{"id":"https://openalex.org/W2058494252","doi":"https://doi.org/10.1080/01611194.2014.915268","title":"J. F. W. Nuboer and the Reintroduction of Machine Cryptography by the Royal Netherlands Navy, 1915\u20131940","display_name":"J. F. W. Nuboer and the Reintroduction of Machine Cryptography by the Royal Netherlands Navy, 1915\u20131940","publication_year":2015,"publication_date":"2015-04-03","ids":{"openalex":"https://openalex.org/W2058494252","doi":"https://doi.org/10.1080/01611194.2014.915268","mag":"2058494252"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1080/01611194.2014.915268","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026829976","display_name":"Karl de Leeuw","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Karl de Leeuw","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":["https://openalex.org/A5026829976"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":66},"biblio":{"volume":"39","issue":"2","first_page":"157","last_page":"172"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.9944,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.9944,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.8304857},{"id":"https://openalex.org/C2776746162","wikidata":"https://www.wikidata.org/wiki/Q4508","display_name":"Navy","level":2,"score":0.8259014},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.59284705},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4274182},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42386925},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3920186},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.38659564},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.37308255},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.31887236},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.108040184}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1080/01611194.2014.915268","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":12,"referenced_works":["https://openalex.org/W1572117635","https://openalex.org/W1587361231","https://openalex.org/W1627269026","https://openalex.org/W2011575828","https://openalex.org/W2012635527","https://openalex.org/W2028029615","https://openalex.org/W2162581101","https://openalex.org/W2490009102","https://openalex.org/W2523676244","https://openalex.org/W4233606360","https://openalex.org/W4244158714","https://openalex.org/W4302034628"],"related_works":["https://openalex.org/W4313287912","https://openalex.org/W4248806346","https://openalex.org/W4200387112","https://openalex.org/W325941637","https://openalex.org/W2392732075","https://openalex.org/W2133016033","https://openalex.org/W2092816212","https://openalex.org/W2060145807","https://openalex.org/W138071016","https://openalex.org/W105284539"],"abstract_inverted_index":{"After":[0],"experimenting":[1],"with":[2,23],"a":[3,49,65,71],"rotor":[4],"cipher":[5,27],"machine":[6],"in":[7,21],"the":[8,12,17,30,56,74],"first":[9],"world":[10],"war,":[11],"Dutch":[13],"Navy":[14],"resorted":[15],"to":[16,64],"use":[18],"of":[19,26,42,52,55,67,73],"codebooks":[20],"combination":[22],"various":[24],"types":[25],"disks.":[28],"During":[29],"next":[31],"ten":[32],"years,":[33],"military":[34],"exercises":[35],"showed":[36],"time":[37],"and":[38,70],"again":[39],"that":[40],"none":[41],"these":[43],"devices":[44],"functioned":[45],"well.":[46],"In":[47],"1931,":[48],"careful":[50],"examination":[51],"radio":[53],"practices":[54],"belligerents":[57],"by":[58],"J.":[59],"W.":[60],"F.":[61],"Nuboer":[62],"led":[63],"tightening":[66],"signaling":[68],"procedures":[69],"revision":[72],"signal":[75],"book":[76],"for":[77,84],"tactical":[78],"use.":[79],"Cipher":[80],"machines":[81],"were":[82],"reintroduced":[83],"strategic":[85],"communication.":[86]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2058494252","counts_by_year":[],"updated_date":"2025-02-01T17:59:26.266838","created_date":"2016-06-24"}