{"id":"https://openalex.org/W2184939131","doi":"https://doi.org/10.17487/rfc4050","title":"Using the Elliptic Curve Signature Algorithm (ECDSA) for XML Digital Signatures","display_name":"Using the Elliptic Curve Signature Algorithm (ECDSA) for XML Digital Signatures","publication_year":2005,"publication_date":"2005-04-01","ids":{"openalex":"https://openalex.org/W2184939131","doi":"https://doi.org/10.17487/rfc4050","mag":"2184939131"},"language":"en","primary_location":{"id":"doi:10.17487/rfc4050","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc4050","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"},"type":"report","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014531518","display_name":"Simon Blake-Wilson\u22c6\u22c6","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"S. Blake-Wilson","raw_affiliation_strings":["CIO Austria"],"affiliations":[{"raw_affiliation_string":"CIO Austria","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086920844","display_name":"Gregor Karlinger","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"G. Karlinger","raw_affiliation_strings":["CIO Austria"],"affiliations":[{"raw_affiliation_string":"CIO Austria","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064356865","display_name":"Takuya Kobayashi","orcid":"https://orcid.org/0000-0002-7316-7704"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"T. Kobayashi","raw_affiliation_strings":["CIO Austria"],"affiliations":[{"raw_affiliation_string":"CIO Austria","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100322537","display_name":"Yang Wang","orcid":"https://orcid.org/0000-0001-8858-0430"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Y. Wang","raw_affiliation_strings":["CIO Austria"],"affiliations":[{"raw_affiliation_string":"CIO Austria","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014531518"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12698","display_name":"3D Modeling in Geospatial Applications","score":0.8327999711036682,"subfield":{"id":"https://openalex.org/subfields/2215","display_name":"Building and Construction"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12698","display_name":"3D Modeling in Geospatial Applications","score":0.8327999711036682,"subfield":{"id":"https://openalex.org/subfields/2215","display_name":"Building and Construction"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.7649999856948853,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14280","display_name":"Big Data Technologies and Applications","score":0.7601000070571899,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.965446412563324},{"id":"https://openalex.org/keywords/digital-signature-algorithm","display_name":"Digital Signature Algorithm","score":0.7075521349906921},{"id":"https://openalex.org/keywords/elgamal-signature-scheme","display_name":"ElGamal signature scheme","score":0.5871124863624573},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.5850504636764526},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5831929445266724},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5784420967102051},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5219827890396118},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5124819278717041},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.25692009925842285},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23052874207496643},{"id":"https://openalex.org/keywords/geometry","display_name":"Geometry","score":0.1456666886806488},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.14236167073249817},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.12999683618545532},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12567657232284546},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1119326651096344},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08164405822753906}],"concepts":[{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.965446412563324},{"id":"https://openalex.org/C202424057","wikidata":"https://www.wikidata.org/wiki/Q1224829","display_name":"Digital Signature Algorithm","level":4,"score":0.7075521349906921},{"id":"https://openalex.org/C132860680","wikidata":"https://www.wikidata.org/wiki/Q1328731","display_name":"ElGamal signature scheme","level":5,"score":0.5871124863624573},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.5850504636764526},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5831929445266724},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5784420967102051},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5219827890396118},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5124819278717041},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.25692009925842285},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23052874207496643},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.1456666886806488},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.14236167073249817},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.12999683618545532},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12567657232284546},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1119326651096344},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08164405822753906},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.17487/rfc4050","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc4050","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1490476950","https://openalex.org/W2113038805","https://openalex.org/W2277273755","https://openalex.org/W4299626386"],"related_works":["https://openalex.org/W2392378177","https://openalex.org/W2378454728","https://openalex.org/W2362418118","https://openalex.org/W2370174115","https://openalex.org/W2358101811","https://openalex.org/W2998969597","https://openalex.org/W2390942931","https://openalex.org/W2130871907","https://openalex.org/W2884894114","https://openalex.org/W2132971056"],"abstract_inverted_index":{"This":[0],"document":[1,21],"is":[2],"not":[3,32],"a":[4],"candidate":[5],"for":[6,22,36],"any":[7,14,23],"level":[8],"of":[9,16,19],"Internet":[10],"Standard.The":[11],"IETF":[12,34],"disclaims":[13],"knowledge":[15],"the":[17],"fitness":[18],"this":[20],"purpose,":[24],"and":[25],"in":[26],"particular":[27],"notes":[28],"that":[29],"it":[30],"has":[31],"had":[33],"review":[35],"such":[37],"things":[38],"as":[39],"security,":[40],"congestion":[41],"control,":[42],"or":[43],"inappropriate":[44],"interaction":[45],"with":[46],"deployed":[47],"protocols.":[48]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
