{"id":"https://openalex.org/W2167627865","doi":"https://doi.org/10.1145/508791.508845","title":"Proxy-based security protocols in networked mobile devices","display_name":"Proxy-based security protocols in networked mobile devices","publication_year":2002,"publication_date":"2002-03-11","ids":{"openalex":"https://openalex.org/W2167627865","doi":"https://doi.org/10.1145/508791.508845","mag":"2167627865"},"language":"en","primary_location":{"id":"doi:10.1145/508791.508845","is_oa":false,"landing_page_url":"https://doi.org/10.1145/508791.508845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2002 ACM symposium on Applied computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080159559","display_name":"Matt Burnside","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"M. Burnside","raw_affiliation_strings":["MIT Laboratory for Computer Science, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"MIT Laboratory for Computer Science, Cambridge, MA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062370811","display_name":"Dwaine Clarke","orcid":"https://orcid.org/0000-0001-5087-6148"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"D. Clarke","raw_affiliation_strings":["MIT Laboratory for Computer Science, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"MIT Laboratory for Computer Science, Cambridge, MA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074904749","display_name":"Todd Jason Mills","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"T. Mills","raw_affiliation_strings":["MIT Laboratory for Computer Science, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"MIT Laboratory for Computer Science, Cambridge, MA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051026551","display_name":"Andrew J. Maywah","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"A. Maywah","raw_affiliation_strings":["MIT Laboratory for Computer Science, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"MIT Laboratory for Computer Science, Cambridge, MA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000525449","display_name":"Srinivas Devadas","orcid":"https://orcid.org/0000-0001-8253-7714"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Devadas","raw_affiliation_strings":["MIT Laboratory for Computer Science, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"MIT Laboratory for Computer Science, Cambridge, MA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051087399","display_name":"Ronald L. Rivest","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"R. Rivest","raw_affiliation_strings":["MIT Laboratory for Computer Science, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"MIT Laboratory for Computer Science, Cambridge, MA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5080159559"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":7.8512,"has_fulltext":false,"cited_by_count":61,"citation_normalized_percentile":{"value":0.97810781,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"265","last_page":"272"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8218719959259033},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5952233076095581},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.5734362602233887},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5386267900466919},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5372706651687622},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4740821123123169},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.45970070362091064},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4440140426158905},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4420175552368164},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.30985966324806213},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15226608514785767}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8218719959259033},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5952233076095581},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.5734362602233887},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5386267900466919},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5372706651687622},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4740821123123169},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.45970070362091064},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4440140426158905},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4420175552368164},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.30985966324806213},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15226608514785767},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":8,"locations":[{"id":"doi:10.1145/508791.508845","is_oa":false,"landing_page_url":"https://doi.org/10.1145/508791.508845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2002 ACM symposium on Applied computing","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.21.6937","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.6937","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://theory.lcs.mit.edu/~rivest/BurnsideClarkeMillsMaywahDevadasRivest-ProxyBasedSecurityProtocolsInNetworkedMobileDevices.ps","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.25.416","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.416","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://glenfiddich.lcs.mit.edu/~devadas/pubs/sac.ps","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.310.3430","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.310.3430","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://people.csail.mit.edu/rivest/pubs/BCMMx02.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.504.9512","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.504.9512","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.columbia.edu/~mb/papers/burnside02proxy.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.515.2071","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.515.2071","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.ai.mit.edu/projects/oxygen/oxygen-book2001/Section2-Network21/N21-10.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.88.2879","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.88.2879","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://csg.csail.mit.edu/pubs/reports/search4.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.88.5028","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.88.5028","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://csg.csail.mit.edu/pubs/memos/Memo-451/memo-451.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W118969896","https://openalex.org/W1500356409","https://openalex.org/W1656678770","https://openalex.org/W1819010326","https://openalex.org/W1859131989","https://openalex.org/W1989163006","https://openalex.org/W2009567033","https://openalex.org/W2018501701","https://openalex.org/W2099042427","https://openalex.org/W2109388743","https://openalex.org/W2111194475","https://openalex.org/W2112737587","https://openalex.org/W2125855750","https://openalex.org/W2136409968","https://openalex.org/W2158419323","https://openalex.org/W2228308764","https://openalex.org/W2245957586","https://openalex.org/W2272529785","https://openalex.org/W2993902586","https://openalex.org/W3006602635","https://openalex.org/W3145042860","https://openalex.org/W6604783211","https://openalex.org/W6629828591","https://openalex.org/W6636970380","https://openalex.org/W6675220417"],"related_works":["https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W2093529019","https://openalex.org/W87530933","https://openalex.org/W2282990539","https://openalex.org/W4240432851","https://openalex.org/W154233216","https://openalex.org/W2626486901","https://openalex.org/W2026856585","https://openalex.org/W1988007309"],"abstract_inverted_index":{"We":[0,43,138],"describe":[1,44],"a":[2,40,55,62,76,83,140],"resource":[3,87],"discovery":[4],"and":[5,11,24,47,61,82,89,103],"communication":[6,90],"system":[7,123,145],"designed":[8],"for":[9,57,64,86,99,129],"security":[10,46],"privacy.":[12],"All":[13],"objects":[14],"in":[15],"the":[16,35,96,104],"system,":[17],"e.g.,":[18],"appliances,":[19],"wearable":[20],"gadgets,":[21],"software":[22,29],"agents,":[23],"users":[25],"have":[26],"associated":[27],"trusted":[28,41],"proxies":[30],"that":[31],"either":[32],"run":[33,75],"on":[34,39,79,91,110],"appliance":[36],"hardware":[37],"or":[38],"computer.":[42],"how":[45],"privacy":[48],"are":[49],"enforced":[50],"using":[51,146],"two":[52,69],"separate":[53,70],"protocols:":[54],"protocol":[56,63,78,85,98,106],"secure":[58,65],"device-to-proxy":[59,97],"communication,":[60],"proxy-to-proxy":[66,105],"communication.":[67],"Using":[68],"protocols":[71],"allows":[72,128],"us":[73],"to":[74,134],"computationally-inexpensive":[77],"impoverished":[80],"devices,":[81],"sophisticated":[84],"authentication":[88],"more":[92],"powerful":[93],"devices.We":[94],"detail":[95],"lightweight":[100],"wireless":[101],"devices":[102],"which":[107,127],"is":[108],"based":[109],"SPKI/SDSI":[111],"(Simple":[112],"Public":[113],"Key":[114],"Infrastructure":[115],"/":[116],"Simple":[117],"Distributed":[118],"Security":[119],"Infrastructure).":[120],"A":[121],"prototype":[122],"has":[124],"been":[125],"constructed,":[126],"secure,":[130],"yet":[131],"efficient,":[132],"access":[133],"networked,":[135],"mobile":[136],"devices.":[137],"present":[139],"quantitative":[141],"evaluation":[142],"of":[143],"this":[144],"various":[147],"metrics.":[148]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
