{"id":"https://openalex.org/W2771231957","doi":"https://doi.org/10.1109/pacrim.2017.8121931","title":"Securing email for the average users via a new architecture","display_name":"Securing email for the average users via a new architecture","publication_year":2017,"publication_date":"2017-08-01","ids":{"openalex":"https://openalex.org/W2771231957","doi":"https://doi.org/10.1109/pacrim.2017.8121931","mag":"2771231957"},"language":"en","primary_location":{"id":"doi:10.1109/pacrim.2017.8121931","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pacrim.2017.8121931","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028128816","display_name":"Mehrdad Nourai","orcid":null},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mehrdad Nourai","raw_affiliation_strings":["Computer Science Department, University of Massachusetts Lowell, Lowell, MA, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University of Massachusetts Lowell, Lowell, MA, USA","institution_ids":["https://openalex.org/I133738476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029374376","display_name":"Haim Levkowitz","orcid":null},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Haim Levkowitz","raw_affiliation_strings":["Computer Science Department, University of Massachusetts Lowell, Lowell, MA, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University of Massachusetts Lowell, Lowell, MA, USA","institution_ids":["https://openalex.org/I133738476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5028128816"],"corresponding_institution_ids":["https://openalex.org/I133738476"],"apc_list":null,"apc_paid":null,"fwci":0.2072,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.58694566,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7870118618011475},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.7514955401420593},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.646479606628418},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6296164989471436},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5776515007019043},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5720418691635132},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.47180619835853577},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4391675591468811}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7870118618011475},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.7514955401420593},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.646479606628418},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6296164989471436},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5776515007019043},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5720418691635132},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.47180619835853577},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4391675591468811},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pacrim.2017.8121931","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pacrim.2017.8121931","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1566789091","https://openalex.org/W1682505673","https://openalex.org/W1909457994","https://openalex.org/W2220632610","https://openalex.org/W2917112630","https://openalex.org/W4206688049","https://openalex.org/W4210467114","https://openalex.org/W4301489482"],"related_works":["https://openalex.org/W2093262417","https://openalex.org/W2123131699","https://openalex.org/W650116260","https://openalex.org/W2378329187","https://openalex.org/W4390790060","https://openalex.org/W2134191509","https://openalex.org/W3209454962","https://openalex.org/W79697243","https://openalex.org/W2314257840","https://openalex.org/W2365800294"],"abstract_inverted_index":{"The":[0,76,140],"ubiquity":[1],"of":[2,27,65,78,89,102,142],"the":[3,15,18,25,59,62,73,79,100,112,158,178,205],"Internet":[4],"and":[5,39,50,104,127,148,192],"email,":[6],"have":[7,23],"provided":[8],"a":[9,98,129,198],"mostly":[10],"insecure":[11,120],"communication":[12],"medium":[13],"for":[14,43,72,136],"consumer.":[16],"During":[17],"last":[19],"few":[20],"decades,":[21],"we":[22,125],"seen":[24],"development":[26],"several":[28],"ways":[29],"to":[30,41,47,85,150,168,173,203],"secure":[31],"email":[32,45,68,138,175,188],"messages.":[33,139],"However,":[34],"these":[35],"solutions":[36],"are":[37],"inflexible":[38],"difficult":[40],"use":[42,115,151,157],"encrypting":[44],"messages":[46],"protect":[48,193],"security":[49],"privacy":[51],"while":[52],"communicating":[53],"or":[54],"collaborating":[55],"via":[56],"email.":[57],"Under":[58],"current":[60,80,108],"paradigm,":[61],"arduous":[63],"process":[64],"setting":[66],"up":[67],"encryption":[69],"is":[70,146],"non-intuitive":[71],"average":[74],"user.":[75],"complexity":[77],"practices":[81,109],"has":[82,92],"also":[83],"yielded":[84],"incorrect":[86],"developers'":[87],"interpretation":[88],"architecture":[90,141,206],"which":[91,162],"resulted":[93],"in":[94,107,182],"interoperability":[95],"issues.":[96],"As":[97],"result,":[99],"lack":[101],"simple":[103],"easy-to-use":[105],"infrastructure":[106,200],"means":[110],"that":[111],"consumers":[113],"still":[114],"plain":[116],"text":[117],"emails":[118],"over":[119],"networks.":[121],"In":[122,196],"this":[123,183],"paper,":[124],"introduce":[126],"describe":[128],"novel,":[130],"holistic":[131],"model":[132,145],"with":[133],"new":[134,179],"techniques":[135,180],"protecting":[137],"our":[143],"innovative":[144],"simpler":[147],"easier":[149],"than":[152],"those":[153],"currently":[154],"employed.":[155],"We":[156],"simplified":[159,199],"trust":[160],"model,":[161],"can":[163,185],"relieve":[164],"users":[165],"from":[166,189],"having":[167],"perform":[169],"many":[170],"complex":[171],"steps":[172],"achieve":[174],"security.":[176],"Utilizing":[177],"presented":[181],"paper":[184],"safeguard":[186],"users'":[187],"unauthorized":[190],"access":[191],"their":[194],"privacy.":[195],"addition,":[197],"enables":[201],"developers":[202],"understand":[204],"more":[207],"readily":[208],"eliminating":[209],"interoperability.":[210]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
