{"id":"https://openalex.org/W2163349039","doi":"https://doi.org/10.1145/1146269.1146283","title":"Message authentication by integrity with public corroboration","display_name":"Message authentication by integrity with public corroboration","publication_year":2005,"publication_date":"2005-01-01","ids":{"openalex":"https://openalex.org/W2163349039","doi":"https://doi.org/10.1145/1146269.1146283","mag":"2163349039"},"language":"en","primary_location":{"id":"doi:10.1145/1146269.1146283","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1146269.1146283","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 workshop on New security paradigms  - NSPW '05","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011846293","display_name":"Paul C. van Oorschot","orcid":"https://orcid.org/0000-0002-5038-5370"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"P. C. van Oorschot","raw_affiliation_strings":["Carleton University, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Canada","institution_ids":["https://openalex.org/I67031392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5011846293"],"corresponding_institution_ids":["https://openalex.org/I67031392"],"apc_list":null,"apc_paid":null,"fwci":1.3701,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.85932385,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"57","last_page":"57"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7670352458953857},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6755683422088623},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6608031988143921},{"id":"https://openalex.org/keywords/email-authentication","display_name":"Email authentication","score":0.5949284434318542},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.5542464256286621},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.5337408781051636},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5191999673843384},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.48748040199279785},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.4595772922039032},{"id":"https://openalex.org/keywords/data-authentication-algorithm","display_name":"Data Authentication Algorithm","score":0.442461222410202},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.44116321206092834},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4107969105243683},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.30667465925216675},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.11905449628829956}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7670352458953857},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6755683422088623},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6608031988143921},{"id":"https://openalex.org/C550791530","wikidata":"https://www.wikidata.org/wiki/Q5368811","display_name":"Email authentication","level":5,"score":0.5949284434318542},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.5542464256286621},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.5337408781051636},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5191999673843384},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.48748040199279785},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4595772922039032},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.442461222410202},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.44116321206092834},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4107969105243683},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.30667465925216675},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.11905449628829956}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1145/1146269.1146283","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1146269.1146283","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 workshop on New security paradigms  - NSPW '05","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.216.6845","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.216.6845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.scs.carleton.ca/~paulv/papers/NSPW05-msgauth-ACM.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.222.6095","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.222.6095","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.nspw.org/papers/2005/nspw2005-van_oorschot.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.60.101","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.101","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.scs.carleton.ca/~paulv/papers/nspw-pre.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.60.142","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.142","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.scs.carleton.ca/~paulv/papers/nspw05.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W69141535","https://openalex.org/W1497177773","https://openalex.org/W1534774240","https://openalex.org/W1558934613","https://openalex.org/W1559155956","https://openalex.org/W1567046609","https://openalex.org/W1569083856","https://openalex.org/W1570296326","https://openalex.org/W1660562555","https://openalex.org/W1969192869","https://openalex.org/W1993716793","https://openalex.org/W2002978831","https://openalex.org/W2038257637","https://openalex.org/W2045373674","https://openalex.org/W2047925852","https://openalex.org/W2086042811","https://openalex.org/W2086277109","https://openalex.org/W2107053250","https://openalex.org/W2107691219","https://openalex.org/W2111817346","https://openalex.org/W2122237601","https://openalex.org/W2124890704","https://openalex.org/W2128002484","https://openalex.org/W2134167896","https://openalex.org/W2150626176","https://openalex.org/W2240246332","https://openalex.org/W2340406763","https://openalex.org/W2483735874"],"related_works":["https://openalex.org/W4234011401","https://openalex.org/W1984916066","https://openalex.org/W2393298610","https://openalex.org/W2610546334","https://openalex.org/W2943527182","https://openalex.org/W1483112216","https://openalex.org/W2558166637","https://openalex.org/W2094306508","https://openalex.org/W2941888532","https://openalex.org/W4200155052"],"abstract_inverted_index":{"One":[0],"of":[1,80,94,112,188],"the":[2,11,32,78,90,105,110],"best-known":[3],"security":[4,75,141],"paradigms":[5],"is":[6,178],"to":[7,165],"use":[8],"authentication":[9,49,127,145,156],"as":[10,31,140],"basis":[12,33],"for":[13,34,47,54,104,109,157],"acc\u00e9ss":[14],"control":[15,26,88],"decisions.":[16],"We":[17,36,97],"turn":[18],"this":[19,81,95],"around,":[20],"and":[21,84,121,153,169,180],"instead":[22],"rely":[23],"on":[24,52,77,86,89,131],"access":[25,87],"(or":[27,92],"more":[28],"precisely,":[29],"integrity)":[30],"authentication.":[35],"propose":[37],"a":[38,63,68],"simple,":[39],"practical":[40],"means":[41],"by":[42,56,62,142],"which":[43],"data":[44,154],"origin":[45,155],"assurances":[46],"message":[48,126],"are":[50],"based":[51],"corroboration,":[53],"example":[55],"cross-checking":[57],"with":[58,174],"information":[59,114],"made":[60],"available":[61],"known":[64],"source":[65,151,176],"or":[66,108,133,184],"at":[67],"specified":[69],"location":[70],"(e.g.,":[71,115,171],"web":[72],"page).":[73],"The":[74],"relies":[76],"integrity":[79],"corroborating":[82,113],"information,":[83],"thus":[85,122,162],"hosting":[91],"publishing)":[93],"information.":[96],"do":[98],"not":[99],"explicitly":[100],"require":[101],"cryptographic":[102],"keys":[103],"corroboration":[106],"step,":[107],"protection":[111],"it":[116],"may":[117,137],"be":[118,138],"publicly":[119],"posted),":[120],"our":[123],"paradigm":[124],"allows":[125],"without":[128],"direct":[129],"dependence":[130],"private":[132,191],"secret":[134],"keys.":[135,192],"It":[136],"characterized":[139],"integrity.":[143],"Message":[144],"applications":[146],"we":[147],"discuss":[148],"include":[149],"email":[150,173],"authentication,":[152],"digital":[158,189],"signatures.":[159],"Our":[160],"work":[161],"has":[163],"application":[164],"problems":[166],"including":[167],"spam":[168],"phishing":[170],"where":[172],"spoofed":[175],"addressing":[177],"involved),":[179],"addresses":[181],"theft,":[182],"extraction,":[183],"other":[185],"illicit":[186],"determination":[187],"signature":[190]},"counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
