{"id":"https://openalex.org/W2060575224","doi":"https://doi.org/10.1145/2808062.2808068","title":"Certification with Multiple Signatures","display_name":"Certification with Multiple Signatures","publication_year":2015,"publication_date":"2015-09-22","ids":{"openalex":"https://openalex.org/W2060575224","doi":"https://doi.org/10.1145/2808062.2808068","mag":"2060575224"},"language":"en","primary_location":{"id":"doi:10.1145/2808062.2808068","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2808062.2808068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th Annual ACM Conference on Research in Information Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100711620","display_name":"Xinli Wang","orcid":"https://orcid.org/0000-0002-1376-3483"},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xinli Wang","raw_affiliation_strings":["Michigan Technological University, Houghton, MI, USA","Michigan Technological University Houghton, MI, USA,#TAB#"],"affiliations":[{"raw_affiliation_string":"Michigan Technological University, Houghton, MI, USA","institution_ids":["https://openalex.org/I11957088"]},{"raw_affiliation_string":"Michigan Technological University Houghton, MI, USA,#TAB#","institution_ids":["https://openalex.org/I11957088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101795758","display_name":"Yan Bai","orcid":"https://orcid.org/0000-0001-6260-9821"},"institutions":[{"id":"https://openalex.org/I4210150356","display_name":"University of Washington Tacoma","ror":"https://ror.org/05n8t2628","country_code":"US","type":"education","lineage":["https://openalex.org/I201448701","https://openalex.org/I4210150356"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yan Bai","raw_affiliation_strings":["University of Washington Tacoma, Tacoma, WA, USA"],"affiliations":[{"raw_affiliation_string":"University of Washington Tacoma, Tacoma, WA, USA","institution_ids":["https://openalex.org/I4210150356"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010375312","display_name":"Lihui Hu","orcid":"https://orcid.org/0009-0000-3457-6970"},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lihui Hu","raw_affiliation_strings":["Michigan Technological University, Houghton, MI, USA","Michigan Technological University Houghton, MI, USA,#TAB#"],"affiliations":[{"raw_affiliation_string":"Michigan Technological University, Houghton, MI, USA","institution_ids":["https://openalex.org/I11957088"]},{"raw_affiliation_string":"Michigan Technological University Houghton, MI, USA,#TAB#","institution_ids":["https://openalex.org/I11957088"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100711620"],"corresponding_institution_ids":["https://openalex.org/I11957088"],"apc_list":null,"apc_paid":null,"fwci":0.4466,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.76836806,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"13","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.8622547388076782},{"id":"https://openalex.org/keywords/certificate-authority","display_name":"Certificate authority","score":0.84512859582901},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7874295711517334},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.6838527917861938},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5634291172027588},{"id":"https://openalex.org/keywords/man-in-the-middle-attack","display_name":"Man-in-the-middle attack","score":0.5480067133903503},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5223880410194397},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.5022592544555664},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.4708549380302429},{"id":"https://openalex.org/keywords/public-key-certificate","display_name":"Public key certificate","score":0.44225868582725525},{"id":"https://openalex.org/keywords/damages","display_name":"Damages","score":0.43862032890319824},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.33830830454826355},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.32979756593704224},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.10568693280220032},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.0736464262008667},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.06542828679084778}],"concepts":[{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.8622547388076782},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.84512859582901},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7874295711517334},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.6838527917861938},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5634291172027588},{"id":"https://openalex.org/C196491621","wikidata":"https://www.wikidata.org/wiki/Q554830","display_name":"Man-in-the-middle attack","level":3,"score":0.5480067133903503},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5223880410194397},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.5022592544555664},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.4708549380302429},{"id":"https://openalex.org/C167529545","wikidata":"https://www.wikidata.org/wiki/Q274758","display_name":"Public key certificate","level":4,"score":0.44225868582725525},{"id":"https://openalex.org/C2777381055","wikidata":"https://www.wikidata.org/wiki/Q308922","display_name":"Damages","level":2,"score":0.43862032890319824},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33830830454826355},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.32979756593704224},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.10568693280220032},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0736464262008667},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.06542828679084778},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2808062.2808068","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2808062.2808068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th Annual ACM Conference on Research in Information Technology","raw_type":"proceedings-article"},{"id":"pmh:oai:digitalcommons.mtu.edu:michigantech-p-31862","is_oa":false,"landing_page_url":"https://digitalcommons.mtu.edu/michigantech-p/12560","pdf_url":null,"source":{"id":"https://openalex.org/S4377196391","display_name":"Digital Commons - Michigan Tech (Michigan Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11957088","host_organization_name":"Michigan Technological University","host_organization_lineage":["https://openalex.org/I11957088"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Michigan Tech Publications, Part 1","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6399999856948853,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W68712122","https://openalex.org/W1528787622","https://openalex.org/W1595861018","https://openalex.org/W1600255172","https://openalex.org/W1881935562","https://openalex.org/W1971513162","https://openalex.org/W1994219740","https://openalex.org/W2006097813","https://openalex.org/W2022423003","https://openalex.org/W2056494114","https://openalex.org/W2078872626","https://openalex.org/W2089934546","https://openalex.org/W2095738444","https://openalex.org/W2098383743","https://openalex.org/W2099175354","https://openalex.org/W2113386121","https://openalex.org/W2116876232","https://openalex.org/W2146752727","https://openalex.org/W2161954933","https://openalex.org/W2220865529","https://openalex.org/W2233063544","https://openalex.org/W2238866705","https://openalex.org/W2247980666","https://openalex.org/W2294157280","https://openalex.org/W2338858629","https://openalex.org/W2950691899","https://openalex.org/W3047541561"],"related_works":["https://openalex.org/W2111816087","https://openalex.org/W2024386934","https://openalex.org/W2376373997","https://openalex.org/W2994213367","https://openalex.org/W1709311896","https://openalex.org/W4313288832","https://openalex.org/W2369694906","https://openalex.org/W2188945435","https://openalex.org/W4244357787","https://openalex.org/W2277273755"],"abstract_inverted_index":{"Certificate":[0],"Authority":[1],"(CA)":[2],"is":[3,99],"a":[4,80,88,91,100,110],"single":[5,18],"point":[6],"of":[7,12,44,68,113],"failure":[8],"in":[9,54,74,115],"the":[10,22,42,45,66,118],"design":[11],"Public":[13],"Key":[14],"Infrastructure":[15],"(PKI).":[16],"A":[17],"compromised":[19,125],"CA":[20,27,89],"breaks":[21],"entire":[23],"infrastructure.":[24],"The":[25],"disclosed":[26],"key":[28],"can":[29,93],"be":[30,94,121],"used":[31,53],"by":[32],"adversaries":[33],"to":[34,62,82,102,106,120,124],"issue":[35],"rogue":[36,49,72,128],"certificates":[37,50,73,108],"for":[38,117],"any":[39],"domains":[40],"without":[41],"consent":[43],"domain":[46],"owners.":[47],"These":[48],"have":[51,59,79],"been":[52,60],"Man-in-the-Middle":[55],"(MitM)":[56],"attacks.":[57],"Studies":[58],"conducted":[61],"prevent":[63],"and":[64,71,84,127],"reduce":[65],"damages":[67],"breached":[69],"CAs":[70,126],"different":[75],"ways.":[76],"However,":[77],"few":[78],"mechanism":[81],"fully":[83],"efficiently":[85],"verify":[86],"whether":[87],"or":[90,96],"certificate":[92],"trusted":[95],"not.":[97],"There":[98],"need":[101],"develop":[103],"new":[104],"methods":[105],"ensure":[107],"with":[109],"high":[111],"level":[112],"trustworthy":[114],"order":[116],"PKI":[119],"more":[122],"resistant":[123],"certificates.":[129]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
