{"id":"https://openalex.org/W2058399562","doi":"https://doi.org/10.1108/09685220510627250","title":"Optimized multi\u2010party certified email protocols","display_name":"Optimized multi\u2010party certified email protocols","publication_year":2005,"publication_date":"2005-12-01","ids":{"openalex":"https://openalex.org/W2058399562","doi":"https://doi.org/10.1108/09685220510627250","mag":"2058399562"},"language":"en","primary_location":{"id":"doi:10.1108/09685220510627250","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685220510627250","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008266220","display_name":"Jianying Zhou","orcid":"https://orcid.org/0000-0003-0594-0432"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Jianying Zhou","raw_affiliation_strings":["Institute for Infocomm Research, Singapore, Singapore","Inst. For Infocomm Res., Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Institute for Infocomm Research, Singapore, Singapore","institution_ids":["https://openalex.org/I3005327000"]},{"raw_affiliation_string":"Inst. For Infocomm Res., Singapore, Singapore","institution_ids":["https://openalex.org/I3005327000"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032553494","display_name":"Jos\u00e9 A. Onieva","orcid":"https://orcid.org/0000-0002-7280-090X"},"institutions":[{"id":"https://openalex.org/I82767444","display_name":"Universidad de M\u00e1laga","ror":"https://ror.org/036b2ww28","country_code":"ES","type":"education","lineage":["https://openalex.org/I82767444"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Jose Onieva","raw_affiliation_strings":["Computer Science Department, E.T.S. Ingenieria Informatica, University of Malaga, Malaga, Spain","Computer Science Department, E.T.S. Ingenier\u00eda Inform\u00e1tica, University of Malaga, Malaga, Spain#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, E.T.S. Ingenieria Informatica, University of Malaga, Malaga, Spain","institution_ids":["https://openalex.org/I82767444"]},{"raw_affiliation_string":"Computer Science Department, E.T.S. Ingenier\u00eda Inform\u00e1tica, University of Malaga, Malaga, Spain#TAB#","institution_ids":["https://openalex.org/I82767444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100641212","display_name":"Javier L\u00f3pez","orcid":"https://orcid.org/0000-0001-8066-9991"},"institutions":[{"id":"https://openalex.org/I82767444","display_name":"Universidad de M\u00e1laga","ror":"https://ror.org/036b2ww28","country_code":"ES","type":"education","lineage":["https://openalex.org/I82767444"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Javier Lopez","raw_affiliation_strings":["Computer Science Department, E.T.S. Ingenieria Informatica, University of Malaga, Malaga, Spain","Computer Science Department, E.T.S. Ingenier\u00eda Inform\u00e1tica, University of Malaga, Malaga, Spain#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, E.T.S. Ingenieria Informatica, University of Malaga, Malaga, Spain","institution_ids":["https://openalex.org/I82767444"]},{"raw_affiliation_string":"Computer Science Department, E.T.S. Ingenier\u00eda Inform\u00e1tica, University of Malaga, Malaga, Spain#TAB#","institution_ids":["https://openalex.org/I82767444"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008266220"],"corresponding_institution_ids":["https://openalex.org/I3005327000"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.11363696,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"13","issue":"5","first_page":"350","last_page":"366"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.75738924741745},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7370272874832153},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7040113210678101},{"id":"https://openalex.org/keywords/trusted-third-party","display_name":"Trusted third party","score":0.6682837009429932},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.6364129185676575},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5583399534225464},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5323978066444397},{"id":"https://openalex.org/keywords/third-party","display_name":"Third party","score":0.525684118270874},{"id":"https://openalex.org/keywords/receipt","display_name":"Receipt","score":0.5093511343002319},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.46192118525505066},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4588639438152313},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.44711631536483765},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3377905786037445},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.27863985300064087},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.23085203766822815},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.0836450457572937}],"concepts":[{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.75738924741745},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7370272874832153},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7040113210678101},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.6682837009429932},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.6364129185676575},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5583399534225464},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5323978066444397},{"id":"https://openalex.org/C2983583741","wikidata":"https://www.wikidata.org/wiki/Q16785388","display_name":"Third party","level":2,"score":0.525684118270874},{"id":"https://openalex.org/C2778979077","wikidata":"https://www.wikidata.org/wiki/Q330190","display_name":"Receipt","level":2,"score":0.5093511343002319},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.46192118525505066},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4588639438152313},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.44711631536483765},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3377905786037445},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.27863985300064087},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.23085203766822815},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0836450457572937},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/09685220510627250","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685220510627250","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1514788831","https://openalex.org/W1550632479","https://openalex.org/W1582842404","https://openalex.org/W1602823218","https://openalex.org/W1822485157","https://openalex.org/W1868299122","https://openalex.org/W1951463180","https://openalex.org/W1964909769","https://openalex.org/W2029093196","https://openalex.org/W2062867278","https://openalex.org/W2108834246","https://openalex.org/W2139391839","https://openalex.org/W2142657952","https://openalex.org/W2151461610","https://openalex.org/W2152495388","https://openalex.org/W6681308961","https://openalex.org/W6682249331"],"related_works":["https://openalex.org/W2166443687","https://openalex.org/W2272650572","https://openalex.org/W2552528289","https://openalex.org/W2139391839","https://openalex.org/W134612904","https://openalex.org/W2743857273","https://openalex.org/W2054449208","https://openalex.org/W2142657952","https://openalex.org/W2280967259","https://openalex.org/W2376764082"],"abstract_inverted_index":{"Purpose":[0],"As":[1],"a":[2,27,55,70,112,147,151,157,160],"value\u2010added":[3,161],"service":[4,162],"to":[5,39,58,69,100],"deliver":[6],"important":[7],"data":[8],"over":[9],"the":[10,34,66,76,89,102,105,108,135],"internet":[11],"with":[12],"guaranteed":[13],"receipt":[14],"for":[15,24],"each":[16,127],"successful":[17],"delivery,":[18],"certified":[19,44,164],"email":[20,45,51],"has":[21,130],"been":[22],"discussed":[23],"years":[25],"and":[26,53,63,107,134],"number":[28],"of":[29,75,88,120,128],"research":[30],"papers":[31],"appeared":[32],"in":[33],"literature.":[35],"This":[36],"paper":[37],"aims":[38],"present":[40],"two":[41,49],"optimized":[42],"multi\u2010party":[43,71],"protocols.":[46],"Design/methodology/approach":[47],"Reviews":[48],"existing":[50],"protocols":[52,77,124],"provides":[54],"modified":[56],"version":[57],"overcome":[59],"their":[60],"security":[61],"flaws":[62],"weaknesses.":[64],"Extends":[65],"two\u2010party":[67],"protocol":[68,113],"scenario.":[72],"Findings":[73],"Both":[74,104],"have":[78],"three":[79,132],"major":[80],"features.":[81],"A":[82],"sender":[83,106],"could":[84],"notify":[85],"multiple":[86],"recipients":[87,95,109],"same":[90],"information":[91],"while":[92],"only":[93,131],"those":[94],"who":[96],"acknowledged":[97],"are":[98,125],"able":[99],"get":[101],"information.":[103],"can":[110],"end":[111],"run":[114],"at":[115],"any":[116],"time":[117],"without":[118],"breach":[119],"fairness.":[121],"The":[122],"exchange":[123],"optimized,":[126],"which":[129],"steps,":[133],"trusted":[136],"third":[137],"party":[138],"will":[139],"not":[140],"be":[141],"involved":[142],"unless":[143],"an":[144],"exception":[145],"(e.g.":[146],"network":[148],"failure":[149],"or":[150],"party's":[152],"misbehavior)":[153],"occurs.":[154],"Originality/value":[155],"Provides":[156],"focus":[158],"on":[159],"\u2013":[163],"email.":[165]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2014,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
