{"id":"https://openalex.org/W2335136354","doi":"https://doi.org/10.1504/ijahuc.2016.075187","title":"A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks","display_name":"A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2335136354","doi":"https://doi.org/10.1504/ijahuc.2016.075187","mag":"2335136354"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijahuc.2016.075187","pdf_url":null,"source":{"id":"https://openalex.org/S97070762","display_name":"International Journal of Ad Hoc and Ubiquitous Computing","issn_l":"1743-8225","issn":["1743-8225","1743-8233"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032251891","display_name":"Suman Bala","orcid":null},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Suman Bala","raw_affiliation_strings":["Computer Science and Engineering Department, Thapar University, Patiala 147004, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Thapar University, Patiala 147004, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028581691","display_name":"Anil Kumar Verma","orcid":"https://orcid.org/0000-0002-7167-4323"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Anil K. Verma","raw_affiliation_strings":["Computer Science and Engineering Department, Thapar University, Patiala 147004, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Thapar University, Patiala 147004, India","institution_ids":["https://openalex.org/I162030827"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.48,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":9,"citation_normalized_percentile":{"value":0.864385,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":"21","issue":"2","first_page":"140","last_page":"140"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9983,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9953,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.8501817},{"id":"https://openalex.org/keywords/key-agreement-protocol","display_name":"Key-agreement protocol","score":0.5595775},{"id":"https://openalex.org/keywords/scalar-multiplication","display_name":"Scalar multiplication","score":0.41075537}],"concepts":[{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.8501817},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8301098},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5884961},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.5595775},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5510599},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5341192},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5208174},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5137823},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.51075006},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5098035},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.44969943},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.41277218},{"id":"https://openalex.org/C171182647","wikidata":"https://www.wikidata.org/wiki/Q126736","display_name":"Scalar multiplication","level":3,"score":0.41075537},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.34007776},{"id":"https://openalex.org/C57691317","wikidata":"https://www.wikidata.org/wiki/Q1289248","display_name":"Scalar (mathematics)","level":2,"score":0.28362036},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.143453},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07790199},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijahuc.2016.075187","pdf_url":null,"source":{"id":"https://openalex.org/S97070762","display_name":"International Journal of Ad Hoc and Ubiquitous Computing","issn_l":"1743-8225","issn":["1743-8225","1743-8233"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.9,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":35,"referenced_works":["https://openalex.org/W1491156005","https://openalex.org/W1511530643","https://openalex.org/W1542059364","https://openalex.org/W1555386904","https://openalex.org/W1569083856","https://openalex.org/W1583751262","https://openalex.org/W1591524234","https://openalex.org/W1607492242","https://openalex.org/W1744547499","https://openalex.org/W175905600","https://openalex.org/W1823235961","https://openalex.org/W1956043843","https://openalex.org/W1959942577","https://openalex.org/W2034732438","https://openalex.org/W2050322947","https://openalex.org/W2051152775","https://openalex.org/W2067647377","https://openalex.org/W2074007885","https://openalex.org/W2076203885","https://openalex.org/W2098016215","https://openalex.org/W2099641228","https://openalex.org/W2100788090","https://openalex.org/W2135654420","https://openalex.org/W2149690282","https://openalex.org/W2150525525","https://openalex.org/W2153281696","https://openalex.org/W2168452204","https://openalex.org/W2168694763","https://openalex.org/W2183116878","https://openalex.org/W2405248427","https://openalex.org/W2476448192","https://openalex.org/W2512320888","https://openalex.org/W3139770325","https://openalex.org/W3141531111","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W798747750","https://openalex.org/W2766713099","https://openalex.org/W2548448382","https://openalex.org/W2378926977","https://openalex.org/W2377417414","https://openalex.org/W2324696996","https://openalex.org/W2205992368","https://openalex.org/W2148480905","https://openalex.org/W2124247429","https://openalex.org/W2106254802"],"abstract_inverted_index":{"Key":[0],"agreement":[1,26,71],"protocol(s)":[2,27],"is":[3,77,116,142],"one":[4],"of":[5,20,46,48,57,84],"the":[6,18,44,102,122,139,146],"important":[7],"factors":[8],"for":[9,74,107],"establishing":[10],"communication":[11],"between":[12],"two":[13],"parties.":[14],"Recent":[15],"works":[16],"support":[17],"use":[19],"pairing":[21],"free":[22],"certificateless":[23],"authenticated":[24,69],"key":[25,51,54,70],"and":[28,53,97,101,111],"becomes":[29],"a":[30,34,65],"promising":[31],"base":[32],"in":[33,121],"energy-famished":[35],"WSN.":[36,75],"Certificateless":[37,67],"concept":[38],"provides":[39],"an":[40],"authentication":[41],"by":[42,126],"eliminating":[43],"need":[45],"certificates":[47],"traditional":[49],"public":[50],"cryptography":[52,60],"escrow":[55],"problem":[56],"identity":[58],"based":[59],"(IBC).":[61],"This":[62],"paper":[63],"presents":[64],"non-interactive":[66],"two-party":[68],"(NI-CTAKA)":[72],"protocol":[73,141],"NI-CTAKA":[76,88,115],"pairing-free":[78],"as":[79,81],"well":[80],"reduces":[82],"number":[83],"scalar":[85],"point":[86],"multiplications.":[87],"has":[89,104],"been":[90,105],"implemented":[91],"on":[92],"MICAz":[93],"platform":[94],"using":[95],"TinyOS-2.1.2":[96],"RELIC-0.3.3":[98],"cryptographic":[99],"library":[100],"results":[103],"analysed":[106],"storage-cost,":[108],"running":[109],"time":[110],"energy":[112],"consumption.":[113],"Further,":[114],"proven":[117],"to":[118],"be":[119],"secure":[120],"security":[123],"model":[124],"presented":[125],"Lipold":[127],"et":[128],"al.":[129],"extended":[130],"Canetti-Krawczyk":[131],"(eCK)":[132],"model.":[133],"The":[134],"comparative":[135],"analysis":[136],"proves":[137],"that":[138],"proposed":[140],"more":[143],"efficient":[144],"than":[145],"existing":[147],"protocols.":[148]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2335136354","counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2024-12-12T20:55:52.547920","created_date":"2016-06-24"}