{"id":"https://openalex.org/W2364470794","doi":"https://doi.org/10.1080/01611194.2015.1135487","title":"Chaum's protocol for detecting man-in-the-middle: Explanation, demonstration, and timing studies for a text-messaging scenario","display_name":"Chaum's protocol for detecting man-in-the-middle: Explanation, demonstration, and timing studies for a text-messaging scenario","publication_year":2016,"publication_date":"2016-05-11","ids":{"openalex":"https://openalex.org/W2364470794","doi":"https://doi.org/10.1080/01611194.2015.1135487","mag":"2364470794"},"language":"en","primary_location":{"id":"doi:10.1080/01611194.2015.1135487","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01611194.2015.1135487","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptologia","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083555581","display_name":"Alan T. Sherman","orcid":"https://orcid.org/0000-0003-1130-4678"},"institutions":[{"id":"https://openalex.org/I4210108542","display_name":"Schlumberger (Ireland)","ror":"https://ror.org/01mcc7007","country_code":"IE","type":"company","lineage":["https://openalex.org/I4210092184","https://openalex.org/I4210108542"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Alan T. Sherman","raw_affiliation_strings":["Correspondencesherman@umbc.edu"],"affiliations":[{"raw_affiliation_string":"Correspondencesherman@umbc.edu","institution_ids":["https://openalex.org/I4210108542"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020619189","display_name":"John Jefferson Seymour","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"John Seymour","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071625214","display_name":"Akshayraj Kore","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Akshayraj Kore","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5089889912","display_name":"William J. Newton","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"William Newton","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5083555581"],"corresponding_institution_ids":["https://openalex.org/I4210108542"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.04376277,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"41","issue":"1","first_page":"29","last_page":"54"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/man-in-the-middle-attack","display_name":"Man-in-the-middle attack","score":0.9393033981323242},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.750878095626831},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6506823301315308},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5615869760513306},{"id":"https://openalex.org/keywords/string","display_name":"String (physics)","score":0.4630250036716461},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4469378590583801},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.35711461305618286},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13414892554283142},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.10927265882492065}],"concepts":[{"id":"https://openalex.org/C196491621","wikidata":"https://www.wikidata.org/wiki/Q554830","display_name":"Man-in-the-middle attack","level":3,"score":0.9393033981323242},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.750878095626831},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6506823301315308},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5615869760513306},{"id":"https://openalex.org/C157486923","wikidata":"https://www.wikidata.org/wiki/Q1376436","display_name":"String (physics)","level":2,"score":0.4630250036716461},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4469378590583801},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.35711461305618286},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13414892554283142},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.10927265882492065},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C37914503","wikidata":"https://www.wikidata.org/wiki/Q156495","display_name":"Mathematical physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/01611194.2015.1135487","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01611194.2015.1135487","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptologia","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6299999952316284,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306078","display_name":"U.S. Department of Defense","ror":"https://ror.org/0447fe631"},{"id":"https://openalex.org/F4320309204","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W176909244","https://openalex.org/W1499326294","https://openalex.org/W1527077352","https://openalex.org/W1572503422","https://openalex.org/W1618185284","https://openalex.org/W1961623891","https://openalex.org/W1984097153","https://openalex.org/W1990448153","https://openalex.org/W2049954999","https://openalex.org/W2110712507","https://openalex.org/W2119631914","https://openalex.org/W2125894704","https://openalex.org/W2130513648","https://openalex.org/W2158419323","https://openalex.org/W2221588640","https://openalex.org/W2505944591"],"related_works":["https://openalex.org/W4221155389","https://openalex.org/W177107229","https://openalex.org/W2486658553","https://openalex.org/W2112896732","https://openalex.org/W2022068600","https://openalex.org/W3155578322","https://openalex.org/W4386199491","https://openalex.org/W2347355516","https://openalex.org/W2320204756","https://openalex.org/W4280617422"],"abstract_inverted_index":{"This":[0,240],"article":[1,197,241],"explains,":[2],"demonstrates,":[3],"and":[4,67,69,101,136,199,248,259],"evaluates":[5],"Chaum\u2019s":[6,57,104,250],"protocol":[7,58,105,169,191,229],"for":[8,48],"detecting":[9],"a":[10,46,62,125,189,213,219],"man-in-the-middle":[11],"(MitM)":[12],"of":[13,41,52,77,154,181,204],"text-messaging":[14,184],"network":[15,24,226],"communications.":[16,25],"MitM":[17,63,172,214,220,232],"attacks":[18],"pose":[19],"serious":[20],"risks":[21,30],"to":[22,60,133,140,173,177,188,211,233,245],"many":[23],"Networks":[26],"often":[27],"mitigate":[28],"these":[29],"with":[31,64],"robust":[32],"protocols,":[33],"such":[34],"as":[35],"TLS,":[36],"which":[37,208,252],"assume":[38],"some":[39],"type":[40],"public-key":[42],"infrastructure":[43],"that":[44,82,91,134,161],"provides":[45],"mechanism":[47],"the":[49,74,83,88,92,113,138,141,146,158,164,175,202,205,228,231,238,243],"authenticated":[50,75],"exchange":[51,76,115],"public":[53,78,117],"keys.":[54,79,118],"By":[55],"contrast,":[56],"aims":[59],"detect":[61,212],"minimal":[65],"assumptions":[66],"technology,":[68],"in":[70,107,195,215,256],"particular":[71],"without":[72,224],"assuming":[73,218],"Chaum":[80,253],"assumes":[81],"eavesdropper":[84,93],"can":[85,221],"\u201csound":[86],"like\u201d":[87],"communicants":[89,114,159,176],"but":[90],"cannot":[94],"fabricate":[95],"sensible":[96],"conversations.Using":[97],"an":[98,257],"encryption":[99],"function":[100],"one-way":[102],"function,":[103],"works":[106],"three":[108],"phases.":[109],"In":[110,119,149],"Phase":[111,120,150],"I,":[112],"their":[116],"II,":[121],"each":[122,162],"communicant":[123,130,143],"generates":[124],"random":[126],"string.":[127,148],"The":[128,168,183],"first":[129,244],"cryptographically":[131],"commits":[132],"string,":[135],"sends":[137],"string":[139],"other":[142],"after":[144],"receiving":[145],"other\u2019s":[147],"III,":[151],"using":[152],"any":[153,171,225],"four":[155],"different":[156,179],"\u201cscenarios\u201d":[157],"verify":[160],"possesses":[163],"same":[165],"two":[166],"strings.":[167,182],"forces":[170,230],"cause":[174,234],"possess":[178],"pairs":[180],"scenario":[185],"is":[186,242],"similar":[187],"forced-latency":[190],"proposed":[192],"by":[193,237],"Wilcox-O\u2019Hearn":[194],"2003.This":[196],"implements":[198],"experimentally":[200],"demonstrates":[201],"effectiveness":[203],"third":[206],"scenario,":[207],"uses":[209],"timing":[210],"text-messaging.":[216],"Even":[217],"send":[222],"messages":[223],"latency,":[227],"delays":[235],"noticeable":[236],"communicants.":[239],"explain,":[246],"demonstrate,":[247],"evaluate":[249],"protocol,":[251],"described":[254],"only":[255],"abandoned":[258],"nearly":[260],"inscrutable":[261],"patent":[262],"application.":[263]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
