{"id":"https://openalex.org/W2106043158","doi":"https://doi.org/10.1145/1151414.1151416","title":"Accountability protocols","display_name":"Accountability protocols","publication_year":2006,"publication_date":"2006-05-01","ids":{"openalex":"https://openalex.org/W2106043158","doi":"https://doi.org/10.1145/1151414.1151416","mag":"2106043158"},"language":"en","primary_location":{"id":"doi:10.1145/1151414.1151416","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1151414.1151416","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051511023","display_name":"Giampaolo Bella","orcid":"https://orcid.org/0000-0002-7615-8643"},"institutions":[{"id":"https://openalex.org/I39063666","display_name":"University of Catania","ror":"https://ror.org/03a64bh57","country_code":"IT","type":"education","lineage":["https://openalex.org/I39063666"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Giampaolo Bella","raw_affiliation_strings":["Universit\u00e0 di Catania, Catania, ITALY"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 di Catania, Catania, ITALY","institution_ids":["https://openalex.org/I39063666"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086565312","display_name":"Lawrence C. Paulson","orcid":"https://orcid.org/0000-0003-0288-4279"},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Lawrence C. Paulson","raw_affiliation_strings":["University of Cambridge, Cambridge, UK"],"affiliations":[{"raw_affiliation_string":"University of Cambridge, Cambridge, UK","institution_ids":["https://openalex.org/I241749"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5051511023"],"corresponding_institution_ids":["https://openalex.org/I39063666"],"apc_list":null,"apc_paid":null,"fwci":1.89,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.87463404,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"9","issue":"2","first_page":"138","last_page":"161"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8258883357048035},{"id":"https://openalex.org/keywords/accountability","display_name":"Accountability","score":0.812415599822998},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.7946250438690186},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.6571702361106873},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6427371501922607},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6173907518386841},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.6134321689605713},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.5822365880012512},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5211924910545349},{"id":"https://openalex.org/keywords/non-repudiation","display_name":"Non-repudiation","score":0.46292567253112793},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3919247090816498},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.32163748145103455}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8258883357048035},{"id":"https://openalex.org/C2776007630","wikidata":"https://www.wikidata.org/wiki/Q2798912","display_name":"Accountability","level":2,"score":0.812415599822998},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.7946250438690186},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.6571702361106873},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6427371501922607},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6173907518386841},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.6134321689605713},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.5822365880012512},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5211924910545349},{"id":"https://openalex.org/C44209976","wikidata":"https://www.wikidata.org/wiki/Q1327773","display_name":"Non-repudiation","level":3,"score":0.46292567253112793},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3919247090816498},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32163748145103455},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1151414.1151416","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1151414.1151416","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W228572347","https://openalex.org/W1533886364","https://openalex.org/W1588668163","https://openalex.org/W1603690896","https://openalex.org/W1752677809","https://openalex.org/W1840967680","https://openalex.org/W1927383947","https://openalex.org/W1964909769","https://openalex.org/W2062867278","https://openalex.org/W2086591190","https://openalex.org/W2106192381","https://openalex.org/W2114189125","https://openalex.org/W2119617924","https://openalex.org/W2150426251","https://openalex.org/W2151461610","https://openalex.org/W2168453169","https://openalex.org/W2175661655","https://openalex.org/W3162919972","https://openalex.org/W4247445674","https://openalex.org/W4250846042","https://openalex.org/W4285719527","https://openalex.org/W6640195296"],"related_works":["https://openalex.org/W2034419863","https://openalex.org/W3007106793","https://openalex.org/W2296396257","https://openalex.org/W2132505069","https://openalex.org/W1965515427","https://openalex.org/W2547137208","https://openalex.org/W2116285675","https://openalex.org/W2054202867","https://openalex.org/W2109882692","https://openalex.org/W2358942851"],"abstract_inverted_index":{"Classical":[0],"security":[1],"protocols":[2,19],"aim":[3],"to":[4,22,42,108],"achieve":[5,23],"authentication":[6],"and":[7,60,62,82],"confidentiality":[8],"under":[9,89],"the":[10,13,28,51,55,63,79,101,109,119],"assumption":[11],"that":[12,37,84],"peers":[14,43],"behave":[15],"honestly.":[16],"Some":[17],"recent":[18],"are":[20],"required":[21],"their":[24,87],"goals":[25,88],"even":[26],"if":[27],"peer":[29],"misbehaves.":[30],"Accountability":[31,53],"is":[32,95,115],"a":[33,74],"protocol":[34,57,66,123],"design":[35],"strategy":[36],"may":[38],"help.":[39],"It":[40],"delivers":[41],"sufficient":[44],"evidence":[45],"of":[46,58,67,78,118,121],"each":[47],"other's":[48],"participation":[49],"in":[50],"protocol.":[52],"underlies":[54],"nonrepudiation":[56],"Zhou":[59],"Gollmann":[61],"certified":[64],"email":[65],"Abadi":[68],"et":[69],"al.":[70],"This":[71],"paper":[72],"provides":[73],"comparative,":[75],"formal":[76],"analysis":[77,111],"two":[80],"protocols,":[81],"confirms":[83],"they":[85],"reach":[86],"realistic":[90],"conditions.":[91],"The":[92],"treatment,":[93],"which":[94],"conducted":[96],"with":[97],"mechanized":[98],"support":[99],"from":[100],"proof":[102],"assistant":[103],"Isabelle,":[104],"requires":[105],"various":[106],"extensions":[107],"existing":[110],"method.":[112],"A":[113],"byproduct":[114],"an":[116],"account":[117],"concept":[120],"higher-level":[122],".":[124]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
