{"id":"https://openalex.org/W4250016298","doi":"https://doi.org/10.1145/3338500","title":"Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop","display_name":"Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop","publication_year":2019,"publication_date":"2019-11-07","ids":{"openalex":"https://openalex.org/W4250016298","doi":"https://doi.org/10.1145/3338500"},"language":"en","primary_location":{"id":"doi:10.1145/3338500","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338500","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.8546000123023987,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.8546000123023987,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/standardization","display_name":"Standardization","score":0.7680442333221436},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.732304573059082},{"id":"https://openalex.org/keywords/presentation","display_name":"Presentation (obstetrics)","score":0.6092474460601807},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5802867412567139},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5547722578048706},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4665847420692444},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.463021457195282},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.43099215626716614},{"id":"https://openalex.org/keywords/principal","display_name":"Principal (computer security)","score":0.43000710010528564},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4148690104484558},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.32479941844940186}],"concepts":[{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.7680442333221436},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.732304573059082},{"id":"https://openalex.org/C2777601897","wikidata":"https://www.wikidata.org/wiki/Q3409113","display_name":"Presentation (obstetrics)","level":2,"score":0.6092474460601807},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5802867412567139},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5547722578048706},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4665847420692444},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.463021457195282},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.43099215626716614},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.43000710010528564},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4148690104484558},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32479941844940186},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C126838900","wikidata":"https://www.wikidata.org/wiki/Q77604","display_name":"Radiology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3338500","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338500","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.41999998688697815},{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2378767206","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W2093529019","https://openalex.org/W87530933","https://openalex.org/W154233216","https://openalex.org/W2102905434","https://openalex.org/W2626486901","https://openalex.org/W2026856585","https://openalex.org/W1988007309"],"abstract_inverted_index":{"It":[0],"is":[1,18],"our":[2],"great":[3],"pleasure":[4],"to":[5,8,57,62,148,152,188],"welcome":[6],"you":[7],"the":[9,21,42,74,102,131,146,170,174,193],"5th":[10],"Conference":[11,24],"on":[12,25,34,192],"Security":[13,29],"Standardisation":[14],"Research":[15],"(SSR'19),":[16],"which":[17,77,184],"co-located":[19],"with":[20],"26th":[22],"ACM":[23],"Computer":[26],"and":[27,54,113,119,140,163],"Communications":[28],"2019,":[30],"in":[31,44,101,145,155,166,179],"London,":[32],"UK,":[33],"11":[35],"November":[36],"2019.":[37],"This":[38],"year's":[39],"conference":[40],"continues":[41],"tradition":[43],"providing":[45],"a":[46,86,94,108,124],"dedicated":[47],"forum":[48],"for":[49,67,83,181],"researchers":[50],"from":[51,72,99,129],"academia,":[52],"industry":[53],"standardisation":[55],"bodies":[56],"discuss":[58],"all":[59],"topics":[60,128],"related":[61],"security":[63,132,177],"standardization.":[64],"The":[65,104],"call":[66],"papers":[68,79,106,171],"attracted":[69],"20":[70],"submissions":[71],"around":[73],"world,":[75],"among":[76],"7":[78],"(35%)":[80],"were":[81],"accepted":[82,105],"presentation":[84],"after":[85],"rigorous":[87],"reviewing":[88],"process.":[89],"Each":[90],"paper":[91],"has":[92],"received":[93],"minimum":[95],"of":[96,111,127,133,169,176,195],"three":[97],"reviews":[98],"experts":[100],"field.":[103],"feature":[107],"good":[109],"mixture":[110],"theory":[112],"practice,":[114],"as":[115,117],"well":[116],"attack":[118],"defensive":[120],"mechanisms.":[121],"They":[122],"cover":[123],"broad":[125],"range":[126],"analyzing":[130],"OAuth":[134],"2.0,":[135],"OpenID,":[136],"Bluetooth":[137],"mesh":[138],"networks":[139],"RSA":[141],"signature":[142],"schemes":[143],"used":[144],"wild,":[147],"proposing":[149],"new":[150],"solutions":[151],"counter":[153],"backdoors":[154],"cryptographic":[156,161],"systems,":[157],"build":[158],"post-quantum":[159],"secure":[160],"primitives":[162],"enhance":[164],"privacy":[165],"5G.":[167],"One":[168],"also":[172],"explores":[173],"impact":[175],"considerations":[178],"Requests":[180],"Comments":[182],"(RFCs),":[183],"should":[185],"be":[186],"relevant":[187],"many":[189],"who":[190],"work":[191],"standardization":[194],"Internet":[196],"technologies.":[197]},"counts_by_year":[{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
