iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.4304/JNW.1.5.9-20
{"id":"https://openalex.org/W2014083444","doi":"https://doi.org/10.4304/jnw.1.5.9-20","title":"802.11i Encryption Key Distribution Using Quantum Cryptography","display_name":"802.11i Encryption Key Distribution Using Quantum Cryptography","publication_year":2006,"publication_date":"2006-10-01","ids":{"openalex":"https://openalex.org/W2014083444","doi":"https://doi.org/10.4304/jnw.1.5.9-20","mag":"2014083444"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.4304/jnw.1.5.9-20","pdf_url":null,"source":{"id":"https://openalex.org/S189188848","display_name":"Journal of Networks","issn_l":"1796-2056","issn":["1796-2056"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042836892","display_name":"Thi Mai Trang Nguyen","orcid":"https://orcid.org/0000-0002-9024-3940"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Thi Mai Trang Nguyen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108613333","display_name":"Mohamed Ali Sfaxi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohamed Ali Sfaxi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5046929668","display_name":"Solange Ghernaouti-H\u00e9lie","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Solange Ghernaouti-H\u00e9lie","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.158,"has_fulltext":false,"cited_by_count":44,"citation_normalized_percentile":{"value":0.895714,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":92,"max":93},"biblio":{"volume":"1","issue":"5","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Computation","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Computation","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing and Simulation","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Physical Layer Security in Wireless Communications","score":0.9887,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum-key-distribution","display_name":"Quantum key distribution","score":0.6080903},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.537204},{"id":"https://openalex.org/keywords/quantum-computation","display_name":"Quantum Computation","score":0.530447},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum Information","score":0.515968},{"id":"https://openalex.org/keywords/quantum-simulation","display_name":"Quantum Simulation","score":0.510449},{"id":"https://openalex.org/keywords/quantum-machine-learning","display_name":"Quantum Machine Learning","score":0.501391}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8862523},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.67354864},{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.6080903},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.54682136},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.53850615},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.52562636},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5179645},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46453908},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36371332},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.2665407},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2618513},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.085892916},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.4304/jnw.1.5.9-20","pdf_url":null,"source":{"id":"https://openalex.org/S189188848","display_name":"Journal of Networks","issn_l":"1796-2056","issn":["1796-2056"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":27,"referenced_works":["https://openalex.org/W1656678770","https://openalex.org/W1916886752","https://openalex.org/W1964707419","https://openalex.org/W1970006170","https://openalex.org/W1970981814","https://openalex.org/W1983197278","https://openalex.org/W1985623009","https://openalex.org/W1999976434","https://openalex.org/W2001466659","https://openalex.org/W2006226307","https://openalex.org/W2007661134","https://openalex.org/W2049471987","https://openalex.org/W2051051926","https://openalex.org/W2052166771","https://openalex.org/W2063148672","https://openalex.org/W2065384803","https://openalex.org/W2100727379","https://openalex.org/W2102607087","https://openalex.org/W2105696445","https://openalex.org/W2118421871","https://openalex.org/W2120755151","https://openalex.org/W2132147947","https://openalex.org/W2955921194","https://openalex.org/W2963478481","https://openalex.org/W2987687226","https://openalex.org/W3038067977","https://openalex.org/W3145042860"],"related_works":["https://openalex.org/W4384158840","https://openalex.org/W4312132309","https://openalex.org/W4240944159","https://openalex.org/W3217264812","https://openalex.org/W2916069885","https://openalex.org/W2903657089","https://openalex.org/W2374628129","https://openalex.org/W2336878745","https://openalex.org/W2147369345","https://openalex.org/W2064775687"],"abstract_inverted_index":{"Quantum":[0],"cryptography":[1,18,32,50,61],"is":[2,37,84],"a":[3,57],"promising":[4],"solution":[5],"towards":[6],"absolute":[7],"security":[8,64],"in":[9,19,33,51,62],"long":[10],"term":[11],"cryptosystems.":[12],"While":[13],"the":[14,28,45,67,70],"use":[15,74],"of":[16,30,47,69,75],"quantum":[17,31,49,60],"fiber":[20],"optical":[21],"networks":[22],"gets":[23],"significant":[24],"advances,":[25],"research":[26],"on":[27],"application":[29],"mobile":[34],"wireless":[35,53],"network":[36,78],"still":[38],"premature.":[39],"In":[40],"this":[41],"paper,":[42],"we":[43],"analyze":[44],"interests":[46],"using":[48],"802.11":[52],"networks,":[54],"and":[55],"propose":[56],"scheme":[58],"integrating":[59],"802.11i":[63],"mechanisms":[65],"for":[66],"distribution":[68],"encryption":[71],"keys.":[72],"The":[73],"an":[76],"apparatus":[77],"to":[79],"provide":[80],"alternative":[81],"line-of-sight":[82],"paths":[83],"also":[85],"discussed.":[86]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2014083444","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":4}],"updated_date":"2024-10-12T21:47:04.117573","created_date":"2016-06-24"}