{"id":"https://openalex.org/W2794706387","doi":"https://doi.org/10.1007/978-3-030-03332-3_8","title":"A Universally Composable Framework for the Privacy of Email Ecosystems","display_name":"A Universally Composable Framework for the Privacy of Email Ecosystems","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2794706387","doi":"https://doi.org/10.1007/978-3-030-03332-3_8","mag":"2794706387"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-03332-3_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-03332-3_8","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://www.research.ed.ac.uk/en/publications/70a7310e-cb13-4eb0-be54-fd1e562fa749","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053052994","display_name":"Pyrros Chaidos","orcid":null},"institutions":[{"id":"https://openalex.org/I200777214","display_name":"National and Kapodistrian University of Athens","ror":"https://ror.org/04gnjpq42","country_code":"GR","type":"education","lineage":["https://openalex.org/I200777214"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Pyrros Chaidos","raw_affiliation_strings":["National and Kapodistrian University of Athens, Athens, Greece"],"affiliations":[{"raw_affiliation_string":"National and Kapodistrian University of Athens, Athens, Greece","institution_ids":["https://openalex.org/I200777214"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055693818","display_name":"Olga Fourtounelli","orcid":null},"institutions":[{"id":"https://openalex.org/I200777214","display_name":"National and Kapodistrian University of Athens","ror":"https://ror.org/04gnjpq42","country_code":"GR","type":"education","lineage":["https://openalex.org/I200777214"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Olga Fourtounelli","raw_affiliation_strings":["National and Kapodistrian University of Athens, Athens, Greece"],"affiliations":[{"raw_affiliation_string":"National and Kapodistrian University of Athens, Athens, Greece","institution_ids":["https://openalex.org/I200777214"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073753740","display_name":"Aggelos Kiayias","orcid":"https://orcid.org/0000-0003-2451-1430"},"institutions":[{"id":"https://openalex.org/I4210129077","display_name":"Institute of Occupational Medicine","ror":"https://ror.org/03r6k1a05","country_code":"GB","type":"nonprofit","lineage":["https://openalex.org/I4210129077"]},{"id":"https://openalex.org/I98677209","display_name":"University of Edinburgh","ror":"https://ror.org/01nrxwf90","country_code":"GB","type":"education","lineage":["https://openalex.org/I98677209"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Aggelos Kiayias","raw_affiliation_strings":["IOHK, Edinburgh, UK","The University of Edinburgh, Edinburgh, UK"],"affiliations":[{"raw_affiliation_string":"IOHK, Edinburgh, UK","institution_ids":["https://openalex.org/I4210129077"]},{"raw_affiliation_string":"The University of Edinburgh, Edinburgh, UK","institution_ids":["https://openalex.org/I98677209"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031029773","display_name":"Thomas Zacharias","orcid":"https://orcid.org/0000-0002-5022-8543"},"institutions":[{"id":"https://openalex.org/I98677209","display_name":"University of Edinburgh","ror":"https://ror.org/01nrxwf90","country_code":"GB","type":"education","lineage":["https://openalex.org/I98677209"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Thomas Zacharias","raw_affiliation_strings":["The University of Edinburgh, Edinburgh, UK"],"affiliations":[{"raw_affiliation_string":"The University of Edinburgh, Edinburgh, UK","institution_ids":["https://openalex.org/I98677209"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5053052994"],"corresponding_institution_ids":["https://openalex.org/I200777214"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.2719,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.52575656,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"191","last_page":"221"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/composability","display_name":"Composability","score":0.8435602188110352},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.8209384679794312},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7779736518859863},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6178220510482788},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5683512687683105},{"id":"https://openalex.org/keywords/universal-composability","display_name":"Universal composability","score":0.5571378469467163},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.52730393409729},{"id":"https://openalex.org/keywords/metadata","display_name":"Metadata","score":0.5123564004898071},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.49202629923820496},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4605402648448944},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4585520923137665},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.43732476234436035},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4216897487640381},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3917385935783386},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3446502089500427},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.27337372303009033},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.1566638946533203}],"concepts":[{"id":"https://openalex.org/C2778814252","wikidata":"https://www.wikidata.org/wiki/Q5156715","display_name":"Composability","level":2,"score":0.8435602188110352},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.8209384679794312},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7779736518859863},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6178220510482788},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5683512687683105},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.5571378469467163},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.52730393409729},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.5123564004898071},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.49202629923820496},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4605402648448944},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4585520923137665},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.43732476234436035},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4216897487640381},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3917385935783386},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3446502089500427},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.27337372303009033},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.1566638946533203},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-030-03332-3_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-03332-3_8","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.ed.ac.uk:openaire/70a7310e-cb13-4eb0-be54-fd1e562fa749","is_oa":true,"landing_page_url":"https://www.research.ed.ac.uk/en/publications/70a7310e-cb13-4eb0-be54-fd1e562fa749","pdf_url":null,"source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Chaidos, P, Fourtounelli, O, Kiayias, A & Zacharias, T 2018, A Universally Composable Framework for the Privacy of Email Ecosystems. in Advances in Cryptology \u2013 ASIACRYPT 2018 : 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2\u20136, 2018, Proceedings, Part III. Lecture Notes in Computer Science, vol. 11274, Security and Cryptology, vol. 11274, Brisbane, Australia, pp. 191-221, 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Queensland, Australia, 2/12/18. https://doi.org/10.1007/978-3-030-03332-3_8","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:pure.ed.ac.uk:publications/70a7310e-cb13-4eb0-be54-fd1e562fa749","is_oa":false,"landing_page_url":"https://link.springer.com/chapter/10.1007/978-3-030-03332-3_8","pdf_url":null,"source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:pure.ed.ac.uk:openaire/70a7310e-cb13-4eb0-be54-fd1e562fa749","is_oa":true,"landing_page_url":"https://www.research.ed.ac.uk/en/publications/70a7310e-cb13-4eb0-be54-fd1e562fa749","pdf_url":null,"source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Chaidos, P, Fourtounelli, O, Kiayias, A & Zacharias, T 2018, A Universally Composable Framework for the Privacy of Email Ecosystems. in Advances in Cryptology \u2013 ASIACRYPT 2018 : 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2\u20136, 2018, Proceedings, Part III. Lecture Notes in Computer Science, vol. 11274, Security and Cryptology, vol. 11274, Brisbane, Australia, pp. 191-221, 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Queensland, Australia, 2/12/18. https://doi.org/10.1007/978-3-030-03332-3_8","raw_type":"contributionToPeriodical"},"sustainable_development_goals":[{"score":0.6000000238418579,"id":"https://metadata.un.org/sdg/15","display_name":"Life in Land"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W56293434","https://openalex.org/W165274269","https://openalex.org/W1484798037","https://openalex.org/W1499934958","https://openalex.org/W1536141561","https://openalex.org/W1562226375","https://openalex.org/W1567366855","https://openalex.org/W1606570149","https://openalex.org/W1655958391","https://openalex.org/W1978769275","https://openalex.org/W1992157848","https://openalex.org/W2031925412","https://openalex.org/W2087811006","https://openalex.org/W2103299932","https://openalex.org/W2103647628","https://openalex.org/W2108668142","https://openalex.org/W2111586182","https://openalex.org/W2123735079","https://openalex.org/W2136478214","https://openalex.org/W2138719936","https://openalex.org/W2143215034","https://openalex.org/W2150248082","https://openalex.org/W2160179283","https://openalex.org/W2162297215","https://openalex.org/W2171294352","https://openalex.org/W2211872228","https://openalex.org/W2267449820","https://openalex.org/W2293852648","https://openalex.org/W2534639771","https://openalex.org/W2604903677","https://openalex.org/W2614378039","https://openalex.org/W2649500836","https://openalex.org/W2763648389","https://openalex.org/W2911978475","https://openalex.org/W2949823048","https://openalex.org/W3100723659","https://openalex.org/W4231967539"],"related_works":["https://openalex.org/W2980469592","https://openalex.org/W2157779300","https://openalex.org/W3103758520","https://openalex.org/W2417281775","https://openalex.org/W3028615692","https://openalex.org/W2401332089","https://openalex.org/W3034345956","https://openalex.org/W2125039431","https://openalex.org/W3029681083","https://openalex.org/W2949304148"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
