{"id":"https://openalex.org/W1975670702","doi":"https://doi.org/10.1109/icacci.2013.6637337","title":"Multiple E-mail address certificate","display_name":"Multiple E-mail address certificate","publication_year":2013,"publication_date":"2013-08-01","ids":{"openalex":"https://openalex.org/W1975670702","doi":"https://doi.org/10.1109/icacci.2013.6637337","mag":"1975670702"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2013.6637337","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2013.6637337","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052041451","display_name":"M. Tariq Banday","orcid":"https://orcid.org/0000-0001-8504-5061"},"institutions":[{"id":"https://openalex.org/I135388327","display_name":"University of Kashmir","ror":"https://ror.org/032xfst36","country_code":"IN","type":"education","lineage":["https://openalex.org/I135388327"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"M. Tariq Banday","raw_affiliation_strings":["Department of Electronics & Institute Technology, University of Kashmir, Srinagar, India","Dept. of Electron. & Inst. Technol., Univ. of Kashmir, Srinagar, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics & Institute Technology, University of Kashmir, Srinagar, India","institution_ids":["https://openalex.org/I135388327"]},{"raw_affiliation_string":"Dept. of Electron. & Inst. Technol., Univ. of Kashmir, Srinagar, India","institution_ids":["https://openalex.org/I135388327"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037985080","display_name":"Shafiya Afzal Sheikh","orcid":null},"institutions":[{"id":"https://openalex.org/I135388327","display_name":"University of Kashmir","ror":"https://ror.org/032xfst36","country_code":"IN","type":"education","lineage":["https://openalex.org/I135388327"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shafiya Afzal Sheikh","raw_affiliation_strings":["Department of Electronics & Institute Technology, University of Kashmir, Srinagar, India","Dept. of Electron. & Inst. Technol., Univ. of Kashmir, Srinagar, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics & Institute Technology, University of Kashmir, Srinagar, India","institution_ids":["https://openalex.org/I135388327"]},{"raw_affiliation_string":"Dept. of Electron. & Inst. Technol., Univ. of Kashmir, Srinagar, India","institution_ids":["https://openalex.org/I135388327"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5052041451"],"corresponding_institution_ids":["https://openalex.org/I135388327"],"apc_list":null,"apc_paid":null,"fwci":0.20656357,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.58178993,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1134","last_page":"1139"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/public-key-certificate","display_name":"Public key certificate","score":0.7222961783409119},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6789067983627319},{"id":"https://openalex.org/keywords/certificate-authority","display_name":"Certificate authority","score":0.6745487451553345},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.6566694378852844},{"id":"https://openalex.org/keywords/electronic-mail","display_name":"Electronic mail","score":0.6402335166931152},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.633062481880188},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.607041597366333},{"id":"https://openalex.org/keywords/root-certificate","display_name":"Root certificate","score":0.5461545586585999},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5306911468505859},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.5271862745285034},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.521941602230072},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5144215226173401},{"id":"https://openalex.org/keywords/email-authentication","display_name":"Email authentication","score":0.49513307213783264},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.46145379543304443},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4483007788658142},{"id":"https://openalex.org/keywords/implicit-certificate","display_name":"Implicit certificate","score":0.4361085891723633},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41699254512786865},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1335759460926056}],"concepts":[{"id":"https://openalex.org/C167529545","wikidata":"https://www.wikidata.org/wiki/Q274758","display_name":"Public key certificate","level":4,"score":0.7222961783409119},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6789067983627319},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.6745487451553345},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.6566694378852844},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.6402335166931152},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.633062481880188},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.607041597366333},{"id":"https://openalex.org/C62057728","wikidata":"https://www.wikidata.org/wiki/Q7366568","display_name":"Root certificate","level":5,"score":0.5461545586585999},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5306911468505859},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.5271862745285034},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.521941602230072},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5144215226173401},{"id":"https://openalex.org/C550791530","wikidata":"https://www.wikidata.org/wiki/Q5368811","display_name":"Email authentication","level":5,"score":0.49513307213783264},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.46145379543304443},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4483007788658142},{"id":"https://openalex.org/C67405866","wikidata":"https://www.wikidata.org/wiki/Q6007261","display_name":"Implicit certificate","level":5,"score":0.4361085891723633},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41699254512786865},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1335759460926056},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2013.6637337","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2013.6637337","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W212396256","https://openalex.org/W1585665690","https://openalex.org/W2116876232","https://openalex.org/W2220632610","https://openalex.org/W2232962023","https://openalex.org/W2237590603","https://openalex.org/W2355550369","https://openalex.org/W2769099100","https://openalex.org/W2894806357","https://openalex.org/W2917112630","https://openalex.org/W2917125988","https://openalex.org/W4237029335","https://openalex.org/W4298051233","https://openalex.org/W6608530692","https://openalex.org/W6688431530","https://openalex.org/W6689687639","https://openalex.org/W6843835029"],"related_works":["https://openalex.org/W2376373997","https://openalex.org/W1544794558","https://openalex.org/W2300877280","https://openalex.org/W2188945435","https://openalex.org/W1588128868","https://openalex.org/W4225695746","https://openalex.org/W4224237279","https://openalex.org/W2149644353","https://openalex.org/W2111375600","https://openalex.org/W2040355541"],"abstract_inverted_index":{"Digital":[0],"signature":[1],"certificates":[2,7,103],"are":[3,23],"digitally":[4],"signed":[5],"identity":[6],"issued":[8,24],"by":[9],"trusted":[10],"Certification":[11],"Authorities":[12],"(CA's)":[13],"to":[14,72,76,89],"individuals,":[15],"devices,":[16],"applications,":[17],"or":[18],"services.":[19],"E-mail":[20,35,39,47,65,80],"Certificates":[21,66],"(EC's)":[22],"primarily":[25],"for":[26,43,51,85,113],"the":[27,114],"purpose":[28],"of":[29,60,82,99],"signing":[30,44],"and":[31,45,67,91,104],"encrypting":[32,52],"e-mail":[33,54,62,74,87,93,101,110],"messages.":[34,94],"clients":[36,75],"use":[37,77],"sender's":[38],"Certificate":[40,48,81],"(Private":[41],"Key)":[42,50],"recipient's":[46],"(Public":[49],"an":[53,83,109],"message.":[55],"This":[56],"paper":[57],"proposes":[58],"inclusion":[59],"multiple":[61,100],"addresses":[63,88],"in":[64],"puts":[68],"forward":[69],"modified":[70],"procedure":[71],"allow":[73],"a":[78],"single":[79],"individual":[84],"different":[86],"sign":[90],"encrypt":[92],"Further,":[95],"it":[96],"discusses":[97],"generation":[98],"address":[102],"demonstrates":[105],"their":[106],"working":[107],"using":[108],"client":[111],"developed":[112],"said":[115],"purpose.":[116]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
