Get quick answers to your questions about the article from our AI researcher chatbot
{'id': 'https://openalex.org/W3115045717', 'doi': 'https://doi.org/10.1201/b17352-16', 'title': 'Privacy-Preserving Identity-Based Broadcast Encryption and Its Applications', 'display_name': 'Privacy-Preserving Identity-Based Broadcast Encryption and Its Applications', 'publication_year': 2014, 'publication_date': '2014-08-29', 'ids': {'openalex': 'https://openalex.org/W3115045717', 'doi': 'https://doi.org/10.1201/b17352-16', 'mag': '3115045717'}, 'language': 'en', 'primary_location': {'is_oa': False, 'landing_page_url': 'https://doi.org/10.1201/b17352-16', 'pdf_url': None, 'source': {'id': 'https://openalex.org/S4306462882', 'display_name': 'Auerbach Publications eBooks', 'issn_l': None, 'issn': None, 'is_oa': False, 'is_in_doaj': False, 'is_core': False, 'host_organization': None, 'host_organization_name': None, 'host_organization_lineage': [], 'host_organization_lineage_names': [], 'type': 'ebook platform'}, 'license': None, 'license_id': None, 'version': None, 'is_accepted': False, 'is_published': False}, 'type': 'book-chapter', 'type_crossref': 'book-chapter', 'indexed_in': ['crossref'], 'open_access': {'is_oa': False, 'oa_status': 'closed', 'oa_url': None, 'any_repository_has_fulltext': False}, 'authorships': [{'author_position': 'first', 'author': {'id': 'https://openalex.org/A5048609058', 'display_name': 'A. Muthulakshmi', 'orcid': 'https://orcid.org/0000-0002-3633-8682'}, 'institutions': [], 'countries': [], 'is_corresponding': False, 'raw_author_name': 'MUTHULAKSHMI ANGAMUTHU', 'raw_affiliation_strings': [], 'affiliations': []}, {'author_position': 'middle', 'author': {'id': 'https://openalex.org/A5028945777', 'display_name': 'Raju Anitha', 'orcid': 'https://orcid.org/0000-0002-3786-7308'}, 'institutions': [], 'countries': [], 'is_corresponding': False, 'raw_author_name': 'R. ANITHA', 'raw_affiliation_strings': [], 'affiliations': []}, {'author_position': 'last', 'author': {'id': 'https://openalex.org/A5010360702', 'display_name': 'Thinagaran Perumal', 'orcid': 'https://orcid.org/0000-0003-0698-5413'}, 'institutions': [], 'countries': [], 'is_corresponding': False, 'raw_author_name': 'THANALAKSHMI PERUMAL', 'raw_affiliation_strings': [], 'affiliations': []}], 'institution_assertions': [], 'countries_distinct_count': 0, 'institutions_distinct_count': 0, 'corresponding_author_ids': [], 'corresponding_institution_ids': [], 'apc_list': None, 'apc_paid': None, 'fwci': 0.0, 'has_fulltext': False, 'cited_by_count': 0, 'citation_normalized_percentile': {'value': 0.0, 'is_in_top_1_percent': False, 'is_in_top_10_percent': False}, 'cited_by_percentile_year': {'min': 0, 'max': 66}, 'biblio': {'volume': None, 'issue': None, 'first_page': '262', 'last_page': '283'}, 'is_retracted': False, 'is_paratext': False, 'primary_topic': {'id': 'https://openalex.org/T10237', 'display_name': 'Advanced Cryptographic Schemes and Protocols', 'score': 1.0, 'subfield': {'id': 'https://openalex.org/subfields/1702', 'display_name': 'Artificial Intelligence'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, 'topics': [{'id': 'https://openalex.org/T10237', 'display_name': 'Advanced Cryptographic Schemes and Protocols', 'score': 1.0, 'subfield': {'id': 'https://openalex.org/subfields/1702', 'display_name': 'Artificial Intelligence'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, {'id': 'https://openalex.org/T10764', 'display_name': 'Privacy-Preserving Techniques for Data Analysis and Machine Learning', 'score': 0.9981, 'subfield': {'id': 'https://openalex.org/subfields/1702', 'display_name': 'Artificial Intelligence'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, {'id': 'https://openalex.org/T11017', 'display_name': 'Chaos-based Image Encryption Techniques', 'score': 0.9974, 'subfield': {'id': 'https://openalex.org/subfields/1707', 'display_name': 'Computer Vision and Pattern Recognition'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}], 'keywords': [{'id': 'https://openalex.org/keywords/broadcast-encryption', 'display_name': 'Broadcast encryption', 'score': 0.7690206}, {'id': 'https://openalex.org/keywords/identity-based-encryption', 'display_name': 'Identity-Based Encryption', 'score': 0.708013}, {'id': 'https://openalex.org/keywords/privacy-preserving-computation', 'display_name': 'Privacy-Preserving Computation', 'score': 0.693032}, {'id': 'https://openalex.org/keywords/privacy-preservation', 'display_name': 'Privacy Preservation', 'score': 0.645703}, {'id': 'https://openalex.org/keywords/attribute-based-encryption', 'display_name': 'Attribute-Based Encryption', 'score': 0.640814}, {'id': 'https://openalex.org/keywords/differential-privacy', 'display_name': 'Differential Privacy', 'score': 0.615819}], 'concepts': [{'id': 'https://openalex.org/C2778281673', 'wikidata': 'https://www.wikidata.org/wiki/Q4972106', 'display_name': 'Broadcast encryption', 'level': 4, 'score': 0.7690206}, {'id': 'https://openalex.org/C148730421', 'wikidata': 'https://www.wikidata.org/wiki/Q141090', 'display_name': 'Encryption', 'level': 2, 'score': 0.7104955}, {'id': 'https://openalex.org/C108827166', 'wikidata': 'https://www.wikidata.org/wiki/Q175975', 'display_name': 'Internet privacy', 'level': 1, 'score': 0.5786337}, {'id': 'https://openalex.org/C2778355321', 'wikidata': 'https://www.wikidata.org/wiki/Q17079427', 'display_name': 'Identity (music)', 'level': 2, 'score': 0.5493186}, {'id': 'https://openalex.org/C41008148', 'wikidata': 'https://www.wikidata.org/wiki/Q21198', 'display_name': 'Computer science', 'level': 0, 'score': 0.5322174}, {'id': 'https://openalex.org/C38652104', 'wikidata': 'https://www.wikidata.org/wiki/Q3510521', 'display_name': 'Computer security', 'level': 1, 'score': 0.4862143}, {'id': 'https://openalex.org/C142362112', 'wikidata': 'https://www.wikidata.org/wiki/Q735', 'display_name': 'Art', 'level': 0, 'score': 0.16712731}, {'id': 'https://openalex.org/C203062551', 'wikidata': 'https://www.wikidata.org/wiki/Q201339', 'display_name': 'Public-key cryptography', 'level': 3, 'score': 0.14473173}, {'id': 'https://openalex.org/C107038049', 'wikidata': 'https://www.wikidata.org/wiki/Q35986', 'display_name': 'Aesthetics', 'level': 1, 'score': 0.06472397}], 'mesh': [], 'locations_count': 1, 'locations': [{'is_oa': False, 'landing_page_url': 'https://doi.org/10.1201/b17352-16', 'pdf_url': None, 'source': {'id': 'https://openalex.org/S4306462882', 'display_name': 'Auerbach Publications eBooks', 'issn_l': None, 'issn': None, 'is_oa': False, 'is_in_doaj': False, 'is_core': False, 'host_organization': None, 'host_organization_name': None, 'host_organization_lineage': [], 'host_organization_lineage_names': [], 'type': 'ebook platform'}, 'license': None, 'license_id': None, 'version': None, 'is_accepted': False, 'is_published': False}], 'best_oa_location': None, 'sustainable_development_goals': [], 'grants': [], 'datasets': [], 'versions': [], 'referenced_works_count': 1, 'referenced_works': ['https://openalex.org/W1569083856'], 'related_works': ['https://openalex.org/W3029116823', 'https://openalex.org/W3028989581', 'https://openalex.org/W2241036517', 'https://openalex.org/W2144455304', 'https://openalex.org/W2053797511', 'https://openalex.org/W2033199622', 'https://openalex.org/W2001743975', 'https://openalex.org/W1601035152', 'https://openalex.org/W1587157897', 'https://openalex.org/W1538349060'], 'abstract_inverted_index': None, 'cited_by_api_url': 'https://api.openalex.org/works?filter=cites:W3115045717', 'counts_by_year': [], 'updated_date': '2024-09-15T13:50:43.052010', 'created_date': '2021-01-05'}