{"id":"https://openalex.org/W2096713635","doi":"https://doi.org/10.1109/enabl.2003.1231416","title":"Key Exchange (KX) - a next generation protocol to synchronise PGP Keyservers","display_name":"Key Exchange (KX) - a next generation protocol to synchronise PGP Keyservers","publication_year":2004,"publication_date":"2004-01-23","ids":{"openalex":"https://openalex.org/W2096713635","doi":"https://doi.org/10.1109/enabl.2003.1231416","mag":"2096713635"},"language":"en","primary_location":{"id":"doi:10.1109/enabl.2003.1231416","is_oa":false,"landing_page_url":"https://doi.org/10.1109/enabl.2003.1231416","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071715584","display_name":"A. von Bidder","orcid":null},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]},{"id":"https://openalex.org/I54157616","display_name":"Swiss Finance Institute","ror":"https://ror.org/02cgn2a44","country_code":"CH","type":"education","lineage":["https://openalex.org/I54157616"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"A. von Bidder","raw_affiliation_strings":["Swiss Federal Institute of Technology, Zurich, Switzerland","Swiss Fed. Inst. of Technol., Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Swiss Federal Institute of Technology, Zurich, Switzerland","institution_ids":["https://openalex.org/I5124864"]},{"raw_affiliation_string":"Swiss Fed. Inst. of Technol., Zurich, Switzerland","institution_ids":["https://openalex.org/I54157616"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078228210","display_name":"N. Weiler","orcid":null},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]},{"id":"https://openalex.org/I54157616","display_name":"Swiss Finance Institute","ror":"https://ror.org/02cgn2a44","country_code":"CH","type":"education","lineage":["https://openalex.org/I54157616"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"N. Weiler","raw_affiliation_strings":["Swiss Federal Institute of Technology, Zurich, Switzerland","Swiss Fed. Inst. of Technol., Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Swiss Federal Institute of Technology, Zurich, Switzerland","institution_ids":["https://openalex.org/I5124864"]},{"raw_affiliation_string":"Swiss Fed. Inst. of Technol., Zurich, Switzerland","institution_ids":["https://openalex.org/I54157616"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5071715584"],"corresponding_institution_ids":["https://openalex.org/I5124864","https://openalex.org/I54157616"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.11490912,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"249","last_page":"254"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.7766321897506714},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.7223045825958252},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6915183067321777},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.686104953289032},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6551339626312256},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.6352651119232178},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5633748769760132},{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.48071032762527466},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4752238392829895},{"id":"https://openalex.org/keywords/oakley-protocol","display_name":"Oakley protocol","score":0.47431302070617676},{"id":"https://openalex.org/keywords/pre-shared-key","display_name":"Pre-shared key","score":0.4736386835575104},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4559131860733032},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.44637805223464966},{"id":"https://openalex.org/keywords/security-association","display_name":"Security association","score":0.4336371421813965},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.4225071966648102},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.4105762541294098},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.30371183156967163},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17135575413703918}],"concepts":[{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.7766321897506714},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.7223045825958252},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6915183067321777},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.686104953289032},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6551339626312256},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.6352651119232178},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5633748769760132},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.48071032762527466},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4752238392829895},{"id":"https://openalex.org/C126266803","wikidata":"https://www.wikidata.org/wiki/Q7074169","display_name":"Oakley protocol","level":5,"score":0.47431302070617676},{"id":"https://openalex.org/C50230483","wikidata":"https://www.wikidata.org/wiki/Q2108226","display_name":"Pre-shared key","level":5,"score":0.4736386835575104},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4559131860733032},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.44637805223464966},{"id":"https://openalex.org/C130881749","wikidata":"https://www.wikidata.org/wiki/Q586894","display_name":"Security association","level":5,"score":0.4336371421813965},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.4225071966648102},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.4105762541294098},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.30371183156967163},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17135575413703918},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/enabl.2003.1231416","is_oa":false,"landing_page_url":"https://doi.org/10.1109/enabl.2003.1231416","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1909457994","https://openalex.org/W1996360405","https://openalex.org/W2052987781","https://openalex.org/W2106696152","https://openalex.org/W2127280340","https://openalex.org/W2135300639","https://openalex.org/W2142423295","https://openalex.org/W2185811644","https://openalex.org/W2987031481","https://openalex.org/W4232836212","https://openalex.org/W4240845011","https://openalex.org/W6639765874","https://openalex.org/W6649304700","https://openalex.org/W6676102325","https://openalex.org/W6678898878","https://openalex.org/W6770323529"],"related_works":["https://openalex.org/W2356981542","https://openalex.org/W4205292816","https://openalex.org/W2247198827","https://openalex.org/W1997645629","https://openalex.org/W1972417273","https://openalex.org/W2081422519","https://openalex.org/W3024131352","https://openalex.org/W1988377555","https://openalex.org/W2015347636","https://openalex.org/W4378471218"],"abstract_inverted_index":{"In":[0],"the":[1,20,72,80,85,90,94,147,166,214,231,241,256,269,272,280],"Internet,":[2],"securing":[3],"email":[4,225],"has":[5],"always":[6],"been":[7,16],"an":[8,135,221,234],"important":[9,150],"issue.":[10],"Various":[11],"standards":[12,23],"and":[13,43,45,66,82,133,201,223,258,279,295],"products":[14],"have":[15],"created.":[17],"One":[18],"of":[19,74,84,92,96,110,152,162,172,179,189,233,271,291],"most":[21,149],"successful":[22],"is":[24,46,79,218,285],"OpenPGP":[25,88,167,180],"by":[26,62,100,113,117,142,196],"J.":[27],"Callas":[28],"et":[29,40],"al.":[30,41],"(1998),":[31],"which":[32],"uses":[33],"public":[34,75,86,98,125,131,137,155,164,175,185,199],"key":[35,76,99,120,132,138,156,202,211,263],"cryptography":[36],"(R.":[37],"L.":[38],"Rivest":[39],"(1977)":[42],"others)":[44],"implemented":[47],"in":[48,289],"systems":[49,78],"like":[50],"Pretty":[51],"Good":[52],"Privacy":[53,60],"according":[54,245],"to":[55,182,246],"P.":[56,114],"Zimmerman":[57],"(1995),":[58],"Gnu":[59],"Guard":[61],"W.":[63],"Koch,":[64],"Hushmail,":[65],"others.":[67],"A":[68],"well-known":[69],"difficulty":[70],"with":[71,122,220],"use":[73],"cryptographic":[77],"verification":[81],"distribution":[83,161],"keys.":[87,186],"solves":[89],"problem":[91],"verifying":[93],"authenticity":[95],"a":[97,108,129,143,170,275,286],"having":[101],"users":[102,124,178],"certify":[103],"each":[104,123,205],"others":[105],"keys,":[106,165],"building":[107,208],"\"Web":[109],"Trust\"":[111],"described":[112],"Feisthammel":[115],"(1997)":[116],"bundling":[118],"these":[119],"certificates":[121],"key.":[126,267],"Therefore,":[127],"adding":[128],"new":[130,144,198,266],"updating":[134],"existing":[136],"(or":[139],"replacing":[140],"it":[141],"version)":[145],"are":[146],"two":[148],"operations":[151],"any":[153],"PGP":[154,163],"repository.":[157],"To":[158],"allow":[159],"easy":[160],"community":[168],"established":[169],"network":[171,192],"open":[173],"access":[174],"keyservers,":[176],"allowing":[177],"software":[181],"freely":[183],"exchange":[184],"The":[187],"nodes":[188],"this":[190,216],"keyserver":[191,244],"synchronise":[193],"their":[194],"database":[195],"exchanging":[197],"keys":[200],"updates":[203],"amongst":[204],"other,":[206],"virtually":[207],"one":[209],"global":[210],"database.":[212],"At":[213],"moment,":[215],"synchronisation":[217],"done":[219],"inefficient":[222],"ineffective":[224],"based":[226,250],"protocol.":[227],"This":[228],"paper":[229],"describes":[230],"implementation":[232],"alternative":[235,288],"protocol":[236],"-":[237,239],"KX":[238,284],"on":[240,251,274],"popular":[242],"pksd":[243],"M.":[247],"Horowitz":[248],"(1997),":[249],"direct":[252],"TCP":[253],"connections":[254],"between":[255],"keyservers":[257],"unambiguous":[259],"identifiers":[260],"for":[261],"every":[262],"update":[264],"or":[265],"With":[268],"dropping":[270],"dependency":[273],"working":[276],"mail":[277],"system":[278],"improved":[281],"fault":[282],"mechanisms,":[283],"lightweight":[287],"terms":[290],"used":[292],"network,":[293],"disk":[294],"CPU":[296],"resources.":[297]},"counts_by_year":[{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
