{
  "access": {
    "embargo": {
      "active": false,
      "reason": null
    },
    "files": "public",
    "record": "public",
    "status": "open"
  },
  "created": "2024-01-05T02:48:01.247064+00:00",
  "custom_fields": {
    "journal:journal": {
      "issue": "1",
      "title": "International Journal of Electrical and Computer Engineering (IJECE)",
      "volume": "14"
    }
  },
  "deletion_status": {
    "is_deleted": false,
    "status": "P"
  },
  "files": {
    "count": 1,
    "default_preview": "47 33714 IJECE DB D.pdf",
    "enabled": true,
    "entries": {
      "47 33714 IJECE DB D.pdf": {
        "access": {
          "hidden": false
        },
        "checksum": "md5:cfa9d90a12eb2f1324135b2847f3f9fc",
        "ext": "pdf",
        "id": "b42b8518-80e2-4047-b254-ae5817f73096",
        "key": "47 33714 IJECE DB D.pdf",
        "links": {
          "content": "https://zenodo.org/api/records/10460465/files/47%2033714%20IJECE%20DB%20D.pdf/content",
          "iiif_api": "https://zenodo.org/api/iiif/record:10460465:47%2033714%20IJECE%20DB%20D.pdf/full/full/0/default.png",
          "iiif_base": "https://zenodo.org/api/iiif/record:10460465:47%2033714%20IJECE%20DB%20D.pdf",
          "iiif_canvas": "https://zenodo.org/api/iiif/record:10460465/canvas/47%2033714%20IJECE%20DB%20D.pdf",
          "iiif_info": "https://zenodo.org/api/iiif/record:10460465:47%2033714%20IJECE%20DB%20D.pdf/info.json",
          "self": "https://zenodo.org/api/records/10460465/files/47%2033714%20IJECE%20DB%20D.pdf"
        },
        "metadata": null,
        "mimetype": "application/pdf",
        "size": 685157,
        "storage_class": "L"
      }
    },
    "order": [],
    "total_bytes": 685157
  },
  "id": "10460465",
  "is_draft": false,
  "is_published": true,
  "links": {
    "access": "https://zenodo.org/api/records/10460465/access",
    "access_grants": "https://zenodo.org/api/records/10460465/access/grants",
    "access_links": "https://zenodo.org/api/records/10460465/access/links",
    "access_request": "https://zenodo.org/api/records/10460465/access/request",
    "access_users": "https://zenodo.org/api/records/10460465/access/users",
    "archive": "https://zenodo.org/api/records/10460465/files-archive",
    "archive_media": "https://zenodo.org/api/records/10460465/media-files-archive",
    "communities": "https://zenodo.org/api/records/10460465/communities",
    "communities-suggestions": "https://zenodo.org/api/records/10460465/communities-suggestions",
    "doi": "https://doi.org/10.11591/ijece.v14i1.pp479-487",
    "draft": "https://zenodo.org/api/records/10460465/draft",
    "file_modification": "https://zenodo.org/api/records/10460465/file-modification",
    "files": "https://zenodo.org/api/records/10460465/files",
    "latest": "https://zenodo.org/api/records/10460465/versions/latest",
    "latest_html": "https://zenodo.org/records/10460465/latest",
    "media_files": "https://zenodo.org/api/records/10460465/media-files",
    "parent": "https://zenodo.org/api/records/10460464",
    "parent_html": "https://zenodo.org/records/10460464",
    "preview_html": "https://zenodo.org/records/10460465?preview=1",
    "quota_increase": "https://zenodo.org/api/records/10460465/quota-increase",
    "request_deletion": "https://zenodo.org/api/records/10460465/request-deletion",
    "requests": "https://zenodo.org/api/records/10460465/requests",
    "reserve_doi": "https://zenodo.org/api/records/10460465/draft/pids/doi",
    "self": "https://zenodo.org/api/records/10460465",
    "self_doi": "https://doi.org/10.11591/ijece.v14i1.pp479-487",
    "self_doi_html": "https://zenodo.org/doi/10.11591/ijece.v14i1.pp479-487",
    "self_html": "https://zenodo.org/records/10460465",
    "self_iiif_manifest": "https://zenodo.org/api/iiif/record:10460465/manifest",
    "self_iiif_sequence": "https://zenodo.org/api/iiif/record:10460465/sequence/default",
    "thumbnails": {
      "10": "https://zenodo.org/api/iiif/record:10460465:47%2033714%20IJECE%20DB%20D.pdf/full/%5E10,/0/default.jpg",
      "100": "https://zenodo.org/api/iiif/record:10460465:47%2033714%20IJECE%20DB%20D.pdf/full/%5E100,/0/default.jpg",
      "1200": "https://zenodo.org/api/iiif/record:10460465:47%2033714%20IJECE%20DB%20D.pdf/full/%5E1200,/0/default.jpg",
      "250": "https://zenodo.org/api/iiif/record:10460465:47%2033714%20IJECE%20DB%20D.pdf/full/%5E250,/0/default.jpg",
      "50": "https://zenodo.org/api/iiif/record:10460465:47%2033714%20IJECE%20DB%20D.pdf/full/%5E50,/0/default.jpg",
      "750": "https://zenodo.org/api/iiif/record:10460465:47%2033714%20IJECE%20DB%20D.pdf/full/%5E750,/0/default.jpg"
    },
    "versions": "https://zenodo.org/api/records/10460465/versions"
  },
  "media_files": {
    "count": 1,
    "enabled": true,
    "entries": {
      "47 33714 IJECE DB D.pdf.ptif": {
        "access": {
          "hidden": true
        },
        "ext": "ptif",
        "id": "64de4cd8-5c05-464c-a9b3-6706bb93cbab",
        "key": "47 33714 IJECE DB D.pdf.ptif",
        "links": {
          "content": "https://zenodo.org/api/records/10460465/files/47%2033714%20IJECE%20DB%20D.pdf.ptif/content",
          "self": "https://zenodo.org/api/records/10460465/files/47%2033714%20IJECE%20DB%20D.pdf.ptif"
        },
        "metadata": null,
        "mimetype": "application/octet-stream",
        "processor": {
          "source_file_id": "b42b8518-80e2-4047-b254-ae5817f73096",
          "status": "finished",
          "type": "image-tiles"
        },
        "size": 0,
        "storage_class": "L"
      }
    },
    "order": [],
    "total_bytes": 0
  },
  "metadata": {
    "creators": [
      {
        "affiliations": [
          {
            "name": "L.N. Gumilyov Eurasian National University"
          }
        ],
        "person_or_org": {
          "family_name": "Khuralay Moldamurat",
          "identifiers": [
            {
              "identifier": "0000-0002-3691-6948",
              "scheme": "orcid"
            }
          ],
          "name": "Khuralay Moldamurat",
          "type": "personal"
        }
      },
      {
        "affiliations": [
          {
            "name": "L.N. Gumilyov Eurasian National University"
          }
        ],
        "person_or_org": {
          "family_name": "Yerzhan Seitkulov",
          "identifiers": [
            {
              "identifier": "0000-0002-5172-8339",
              "scheme": "orcid"
            }
          ],
          "name": "Yerzhan Seitkulov",
          "type": "personal"
        }
      },
      {
        "affiliations": [
          {
            "name": "L.N. Gumilyov Eurasian National University"
          }
        ],
        "person_or_org": {
          "family_name": "Sabyrzhan Atanov",
          "identifiers": [
            {
              "identifier": "0000-0003-2115-7130",
              "scheme": "orcid"
            }
          ],
          "name": "Sabyrzhan Atanov",
          "type": "personal"
        }
      },
      {
        "affiliations": [
          {
            "name": "L.N. Gumilyov Eurasian National University"
          }
        ],
        "person_or_org": {
          "family_name": "Makhabbat Bakyt",
          "identifiers": [
            {
              "identifier": "0000-0002-1246-9696",
              "scheme": "orcid"
            }
          ],
          "name": "Makhabbat Bakyt",
          "type": "personal"
        }
      },
      {
        "affiliations": [
          {
            "name": "L.N. Gumilyov Eurasian National University"
          }
        ],
        "person_or_org": {
          "family_name": "Banu Yergaliyeva",
          "identifiers": [
            {
              "identifier": "0000-0002-1252-857X",
              "scheme": "orcid"
            }
          ],
          "name": "Banu Yergaliyeva",
          "type": "personal"
        }
      }
    ],
    "description": "<p>This research article provides an extensive analysis of novel methods of<br>cryptographic protection as well as advancements in authentication and<br>authorization techniques within cellular networks. The aim is to explore<br>recent literature and identify effective authentication and authorization<br>methods, including high-speed data encryption. The significance of this<br>study lies in the growing need for enhanced data security in scientific<br>research. Therefore, the focus is on identifying suitable authentication and<br>authorization schemes, including blockchain-based approaches for<br>distributed mobile cloud computing. The research methodology includes<br>observation, comparison, and abstraction, allowing for a comprehensive<br>examination of advanced encryption schemes and algorithms. Topics<br>covered in this article include multi-factor authentication, continuous<br>authentication, identity-based cryptography for vehicle-to-vehicle (V2V)<br>communication, secure blockchain-based authentication for fog computing,<br>internet of things (IoT) device mutual authentication, authentication for<br>wireless sensor networks based on blockchain, new secure authentication<br>schemes for standard wireless telecommunications networks, and the<br>security aspects of 4G and 5G cellular networks. Additionally, in the paper a<br>differentiated authentication mechanism for heterogeneous 6G networks<br>blockchain-based is discussed. The findings presented in this article hold<br>practical value for organizations involved in scientific research and<br>information security, particularly in encryption and protection of sensitive<br>data.</p>",
    "publication_date": "2024-02-01",
    "publisher": "Zenodo",
    "resource_type": {
      "id": "publication-article",
      "title": {
        "de": "Zeitschriftenartikel",
        "en": "Journal article"
      }
    },
    "rights": [
      {
        "description": {
          "en": "The Creative Commons Attribution license allows re-distribution and re-use of a licensed work on the condition that the creator is appropriately credited."
        },
        "icon": "cc-by-icon",
        "id": "cc-by-4.0",
        "props": {
          "scheme": "spdx",
          "url": "https://creativecommons.org/licenses/by/4.0/legalcode"
        },
        "title": {
          "en": "Creative Commons Attribution 4.0 International"
        }
      }
    ],
    "subjects": [
      {
        "subject": "Authentication methods"
      },
      {
        "subject": "Authorization methods"
      },
      {
        "subject": "Blockchain-based authentication"
      },
      {
        "subject": "Cellular networks"
      },
      {
        "subject": "Cryptographic protection"
      },
      {
        "subject": "Data encryption"
      },
      {
        "subject": "Information security"
      }
    ],
    "title": "Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study"
  },
  "parent": {
    "access": {
      "owned_by": {
        "user": "113579"
      },
      "settings": {
        "accept_conditions_text": null,
        "allow_guest_requests": false,
        "allow_user_requests": false,
        "secret_link_expiration": 0
      }
    },
    "communities": {},
    "id": "10460464",
    "pids": {}
  },
  "pids": {
    "doi": {
      "identifier": "10.11591/ijece.v14i1.pp479-487",
      "provider": "external"
    },
    "oai": {
      "identifier": "oai:zenodo.org:10460465",
      "provider": "oai"
    }
  },
  "revision_id": 6,
  "stats": {
    "all_versions": {
      "data_volume": 24665652.0,
      "downloads": 36,
      "unique_downloads": 35,
      "unique_views": 20,
      "views": 20
    },
    "this_version": {
      "data_volume": 24665652.0,
      "downloads": 36,
      "unique_downloads": 35,
      "unique_views": 20,
      "views": 20
    }
  },
  "status": "published",
  "swh": {},
  "updated": "2024-07-07T14:48:55.068385+00:00",
  "versions": {
    "index": 1,
    "is_latest": true
  }
}