{"id":"https://openalex.org/W2083515431","doi":"https://doi.org/10.1145/1180176.1180191","title":"E-mail Authentication: What, Why, How?","display_name":"E-mail Authentication: What, Why, How?","publication_year":2006,"publication_date":"2006-11-01","ids":{"openalex":"https://openalex.org/W2083515431","doi":"https://doi.org/10.1145/1180176.1180191","mag":"2083515431"},"language":"en","primary_location":{"id":"doi:10.1145/1180176.1180191","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1180176.1180191","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=1180191&type=pdf","source":{"id":"https://openalex.org/S45584542","display_name":"Queue","issn_l":"1542-7730","issn":["1542-7730","1542-7749"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Queue","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=1180191&type=pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113627423","display_name":"Eric Allman","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Eric Allman","raw_affiliation_strings":["Sendmail"],"affiliations":[{"raw_affiliation_string":"Sendmail","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5113627423"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.0323,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.9281487,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"4","issue":"9","first_page":"30","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.3075999915599823,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.3075999915599823,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10557","display_name":"Social Media and Politics","score":0.3025999963283539,"subfield":{"id":"https://openalex.org/subfields/3315","display_name":"Communication"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.7241781949996948},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6502048373222351},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6002954244613647},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5335187315940857},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.47869494557380676},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4122586250305176}],"concepts":[{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.7241781949996948},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6502048373222351},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6002954244613647},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5335187315940857},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.47869494557380676},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4122586250305176}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1180176.1180191","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1180176.1180191","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=1180191&type=pdf","source":{"id":"https://openalex.org/S45584542","display_name":"Queue","issn_l":"1542-7730","issn":["1542-7730","1542-7749"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Queue","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/1180176.1180191","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1180176.1180191","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=1180191&type=pdf","source":{"id":"https://openalex.org/S45584542","display_name":"Queue","issn_l":"1542-7730","issn":["1542-7730","1542-7749"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Queue","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2083515431.pdf","grobid_xml":"https://content.openalex.org/works/W2083515431.grobid-xml"},"referenced_works_count":2,"referenced_works":["https://openalex.org/W1499432748","https://openalex.org/W1574174165"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2065457896","https://openalex.org/W3173234801","https://openalex.org/W2167984027","https://openalex.org/W3021302227","https://openalex.org/W10630519","https://openalex.org/W1919377569","https://openalex.org/W3144288563","https://openalex.org/W3123907821","https://openalex.org/W2912135041"],"abstract_inverted_index":{"Internet":[0],"e-mail":[1],"was":[2,14,60,71,80,127,134],"conceived":[3],"in":[4,11,50,113],"a":[5,15,89,128],"different":[6],"world":[7],"than":[8],"we":[9,21,54],"live":[10],"today.":[12],"It":[13],"small,":[16],"tightly":[17],"knit":[18],"community,":[19],"and":[20,99,119],"didn\u2019t":[22],"really":[23,123],"have":[24,56],"to":[25,62,67,83,103,136],"worry":[26],"too":[27,139],"much":[28],"about":[29],"miscreants.":[30],"Generally,":[31],"if":[32],"someone":[33],"did":[34],"something":[35,131],"wrong,":[36],"the":[37,95,106,114],"problem":[38],"could":[39],"be":[40],"dealt":[41],"with":[42],"through":[43],"social":[44],"means;":[45],"\u201cshunning\u201d":[46],"is":[47],"very":[48],"effective":[49],"small":[51],"communities.":[52],"Perhaps":[53],"should":[55],"figured":[57],"out":[58],"what":[59,92],"going":[61,135],"happen":[63],"when":[64,94],"Usenet":[65,70],"started":[66],"go":[68],"bad.":[69],"based":[72],"on":[73],"an":[74],"inexpensive":[75],"network":[76],"called":[77],"UUCP,":[78],"which":[79],"fairly":[81,111],"easy":[82],"join,":[84],"so":[85],"it":[86],"gave":[87],"us":[88],"taste":[90],"of":[91,117,130],"happens":[93],"community":[96],"becomes":[97],"larger":[98],"more":[100],"distributed\u2014and":[101],"harder":[102],"manage.":[104],"Even":[105],"worst":[107],"flame":[108],"wars":[109],"seemed":[110],"innocuous":[112],"grand":[115],"scheme":[116],"things,":[118],"kill":[120],"files":[121],"were":[122],"enough,":[124],"but":[125],"there":[126],"seed":[129],"ominous":[132],"that":[133],"germinate":[137],"all":[138],"soon.":[140]},"counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
