{"id":"https://openalex.org/W2249887049","doi":"https://doi.org/10.1109/fskd.2015.7382290","title":"Secure email system based on true IPv6 address access","display_name":"Secure email system based on true IPv6 address access","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W2249887049","doi":"https://doi.org/10.1109/fskd.2015.7382290","mag":"2249887049"},"language":"en","primary_location":{"id":"doi:10.1109/fskd.2015.7382290","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2015.7382290","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100908645","display_name":"Sun Meng","orcid":null},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Sun Meng","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103660648","display_name":"Wang Xing-wei","orcid":null},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wang Xingwei","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100908645"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.15881095,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"8","issue":null,"first_page":"2180","last_page":"2184"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/email-authentication","display_name":"Email authentication","score":0.8062717318534851},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8048468828201294},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6896390318870544},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5981038212776184},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5862598419189453},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.533755362033844},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.48539838194847107},{"id":"https://openalex.org/keywords/blacklist","display_name":"Blacklist","score":0.47256889939308167},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.4627426266670227},{"id":"https://openalex.org/keywords/data-authentication-algorithm","display_name":"Data Authentication Algorithm","score":0.4320807158946991},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4175504744052887},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.36638712882995605},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3409082889556885},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.3350873291492462},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.30773353576660156},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13549113273620605}],"concepts":[{"id":"https://openalex.org/C550791530","wikidata":"https://www.wikidata.org/wiki/Q5368811","display_name":"Email authentication","level":5,"score":0.8062717318534851},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8048468828201294},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6896390318870544},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5981038212776184},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5862598419189453},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.533755362033844},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.48539838194847107},{"id":"https://openalex.org/C2781345505","wikidata":"https://www.wikidata.org/wiki/Q2535979","display_name":"Blacklist","level":2,"score":0.47256889939308167},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.4627426266670227},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.4320807158946991},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4175504744052887},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.36638712882995605},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3409082889556885},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.3350873291492462},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.30773353576660156},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13549113273620605}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fskd.2015.7382290","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2015.7382290","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W9904157","https://openalex.org/W1979674946","https://openalex.org/W1988787446","https://openalex.org/W2082550445","https://openalex.org/W2101140154","https://openalex.org/W2109419746","https://openalex.org/W2163764145","https://openalex.org/W2169366906","https://openalex.org/W2912971824","https://openalex.org/W3099530560","https://openalex.org/W6600388185","https://openalex.org/W6758208915"],"related_works":["https://openalex.org/W1984916066","https://openalex.org/W2610546334","https://openalex.org/W4234011401","https://openalex.org/W2393298610","https://openalex.org/W2943527182","https://openalex.org/W1483112216","https://openalex.org/W2558166637","https://openalex.org/W4200155052","https://openalex.org/W2941888532","https://openalex.org/W2094306508"],"abstract_inverted_index":{"Network":[0],"security":[1],"problems":[2],"still":[3],"exist":[4],"when":[5],"IPv4":[6],"transfers":[7],"to":[8,34,75,84,105,127,136,143],"IPv6.":[9],"The":[10],"current":[11],"Email":[12],"framework":[13],"neither":[14],"authenticates":[15],"the":[16,20,23,30,36,40,52,73,86,129,138,147],"sender":[17],"nor":[18],"traces":[19],"source":[21,42],"of":[22,47,54],"mail,":[24],"so":[25],"even":[26],"find":[27],"a":[28],"spam,":[29],"method":[31],"is":[32,82,125,134,157],"just":[33],"reject":[35],"mail":[37,41,87,108,111],"or":[38],"insert":[39],"into":[43],"\u201cblacklist\u201d,":[44],"and":[45,77,96,98,110,149,160],"both":[46,107,158],"these":[48],"methods":[49,102],"can't":[50],"deracinate":[51],"generation":[53],"spam.":[55],"For":[56],"this":[57,59,155],"reason,":[58],"paper":[60],"designs":[61],"secure":[62],"email":[63],"system":[64,156],"based":[65],"on":[66],"true":[67],"IPv6":[68],"address":[69,132],"access.":[70],"It":[71,90,140],"divides":[72],"authentication":[74,81,95,101,121],"inter-domain":[76],"intra-domain":[78],"authentication.":[79],"Inter-domain":[80],"used":[83,126,135],"authenticate":[85],"sender's":[88,130],"domain.":[89],"combines":[91],"path-based":[92],"authentication,":[93],"encryption-based":[94],"trust":[97],"prestige":[99],"system-based":[100],"in":[103],"order":[104,122],"support":[106],"forwarding":[109],"list.":[112],"Authentication":[113],"efficiency":[114],"can":[115],"be":[116],"further":[117],"improved":[118],"by":[119,145],"organizing":[120],"properly.":[123],"Intra-domain":[124],"affirm":[128],"IP":[131,151],"which":[133],"trace":[137],"sender.":[139],"supports":[141],"user":[142],"move":[144],"combining":[146],"fixed":[148],"changing":[150],"address.":[152],"After":[153],"testing,":[154],"feasible":[159],"effective.":[161]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
