{"id":"https://openalex.org/W3049139928","doi":"https://doi.org/10.17487/rfc8812","title":"CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms","display_name":"CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms","publication_year":2020,"publication_date":"2020-08-01","ids":{"openalex":"https://openalex.org/W3049139928","doi":"https://doi.org/10.17487/rfc8812","mag":"3049139928"},"language":"en","primary_location":{"id":"doi:10.17487/rfc8812","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc8812","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"},"type":"report","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064905348","display_name":"Michael Jones","orcid":"https://orcid.org/0000-0002-0131-527X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"M. Jones","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5064905348"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9455999732017517,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9455999732017517,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9441999793052673,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9294000267982483,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/json","display_name":"JSON","score":0.9672380685806274},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7789657115936279},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6264469027519226},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.6162306070327759},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4992330074310303},{"id":"https://openalex.org/keywords/object-based","display_name":"Object based","score":0.4762537479400635},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3855987787246704},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.28729212284088135},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21535441279411316}],"concepts":[{"id":"https://openalex.org/C2780416260","wikidata":"https://www.wikidata.org/wiki/Q2063","display_name":"JSON","level":2,"score":0.9672380685806274},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7789657115936279},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6264469027519226},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.6162306070327759},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4992330074310303},{"id":"https://openalex.org/C3019973339","wikidata":"https://www.wikidata.org/wiki/Q899523","display_name":"Object based","level":3,"score":0.4762537479400635},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3855987787246704},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.28729212284088135},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21535441279411316}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.17487/rfc8812","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc8812","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2100786069","https://openalex.org/W3049139928","https://openalex.org/W4256166021","https://openalex.org/W2156352682","https://openalex.org/W4298625047","https://openalex.org/W1578572853","https://openalex.org/W1991139010","https://openalex.org/W195791485","https://openalex.org/W2266572308","https://openalex.org/W3141773718"],"abstract_inverted_index":{"The":[0],"W3C":[1],"Web":[2,88,101],"Authentication":[3],"(WebAuthn)":[4],"specification":[5,14],"and":[6,18,38,46,52,82,93],"the":[7,25,29,49,55,60,76,85,94],"FIDO\nAlliance":[8],"Client":[9],"to":[10],"Authenticator":[11],"Protocol":[12],"(CTAP)":[13],"use\nCBOR":[15],"Object":[16,70],"Signing":[17,71],"Encryption":[19],"(COSE)":[20],"algorithm":[21,77],"identifiers.":[22],"This\nspecification":[23],"registers":[24,75],"following":[26],"algorithms":[27],"in":[28,59,84],"IANA":[30,61,86,99],"COSE\nAlgorithms":[31],"registry,":[32],"which":[33],"are":[34],"used":[35],"by":[36],"WebAuthn":[37],"CTAP\nimplementations:":[39],"RSASSA-PKCS1-v1_5":[40],"using":[41,48,79],"SHA-256,":[42],"SHA-384,":[43],"SHA-512,\nand":[44],"SHA-1,":[45],"ECDSA":[47,78],"secp256k1":[50,56,95],"curve":[51,58,81,97],"SHA-256.":[53],"It\nregisters":[54],"elliptic":[57,96],"COSE":[62],"Elliptic\nCurves":[63],"registry.":[64,105],"Also,":[65],"for":[66],"use":[67],"with":[68],"JSON":[87,100],"and\nEncryption":[72,90],"(JOSE),":[73],"it":[74],"the\nsecp256k1":[80],"SHA-256":[83],"Signature":[89],"Algorithms":[91],"registry":[92],"in\nthe":[98],"Key":[102],"Elliptic":[103],"Curve":[104]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
