Item talk:Q168954

From geokb

{

 "OpenAlex": {
   "cited_by_count": 397257,
   "created_date": "2024-01-23",
   "description": "This cluster of papers focuses on the development and application of secure classical communication systems using Johnson noise and Kirchhoff's law. It also explores person-oriented research, machine learning algorithms, directional dependence analysis, and statistical packages like ROPstat for data analysis.",
   "display_name": "Secure Classical Communication Using Noise and Laws",
   "domain": {
     "id": "https://openalex.org/domains/3",
     "display_name": "Physical Sciences"
   },
   "field": {
     "id": "https://openalex.org/fields/17",
     "display_name": "Computer Science"
   },
   "id": "https://openalex.org/T13748",
   "ids": {
     "openalex": "https://openalex.org/T13748",
     "wikipedia": "https://en.wikipedia.org/wiki/Secure_communication"
   },
   "keywords": [
     "Secure Communication",
     "Johnson Noise",
     "Kirchhoff Law",
     "Classical Key Distribution",
     "Person-Oriented Research",
     "Machine Learning Algorithms",
     "Artificial Neural Network",
     "Directional Dependence Analysis",
     "Statistical Package ROPstat",
     "Configural Frequency Analysis"
   ],
   "siblings": [
     {
       "id": "https://openalex.org/T10246",
       "display_name": "Ad Hoc Wireless Networks Research"
     },
     {
       "id": "https://openalex.org/T12801",
       "display_name": "Bluetooth Low Energy Technology Overview and Evaluation"
     },
     {
       "id": "https://openalex.org/T12216",
       "display_name": "Clock Synchronization in Networked Systems"
     },
     {
       "id": "https://openalex.org/T13693",
       "display_name": "Cognitive Radio Networks and Smart Technologies"
     },
     {
       "id": "https://openalex.org/T10579",
       "display_name": "Cognitive Radio Networks and Spectrum Management"
     },
     {
       "id": "https://openalex.org/T11478",
       "display_name": "Content-Centric Networking for Information Delivery"
     },
     {
       "id": "https://openalex.org/T10796",
       "display_name": "Cooperative Diversity in Wireless Networks"
     },
     {
       "id": "https://openalex.org/T14455",
       "display_name": "Data Communications and Networking Technologies"
     },
     {
       "id": "https://openalex.org/T10317",
       "display_name": "Data Stream Management Systems and Techniques"
     },
     {
       "id": "https://openalex.org/T12879",
       "display_name": "Decentralized Inference in Wireless Sensor Networks"
     },
     {
       "id": "https://openalex.org/T11896",
       "display_name": "Delay-Tolerant Networking in Mobile Ad Hoc Networks"
     },
     {
       "id": "https://openalex.org/T13807",
       "display_name": "Digital Communication and Information Studies"
     },
     {
       "id": "https://openalex.org/T13745",
       "display_name": "Digital Communication and Media Studies"
     },
     {
       "id": "https://openalex.org/T11596",
       "display_name": "Distributed Constraint Optimization Problems and Algorithms"
     },
     {
       "id": "https://openalex.org/T12288",
       "display_name": "Distributed Coordination in Online Robotics Research"
     },
     {
       "id": "https://openalex.org/T10772",
       "display_name": "Distributed Fault Tolerance and Consistency in Systems"
     },
     {
       "id": "https://openalex.org/T10715",
       "display_name": "Distributed Grid Computing Systems"
     },
     {
       "id": "https://openalex.org/T10249",
       "display_name": "Distributed Multi-Agent Coordination and Control"
     },
     {
       "id": "https://openalex.org/T11181",
       "display_name": "Distributed Storage Systems and Network Coding"
     },
     {
       "id": "https://openalex.org/T11187",
       "display_name": "Dynamics of Synchronization in Complex Networks"
     },
     {
       "id": "https://openalex.org/T13345",
       "display_name": "Efficient Cooperative Image Transmission in Sensor Networks"
     },
     {
       "id": "https://openalex.org/T10575",
       "display_name": "Efficient Power Control in Wireless Networks"
     },
     {
       "id": "https://openalex.org/T10138",
       "display_name": "End-to-End Congestion Control in Networks"
     },
     {
       "id": "https://openalex.org/T10273",
       "display_name": "Internet of Things and Edge Computing"
     },
     {
       "id": "https://openalex.org/T13924",
       "display_name": "Internet of Things and Social Network Interactions"
     },
     {
       "id": "https://openalex.org/T12127",
       "display_name": "Log Analysis and System Performance Diagnosis"
     },
     {
       "id": "https://openalex.org/T11321",
       "display_name": "Low-Density Parity-Check and Polar Codes"
     },
     {
       "id": "https://openalex.org/T12203",
       "display_name": "Mobile Agent Technology in Network Management"
     },
     {
       "id": "https://openalex.org/T10400",
       "display_name": "Network Intrusion Detection and Defense Mechanisms"
     },
     {
       "id": "https://openalex.org/T13983",
       "display_name": "Network Security and Communication Technologies"
     },
     {
       "id": "https://openalex.org/T11347",
       "display_name": "Network Synchronization in Complex Systems"
     },
     {
       "id": "https://openalex.org/T12564",
       "display_name": "Networked Smart Transducer Interface Standard"
     },
     {
       "id": "https://openalex.org/T10829",
       "display_name": "Networks on Chip in System-on-Chip Design"
     },
     {
       "id": "https://openalex.org/T13553",
       "display_name": "Optimizing Information Freshness in Communication Networks"
     },
     {
       "id": "https://openalex.org/T10742",
       "display_name": "Scalable Peer-to-Peer Network Architectures"
     },
     {
       "id": "https://openalex.org/T13836",
       "display_name": "Security and Privacy in RFID Networks"
     },
     {
       "id": "https://openalex.org/T11498",
       "display_name": "Security in Wireless Sensor Networks"
     },
     {
       "id": "https://openalex.org/T11504",
       "display_name": "Security Protocols for Authentication and Key Exchange"
     },
     {
       "id": "https://openalex.org/T10714",
       "display_name": "Software-Defined Networking and Network Virtualization"
     },
     {
       "id": "https://openalex.org/T11158",
       "display_name": "Wireless Medium Access Control Protocols"
     },
     {
       "id": "https://openalex.org/T14353",
       "display_name": "Wireless Sensor Networks for Data Analysis"
     },
     {
       "id": "https://openalex.org/T10080",
       "display_name": "Wireless Sensor Networks: Survey and Applications"
     }
   ],
   "subfield": {
     "id": "https://openalex.org/subfields/1705",
     "display_name": "Computer Networks and Communications"
   },
   "updated_date": "2024-08-19T05:43:17.365740",
   "works_count": 6386,
   "oa_id": "T13748"
 }

}