{"id":"https://openalex.org/W3092278829","doi":"https://doi.org/10.1145/3320269.3384743","title":"PISKES: Pragmatic Internet-Scale Key-Establishment System","display_name":"PISKES: Pragmatic Internet-Scale Key-Establishment System","publication_year":2020,"publication_date":"2020-10-05","ids":{"openalex":"https://openalex.org/W3092278829","doi":"https://doi.org/10.1145/3320269.3384743","mag":"3092278829"},"language":"en","primary_location":{"id":"doi:10.1145/3320269.3384743","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3320269.3384743","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088985310","display_name":"Benjamin Rothenberger","orcid":null},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Benjamin Rothenberger","raw_affiliation_strings":["ETH Z\u00fcrich, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Z\u00fcrich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038043900","display_name":"Dominik Roos","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dominik Roos","raw_affiliation_strings":["Anapaya Systems, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Anapaya Systems, Z\u00fcrich, Switzerland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070274338","display_name":"Markus Legner","orcid":"https://orcid.org/0000-0003-4565-1133"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Markus Legner","raw_affiliation_strings":["ETH Z\u00fcrich, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Z\u00fcrich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056518136","display_name":"Adrian Perrig","orcid":"https://orcid.org/0000-0002-5280-5412"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Adrian Perrig","raw_affiliation_strings":["ETH Z\u00fcrich &amp; Anapaya Systems, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Z\u00fcrich &amp; Anapaya Systems, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088985310"],"corresponding_institution_ids":["https://openalex.org/I35440088"],"apc_list":null,"apc_paid":null,"fwci":3.0836,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.9202558,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"73","last_page":"86"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8225246071815491},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6355522871017456},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6271166801452637},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5986305475234985},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5954024791717529},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5276854038238525},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4861909747123718},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46204161643981934},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4449623227119446},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42783835530281067},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11401528120040894}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8225246071815491},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6355522871017456},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6271166801452637},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5986305475234985},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5954024791717529},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5276854038238525},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4861909747123718},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46204161643981934},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4449623227119446},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42783835530281067},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11401528120040894}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3320269.3384743","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3320269.3384743","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":64,"referenced_works":["https://openalex.org/W47284044","https://openalex.org/W66821545","https://openalex.org/W146244851","https://openalex.org/W1585435904","https://openalex.org/W1601814439","https://openalex.org/W1627007230","https://openalex.org/W1635413415","https://openalex.org/W1660562555","https://openalex.org/W1733713784","https://openalex.org/W1736823401","https://openalex.org/W1828150029","https://openalex.org/W1867219652","https://openalex.org/W1887796531","https://openalex.org/W1910751411","https://openalex.org/W1954338761","https://openalex.org/W1970121628","https://openalex.org/W1980469160","https://openalex.org/W1989454965","https://openalex.org/W1998259214","https://openalex.org/W2006435204","https://openalex.org/W2013901835","https://openalex.org/W2029693536","https://openalex.org/W2099995703","https://openalex.org/W2113780533","https://openalex.org/W2116236383","https://openalex.org/W2116876232","https://openalex.org/W2117175761","https://openalex.org/W2118878434","https://openalex.org/W2140471436","https://openalex.org/W2154337851","https://openalex.org/W2155141181","https://openalex.org/W2162133150","https://openalex.org/W2162969618","https://openalex.org/W2171020788","https://openalex.org/W2186028149","https://openalex.org/W2207058899","https://openalex.org/W2234931939","https://openalex.org/W2239211855","https://openalex.org/W2239534643","https://openalex.org/W2246778810","https://openalex.org/W2253199766","https://openalex.org/W2263365646","https://openalex.org/W2269559362","https://openalex.org/W2292849987","https://openalex.org/W2309866166","https://openalex.org/W2401862431","https://openalex.org/W2509455934","https://openalex.org/W2594018376","https://openalex.org/W2763238401","https://openalex.org/W2768883253","https://openalex.org/W2806616617","https://openalex.org/W2903210140","https://openalex.org/W2981067590","https://openalex.org/W2985610488","https://openalex.org/W2987645728","https://openalex.org/W4210628913","https://openalex.org/W4232271737","https://openalex.org/W4292117754","https://openalex.org/W4293579972","https://openalex.org/W4298051233","https://openalex.org/W4300559383","https://openalex.org/W4300591638","https://openalex.org/W4301409808","https://openalex.org/W4403937196"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4390188535","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2039821316","https://openalex.org/W2388081684"],"abstract_inverted_index":{"Denial-of-service":[0],"attacks":[1,39],"have":[2,44,151],"become":[3],"increasingly":[4],"prevalent":[5],"in":[6,47,67],"the":[7,18,48,100,127,163,190,213,221],"Internet.":[8,201],"In":[9,85],"many":[10],"cases":[11],"they":[12],"are":[13,76],"enabled":[14],"or":[15,40,56,80],"facilitated":[16],"by":[17],"lack":[19,81],"of":[20,143,165],"source":[21,164],"authentication?it":[22],"is":[23,61,173,196],"often":[24],"easy":[25],"for":[26,83,139,189],"an":[27],"attacker":[28],"to":[29,50,111,116,161,199,215,220],"spoof":[30],"its":[31,203],"own":[32],"IP":[33],"address":[34],"and":[35,207],"thus":[36,135],"launch":[37],"reflection":[38],"evade":[41],"detection.":[42],"There":[43],"been":[45,187],"attempts":[46],"past":[49],"resolve":[51],"this":[52,86],"issue":[53],"through":[54],"filtering":[55],"cryptography-based":[57],"techniques;":[58],"however,":[59],"there":[60],"still":[62],"no":[63],"sufficiently":[64],"strong":[65,204],"system":[66,95,155,180],"place":[68],"today-all":[69],"proposals":[70],"either":[71],"provide":[72],"weak":[73],"security":[74],"guarantees,":[75],"not":[77],"efficient":[78,131,209],"enough,":[79],"incentives":[82],"deployment.":[84],"paper":[87],"we":[88],"present":[89],"PISKES,":[90],"a":[91,108,113,140,153,158,179],"pragmatic":[92],"Internet-scale":[93],"key-establishment":[94],"enabling":[96],"firstpacket":[97],"authentication.":[98,119],"Through":[99],"PISKES":[101,134,185],"infrastructure,":[102],"any":[103],"host":[104],"can":[105,123],"locally":[106,125],"obtain":[107],"symmetric":[109],"key":[110,129],"enable":[112],"remote":[114,121],"service":[115,122],"perform":[117],"source-address":[118],"The":[120],"itself":[124],"derive":[126],"same":[128],"with":[130],"cryptographic":[132],"operations.":[133],"enables":[136,157],"packet":[137,168],"authentication":[138,219],"wide":[141],"variety":[142],"systems":[144],"including":[145],"high-throughput":[146],"applications":[147],"like":[148],"DNS.":[149],"We":[150],"implemented":[152],"prototype":[154],"that":[156],"DNS":[159],"server":[160],"verify":[162],"every":[166],"received":[167],"within":[169],"85":[170],"ns,":[171],"which":[172],"over":[174],"220":[175],"times":[176],"faster":[177],"than":[178],"based":[181],"on":[182],"asymmetric":[183],"cryptography.":[184],"has":[186,212],"developed":[188],"SCION":[191],"secure":[192],"Internet":[193,222],"architecture":[194],"but":[195],"also":[197],"applicable":[198],"today's":[200],"With":[202],"source-authentication":[205],"properties":[206],"highly":[208],"operation":[210],"it":[211],"potential":[214],"finally":[216],"bring":[217],"network-layer":[218]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
