, https://openalex.org/W2188945435 |
| referenced_works_count | 45 |
| abstract_inverted_index.a | 127, 152, 207 |
| abstract_inverted_index.In | 0 |
| abstract_inverted_index.To | 120 |
| abstract_inverted_index.an | 182 |
| abstract_inverted_index.as | 16, 146 |
| abstract_inverted_index.in | 46, 72, 91, 116, 177, 202, 250 |
| abstract_inverted_index.is | 190, 211 |
| abstract_inverted_index.it | 142 |
| abstract_inverted_index.of | 35, 53, 78, 88, 105, 223 |
| abstract_inverted_index.on | 166 |
| abstract_inverted_index.or | 5 |
| abstract_inverted_index.to | 57, 82, 99, 197, 259 |
| abstract_inverted_index.Key | 94, 155 |
| abstract_inverted_index.Our | 239 |
| abstract_inverted_index.The | 135 |
| abstract_inverted_index.and | 23, 33, 171, 221, 232, 255 |
| abstract_inverted_index.for | 19, 159 |
| abstract_inverted_index.key | 139, 160, 173, 195 |
| abstract_inverted_index.may | 80 |
| abstract_inverted_index.the | 31, 50, 59, 86, 101, 172, 214, 244 |
| abstract_inverted_index.BCOS | 216 |
| abstract_inverted_index.Data | 234 |
| abstract_inverted_index.both | 163 |
| abstract_inverted_index.cost | 257 |
| abstract_inverted_index.data | 2, 21, 55, 228 |
| abstract_inverted_index.face | 43 |
| abstract_inverted_index.full | 230 |
| abstract_inverted_index.lead | 81 |
| abstract_inverted_index.meet | 58, 100 |
| abstract_inverted_index.that | 243 |
| abstract_inverted_index.this | 124 |
| abstract_inverted_index.user | 148 |
| abstract_inverted_index.with | 26, 151 |
| abstract_inverted_index.(CAs) | 170 |
| abstract_inverted_index.(PKI) | 96 |
| abstract_inverted_index.(data | 3 |
| abstract_inverted_index.Curve | 185 |
| abstract_inverted_index.FISCO | 215 |
| abstract_inverted_index.These | 109 |
| abstract_inverted_index.email | 144 |
| abstract_inverted_index.fails | 98 |
| abstract_inverted_index.serve | 15 |
| abstract_inverted_index.study | 125 |
| abstract_inverted_index.their | 27 |
| abstract_inverted_index.these | 122 |
| abstract_inverted_index.three | 138 |
| abstract_inverted_index.trust | 73 |
| abstract_inverted_index.using | 213 |
| abstract_inverted_index.where | 75 |
| abstract_inverted_index.while | 226 |
| abstract_inverted_index.(ECDH) | 187 |
| abstract_inverted_index.(GDPR) | 237 |
| abstract_inverted_index.(IBC). | 180 |
| abstract_inverted_index.Public | 93, 154 |
| abstract_inverted_index.across | 7, 63 |
| abstract_inverted_index.adopts | 137 |
| abstract_inverted_index.escrow | 174 |
| abstract_inverted_index.issues | 175 |
| abstract_inverted_index.ledger | 210 |
| abstract_inverted_index.method | 246 |
| abstract_inverted_index.points | 77 |
| abstract_inverted_index.risks. | 84 |
| abstract_inverted_index.single | 76 |
| abstract_inverted_index.system | 158 |
| abstract_inverted_index.unique | 147 |
| abstract_inverted_index.General | 233 |
| abstract_inverted_index.address | 121 |
| abstract_inverted_index.chains, | 74 |
| abstract_inverted_index.demands | 104 |
| abstract_inverted_index.exhibit | 70 |
| abstract_inverted_index.failure | 79 |
| abstract_inverted_index.improve | 199 |
| abstract_inverted_index.issues, | 123 |
| abstract_inverted_index.network | 204 |
| abstract_inverted_index.privacy | 24 |
| abstract_inverted_index.results | 241 |
| abstract_inverted_index.session | 194 |
| abstract_inverted_index.storage | 220 |
| abstract_inverted_index.systems | 42, 97 |
| abstract_inverted_index.varying | 60 |
| abstract_inverted_index.(CL-PKC) | 157 |
| abstract_inverted_index.(STALE). | 134 |
| abstract_inverted_index.Elliptic | 184 |
| abstract_inverted_index.Finally, | 206 |
| abstract_inverted_index.Firstly, | 49, 141 |
| abstract_inverted_index.However, | 38 |
| abstract_inverted_index.Thirdly, | 85 |
| abstract_inverted_index.accessed | 6 |
| abstract_inverted_index.business | 107, 118 |
| abstract_inverted_index.combined | 150 |
| abstract_inverted_index.compared | 258 |
| abstract_inverted_index.critical | 17 |
| abstract_inverted_index.directly | 29 |
| abstract_inverted_index.enabling | 218 |
| abstract_inverted_index.enhanced | 183 |
| abstract_inverted_index.ensuring | 20, 227 |
| abstract_inverted_index.exchange | 10 |
| abstract_inverted_index.exhibits | 247 |
| abstract_inverted_index.existing | 39, 260 |
| abstract_inverted_index.identity | 12, 40, 54, 114, 131, 209, 224 |
| abstract_inverted_index.inherent | 176 |
| abstract_inverted_index.multiple | 44 |
| abstract_inverted_index.national | 8 |
| abstract_inverted_index.proposed | 245 |
| abstract_inverted_index.proposes | 126 |
| abstract_inverted_index.protocol | 189 |
| abstract_inverted_index.response | 103 |
| abstract_inverted_index.security | 22, 201 |
| abstract_inverted_index.severely | 111 |
| abstract_inverted_index.systemic | 83 |
| abstract_inverted_index.transfer | 52 |
| abstract_inverted_index.utilizes | 143 |
| abstract_inverted_index.Secondly, | 66, 181 |
| abstract_inverted_index.addresses | 145 |
| abstract_inverted_index.constrain | 112 |
| abstract_inverted_index.contexts. | 48 |
| abstract_inverted_index.different | 64 |
| abstract_inverted_index.employing | 192 |
| abstract_inverted_index.framework | 133 |
| abstract_inverted_index.impacting | 30 |
| abstract_inverted_index.overhead, | 254 |
| abstract_inverted_index.real-time | 102, 113 |
| abstract_inverted_index.struggles | 56 |
| abstract_inverted_index.Protection | 235 |
| abstract_inverted_index.Regulation | 236 |
| abstract_inverted_index.advantages | 249 |
| abstract_inverted_index.challenges | 45 |
| abstract_inverted_index.compliance | 32 |
| abstract_inverted_index.components | 18 |
| abstract_inverted_index.dependency | 165 |
| abstract_inverted_index.globalized | 106 |
| abstract_inverted_index.mechanisms | 14 |
| abstract_inverted_index.scenarios, | 11 |
| abstract_inverted_index.scenarios. | 119 |
| abstract_inverted_index.solutions. | 261 |
| abstract_inverted_index.Authorities | 169 |
| abstract_inverted_index.Certificate | 168 |
| abstract_inverted_index.blockchain, | 217 |
| abstract_inverted_index.centralized | 67 |
| abstract_inverted_index.certificate | 89 |
| abstract_inverted_index.compliance. | 238 |
| abstract_inverted_index.demonstrate | 242 |
| abstract_inverted_index.distributed | 129, 208 |
| abstract_inverted_index.efficiency, | 252 |
| abstract_inverted_index.eliminating | 162 |
| abstract_inverted_index.identifiers | 149 |
| abstract_inverted_index.information | 225 |
| abstract_inverted_index.introduced, | 191 |
| abstract_inverted_index.limitations | 110 |
| abstract_inverted_index.methodology | 136 |
| abstract_inverted_index.negotiation | 196 |
| abstract_inverted_index.operations. | 37, 108 |
| abstract_inverted_index.protection, | 25 |
| abstract_inverted_index.reliability | 34 |
| abstract_inverted_index.significant | 248 |
| abstract_inverted_index.traditional | 92, 167 |
| abstract_inverted_index.transferred | 4 |
| abstract_inverted_index.Cryptography | 156, 179 |
| abstract_inverted_index.experimental | 240 |
| abstract_inverted_index.implemented, | 212 |
| abstract_inverted_index.inefficiency | 87 |
| abstract_inverted_index.innovations. | 140 |
| abstract_inverted_index.key-exchange | 188 |
| abstract_inverted_index.requirements | 62 |
| abstract_inverted_index.single-point | 164 |
| abstract_inverted_index.trans-border | 1, 47, 128, 203 |
| abstract_inverted_index.verification | 90, 115, 222 |
| abstract_inverted_index.architectures | 69 |
| abstract_inverted_index.communication | 200, 253 |
| abstract_inverted_index.computational | 256 |
| abstract_inverted_index.decentralized | 219 |
| abstract_inverted_index.distribution, | 161 |
| abstract_inverted_index.effectiveness | 28 |
| abstract_inverted_index.environments. | 205 |
| abstract_inverted_index.immutability, | 229 |
| abstract_inverted_index.international | 117 |
| abstract_inverted_index.significantly | 198 |
| abstract_inverted_index.traceability, | 231 |
| abstract_inverted_index.transnational | 36, 51 |
| abstract_inverted_index.Identity-Based | 178 |
| abstract_inverted_index.Infrastructure | 95 |
| abstract_inverted_index.authentication | 13, 41, 68, 132, 251 |
| abstract_inverted_index.forward-secure | 193 |
| abstract_inverted_index.jurisdictions) | 9 |
| abstract_inverted_index.jurisdictions. | 65 |
| abstract_inverted_index.Certificateless | 153 |
| abstract_inverted_index.data-compliance | 61 |
| abstract_inverted_index.vulnerabilities | 71 |
| abstract_inverted_index.Diffie–Hellman | 186 |
| abstract_inverted_index.certificate-free | 130 |
| cited_by_percentile_year | |
| countries_distinct_count | 3 |
| institutions_distinct_count | 11 |
| citation_normalized_percentile.value | 0.09677304 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |