{"id":"https://openalex.org/W1993042536","doi":"https://doi.org/10.1145/1010832.1010838","title":"A verified encrypted packet interface","display_name":"A verified encrypted packet interface","publication_year":1981,"publication_date":"1981-07-01","ids":{"openalex":"https://openalex.org/W1993042536","doi":"https://doi.org/10.1145/1010832.1010838","mag":"1993042536"},"language":"en","primary_location":{"id":"doi:10.1145/1010832.1010838","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1010832.1010838","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1010832.1010838","source":{"id":"https://openalex.org/S186921487","display_name":"ACM SIGSOFT Software Engineering Notes","issn_l":"0163-5948","issn":["0163-5948","1943-5843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGSOFT Software Engineering Notes","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/1010832.1010838","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071360866","display_name":"Michael K. Smith","orcid":"https://orcid.org/0000-0001-8100-0149"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Michael K. Smith","raw_affiliation_strings":["The University of Texas at Austin","The University of Texas, at Austin"],"affiliations":[{"raw_affiliation_string":"The University of Texas at Austin","institution_ids":["https://openalex.org/I86519309"]},{"raw_affiliation_string":"The University of Texas, at Austin","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009700593","display_name":"Ann E. Siebert","orcid":null},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ann E. Siebert","raw_affiliation_strings":["The University of Texas at Austin","The University of Texas, at Austin"],"affiliations":[{"raw_affiliation_string":"The University of Texas at Austin","institution_ids":["https://openalex.org/I86519309"]},{"raw_affiliation_string":"The University of Texas, at Austin","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008480533","display_name":"Benedetto L. DiVito","orcid":null},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Benedetto L. DiVito","raw_affiliation_strings":["The University of Texas at Austin","The University of Texas, at Austin"],"affiliations":[{"raw_affiliation_string":"The University of Texas at Austin","institution_ids":["https://openalex.org/I86519309"]},{"raw_affiliation_string":"The University of Texas, at Austin","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087268411","display_name":"Donald I. Good","orcid":null},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Donald I. Good","raw_affiliation_strings":["The University of Texas at Austin","The University of Texas, at Austin"],"affiliations":[{"raw_affiliation_string":"The University of Texas at Austin","institution_ids":["https://openalex.org/I86519309"]},{"raw_affiliation_string":"The University of Texas, at Austin","institution_ids":["https://openalex.org/I86519309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071360866"],"corresponding_institution_ids":["https://openalex.org/I86519309"],"apc_list":null,"apc_paid":null,"fwci":1.4722,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.85406513,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"6","issue":"3","first_page":"13","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/citation","display_name":"Citation","score":0.7056893706321716},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.660702109336853},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.5242146253585815},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4842250347137451},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4824710190296173},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.38648074865341187},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3523469567298889},{"id":"https://openalex.org/keywords/library-science","display_name":"Library science","score":0.341374933719635},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2871573865413666},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21212062239646912}],"concepts":[{"id":"https://openalex.org/C2778805511","wikidata":"https://www.wikidata.org/wiki/Q1713","display_name":"Citation","level":2,"score":0.7056893706321716},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.660702109336853},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.5242146253585815},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4842250347137451},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4824710190296173},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.38648074865341187},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3523469567298889},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.341374933719635},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2871573865413666},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21212062239646912},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1010832.1010838","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1010832.1010838","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1010832.1010838","source":{"id":"https://openalex.org/S186921487","display_name":"ACM SIGSOFT Software Engineering Notes","issn_l":"0163-5948","issn":["0163-5948","1943-5843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGSOFT Software Engineering Notes","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/1010832.1010838","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1010832.1010838","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1010832.1010838","source":{"id":"https://openalex.org/S186921487","display_name":"ACM SIGSOFT Software Engineering Notes","issn_l":"0163-5948","issn":["0163-5948","1943-5843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGSOFT Software Engineering Notes","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1993042536.pdf","grobid_xml":"https://content.openalex.org/works/W1993042536.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2362737126","https://openalex.org/W2386317283","https://openalex.org/W2369342331","https://openalex.org/W2980461345","https://openalex.org/W2348544381","https://openalex.org/W1762411088","https://openalex.org/W2371820339","https://openalex.org/W2366230866"],"abstract_inverted_index":{"article":[0],"Free":[1],"Access":[2],"Share":[3],"on":[4,136],"A":[5],"verified":[6],"encrypted":[7],"packet":[8],"interface":[9],"Authors:":[10],"Michael":[11],"K.":[12],"Smith":[13],"The":[14,20,31,37,48,54,65,71],"University":[15,21,32,38,49,55,66,72],"of":[16,22,33,39,50,56,67,73],"Texas":[17,23,34,40,51,57,68,74],"at":[18,24,35,41,52,58,69,75],"Austin":[19,36,53,70],"AustinView":[25,42,59,76],"Profile":[26,43,60,77],",":[27,44,61],"Ann":[28],"E.":[29],"Siebert":[30],"Benedetto":[45],"L.":[46],"DiVito":[47],"Donald":[62],"I.":[63],"Good":[64],"Authors":[78],"Info":[79],"&":[80],"Claims":[81],"ACM":[82],"SIGSOFT":[83],"Software":[84],"Engineering":[85],"NotesVolume":[86],"6Issue":[87],"3July":[88],"1981":[89],"pp":[90],"13\u201316https://doi.org/10.1145/1010832.1010838Online:01":[91],"July":[92],"1981Publication":[93],"History":[94],"6citation150DownloadsMetricsTotal":[95],"Citations6Total":[96],"Downloads150Last":[97],"12":[98],"Months1Last":[99],"6":[100],"weeks1":[101],"Get":[102],"Citation":[103,105,142],"AlertsNew":[104,141],"Alert":[106],"added!This":[107],"alert":[108,133],"has":[109,128],"been":[110,129],"successfully":[111],"added":[112],"and":[113],"will":[114,118],"be":[115,119],"sent":[116],"to:You":[117],"notified":[120],"whenever":[121],"a":[122,154],"record":[123],"that":[124],"you":[125],"have":[126],"chosen":[127],"cited.To":[130],"manage":[131],"your":[132,147],"preferences,":[134],"click":[135],"the":[137],"button":[138],"below.Manage":[139],"my":[140],"Alert!Please":[143],"log":[144],"in":[145],"to":[146,150,152],"account":[148],"Save":[149],"BinderSave":[151],"BinderCreate":[153],"New":[155],"BinderNameCancelCreateExport":[156],"CitationPublisher":[157],"SiteeReaderPDF":[158]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
