Get quick answers to your questions about the article from our AI researcher chatbot
{'id': 'https://openalex.org/W1546053434', 'doi': 'https://doi.org/10.1007/978-3-540-24725-8_25', 'title': 'Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation', 'display_name': 'Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation', 'publication_year': 2004, 'publication_date': '2004-01-01', 'ids': {'openalex': 'https://openalex.org/W1546053434', 'doi': 'https://doi.org/10.1007/978-3-540-24725-8_25', 'mag': '1546053434'}, 'language': 'en', 'primary_location': {'is_oa': True, 'landing_page_url': 'https://doi.org/10.1007/978-3-540-24725-8_25', 'pdf_url': 'https://link.springer.com/content/pdf/10.1007/978-3-540-24725-8_25.pdf', 'source': {'id': 'https://openalex.org/S106296714', 'display_name': 'Lecture notes in computer science', 'issn_l': '0302-9743', 'issn': ['0302-9743', '1611-3349'], 'is_oa': False, 'is_in_doaj': False, 'is_core': True, 'host_organization': 'https://openalex.org/P4310319900', 'host_organization_name': 'Springer Science+Business Media', 'host_organization_lineage': ['https://openalex.org/P4310319965', 'https://openalex.org/P4310319900'], 'host_organization_lineage_names': ['Springer Nature', 'Springer Science+Business Media'], 'type': 'book series'}, 'license': None, 'license_id': None, 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}, 'type': 'book-chapter', 'type_crossref': 'book-chapter', 'indexed_in': ['crossref'], 'open_access': {'is_oa': True, 'oa_status': 'bronze', 'oa_url': 'https://link.springer.com/content/pdf/10.1007/978-3-540-24725-8_25.pdf', 'any_repository_has_fulltext': False}, 'authorships': [{'author_position': 'first', 'author': {'id': 'https://openalex.org/A5038206174', 'display_name': 'Vitaly Shmatikov', 'orcid': 'https://orcid.org/0009-0002-1336-5714'}, 'institutions': [{'id': 'https://openalex.org/I1298353152', 'display_name': 'SRI International', 'ror': 'https://ror.org/05s570m15', 'country_code': 'US', 'type': 'nonprofit', 'lineage': ['https://openalex.org/I1298353152']}], 'countries': ['US'], 'is_corresponding': True, 'raw_author_name': 'Vitaly Shmatikov', 'raw_affiliation_strings': ['SRI International,'], 'affiliations': [{'raw_affiliation_string': 'SRI International,', 'institution_ids': ['https://openalex.org/I1298353152']}]}], 'institution_assertions': [], 'countries_distinct_count': 1, 'institutions_distinct_count': 1, 'corresponding_author_ids': ['https://openalex.org/A5038206174'], 'corresponding_institution_ids': ['https://openalex.org/I1298353152'], 'apc_list': {'value': 5000, 'currency': 'EUR', 'value_usd': 5392, 'provenance': 'doaj'}, 'apc_paid': None, 'fwci': 4.911, 'has_fulltext': True, 'fulltext_origin': 'pdf', 'cited_by_count': 35, 'citation_normalized_percentile': {'value': 0.940347, 'is_in_top_1_percent': False, 'is_in_top_10_percent': True}, 'cited_by_percentile_year': {'min': 90, 'max': 91}, 'biblio': {'volume': None, 'issue': None, 'first_page': '355', 'last_page': '369'}, 'is_retracted': False, 'is_paratext': False, 'primary_topic': {'id': 'https://openalex.org/T11504', 'display_name': 'Advanced Authentication Protocols Security', 'score': 0.9985, 'subfield': {'id': 'https://openalex.org/subfields/1705', 'display_name': 'Computer Networks and Communications'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, 'topics': [{'id': 'https://openalex.org/T11504', 'display_name': 'Advanced Authentication Protocols Security', 'score': 0.9985, 'subfield': {'id': 'https://openalex.org/subfields/1705', 'display_name': 'Computer Networks and Communications'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, {'id': 'https://openalex.org/T11424', 'display_name': 'Security and Verification in Computing', 'score': 0.9984, 'subfield': {'id': 'https://openalex.org/subfields/1702', 'display_name': 'Artificial Intelligence'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, {'id': 'https://openalex.org/T10237', 'display_name': 'Cryptography and Data Security', 'score': 0.9981, 'subfield': {'id': 'https://openalex.org/subfields/1702', 'display_name': 'Artificial Intelligence'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}], 'keywords': [{'id': 'https://openalex.org/keywords/modular-exponentiation', 'display_name': 'Modular exponentiation', 'score': 0.79954857}, {'id': 'https://openalex.org/keywords/exponentiation', 'display_name': 'Exponentiation', 'score': 0.67820686}, {'id': 'https://openalex.org/keywords/modular-arithmetic', 'display_name': 'Modular arithmetic', 'score': 0.44196957}, {'id': 'https://openalex.org/keywords/reachability-problem', 'display_name': 'Reachability problem', 'score': 0.4196503}], 'concepts': [{'id': 'https://openalex.org/C153269930', 'wikidata': 'https://www.wikidata.org/wiki/Q430001', 'display_name': 'Decidability', 'level': 2, 'score': 0.84810317}, {'id': 'https://openalex.org/C152763109', 'wikidata': 'https://www.wikidata.org/wiki/Q1228841', 'display_name': 'Modular exponentiation', 'level': 4, 'score': 0.79954857}, {'id': 'https://openalex.org/C33884865', 'wikidata': 'https://www.wikidata.org/wiki/Q1254335', 'display_name': 'Cryptographic protocol', 'level': 3, 'score': 0.6980489}, {'id': 'https://openalex.org/C81539297', 'wikidata': 'https://www.wikidata.org/wiki/Q33456', 'display_name': 'Exponentiation', 'level': 2, 'score': 0.67820686}, {'id': 'https://openalex.org/C41008148', 'wikidata': 'https://www.wikidata.org/wiki/Q21198', 'display_name': 'Computer science', 'level': 0, 'score': 0.61475545}, {'id': 'https://openalex.org/C101468663', 'wikidata': 'https://www.wikidata.org/wiki/Q1620158', 'display_name': 'Modular design', 'level': 2, 'score': 0.5632757}, {'id': 'https://openalex.org/C206530611', 'wikidata': 'https://www.wikidata.org/wiki/Q905896', 'display_name': 'Diophantine equation', 'level': 2, 'score': 0.472876}, {'id': 'https://openalex.org/C80444323', 'wikidata': 'https://www.wikidata.org/wiki/Q2878974', 'display_name': 'Theoretical computer science', 'level': 1, 'score': 0.471372}, {'id': 'https://openalex.org/C178489894', 'wikidata': 'https://www.wikidata.org/wiki/Q8789', 'display_name': 'Cryptography', 'level': 2, 'score': 0.46528357}, {'id': 'https://openalex.org/C32049820', 'wikidata': 'https://www.wikidata.org/wiki/Q319400', 'display_name': 'Modular arithmetic', 'level': 3, 'score': 0.44196957}, {'id': 'https://openalex.org/C2777669093', 'wikidata': 'https://www.wikidata.org/wiki/Q17141570', 'display_name': 'Reachability problem', 'level': 3, 'score': 0.4196503}, {'id': 'https://openalex.org/C136643341', 'wikidata': 'https://www.wikidata.org/wiki/Q1361526', 'display_name': 'Reachability', 'level': 2, 'score': 0.4156158}, {'id': 'https://openalex.org/C33923547', 'wikidata': 'https://www.wikidata.org/wiki/Q395', 'display_name': 'Mathematics', 'level': 0, 'score': 0.3072482}, {'id': 'https://openalex.org/C118615104', 'wikidata': 'https://www.wikidata.org/wiki/Q121416', 'display_name': 'Discrete mathematics', 'level': 1, 'score': 0.3055423}, {'id': 'https://openalex.org/C11413529', 'wikidata': 'https://www.wikidata.org/wiki/Q8366', 'display_name': 'Algorithm', 'level': 1, 'score': 0.21809456}, {'id': 'https://openalex.org/C199360897', 'wikidata': 'https://www.wikidata.org/wiki/Q9143', 'display_name': 'Programming language', 'level': 1, 'score': 0.17652932}, {'id': 'https://openalex.org/C203062551', 'wikidata': 'https://www.wikidata.org/wiki/Q201339', 'display_name': 'Public-key cryptography', 'level': 3, 'score': 0.16409087}, {'id': 'https://openalex.org/C38652104', 'wikidata': 'https://www.wikidata.org/wiki/Q3510521', 'display_name': 'Computer security', 'level': 1, 'score': 0.10523334}, {'id': 'https://openalex.org/C148730421', 'wikidata': 'https://www.wikidata.org/wiki/Q141090', 'display_name': 'Encryption', 'level': 2, 'score': 0.0}, {'id': 'https://openalex.org/C134306372', 'wikidata': 'https://www.wikidata.org/wiki/Q7754', 'display_name': 'Mathematical analysis', 'level': 1, 'score': 0.0}], 'mesh': [], 'locations_count': 1, 'locations': [{'is_oa': True, 'landing_page_url': 'https://doi.org/10.1007/978-3-540-24725-8_25', 'pdf_url': 'https://link.springer.com/content/pdf/10.1007/978-3-540-24725-8_25.pdf', 'source': {'id': 'https://openalex.org/S106296714', 'display_name': 'Lecture notes in computer science', 'issn_l': '0302-9743', 'issn': ['0302-9743', '1611-3349'], 'is_oa': False, 'is_in_doaj': False, 'is_core': True, 'host_organization': 'https://openalex.org/P4310319900', 'host_organization_name': 'Springer Science+Business Media', 'host_organization_lineage': ['https://openalex.org/P4310319965', 'https://openalex.org/P4310319900'], 'host_organization_lineage_names': ['Springer Nature', 'Springer Science+Business Media'], 'type': 'book series'}, 'license': None, 'license_id': None, 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}], 'best_oa_location': {'is_oa': True, 'landing_page_url': 'https://doi.org/10.1007/978-3-540-24725-8_25', 'pdf_url': 'https://link.springer.com/content/pdf/10.1007/978-3-540-24725-8_25.pdf', 'source': {'id': 'https://openalex.org/S106296714', 'display_name': 'Lecture notes in computer science', 'issn_l': '0302-9743', 'issn': ['0302-9743', '1611-3349'], 'is_oa': False, 'is_in_doaj': False, 'is_core': True, 'host_organization': 'https://openalex.org/P4310319900', 'host_organization_name': 'Springer Science+Business Media', 'host_organization_lineage': ['https://openalex.org/P4310319965', 'https://openalex.org/P4310319900'], 'host_organization_lineage_names': ['Springer Nature', 'Springer Science+Business Media'], 'type': 'book series'}, 'license': None, 'license_id': None, 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}, 'sustainable_development_goals': [], 'grants': [], 'datasets': [], 'versions': [], 'referenced_works_count': 19, 'referenced_works': ['https://openalex.org/W1509743338', 'https://openalex.org/W1542190420', 'https://openalex.org/W1544097974', 'https://openalex.org/W1579090196', 'https://openalex.org/W1660562555', 'https://openalex.org/W2011618311', 'https://openalex.org/W2078671172', 'https://openalex.org/W2099171290', 'https://openalex.org/W2126338744', 'https://openalex.org/W2130123502', 'https://openalex.org/W2131123432', 'https://openalex.org/W2131664217', 'https://openalex.org/W2134587548', 'https://openalex.org/W2153662813', 'https://openalex.org/W2153921791', 'https://openalex.org/W2911838076', 'https://openalex.org/W3022449549', 'https://openalex.org/W4285719527', 'https://openalex.org/W4289126832'], 'related_works': ['https://openalex.org/W4242875436', 'https://openalex.org/W3178661740', 'https://openalex.org/W2980315031', 'https://openalex.org/W2623582878', 'https://openalex.org/W2489302584', 'https://openalex.org/W2107014706', 'https://openalex.org/W2080700991', 'https://openalex.org/W1546053434', 'https://openalex.org/W1533411097', 'https://openalex.org/W122256349'], 'abstract_inverted_index': None, 'cited_by_api_url': 'https://api.openalex.org/works?filter=cites:W1546053434', 'counts_by_year': [{'year': 2018, 'cited_by_count': 1}, {'year': 2017, 'cited_by_count': 1}, {'year': 2016, 'cited_by_count': 1}, {'year': 2014, 'cited_by_count': 1}, {'year': 2013, 'cited_by_count': 1}, {'year': 2012, 'cited_by_count': 2}], 'updated_date': '2024-12-10T12:12:59.606888', 'created_date': '2016-06-24'}