{"id":"https://openalex.org/W1606350285","doi":"https://doi.org/10.1002/sec.1113","title":"TSSL: improving SSL/TLS protocol by trust model","display_name":"TSSL: improving SSL/TLS protocol by trust model","publication_year":2014,"publication_date":"2014-09-22","ids":{"openalex":"https://openalex.org/W1606350285","doi":"https://doi.org/10.1002/sec.1113","mag":"1606350285"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.1113","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085184972","display_name":"Maryam Asadzadeh Kaljahi","orcid":null},"institutions":[{"id":"https://openalex.org/I23946033","display_name":"University of Tehran","ror":"https://ror.org/05vf56z40","country_code":"IR","type":"education","lineage":["https://openalex.org/I23946033"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Maryam Asadzadeh Kaljahi","raw_affiliation_strings":["Department of IT; Tehran University; Tehran Iran"],"affiliations":[{"raw_affiliation_string":"Department of IT; Tehran University; Tehran Iran","institution_ids":["https://openalex.org/I23946033"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088425410","display_name":"Ali Payandeh","orcid":null},"institutions":[{"id":"https://openalex.org/I78323350","display_name":"Malek Ashtar University of Technology","ror":"https://ror.org/0043ezw98","country_code":"IR","type":"education","lineage":["https://openalex.org/I78323350"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Ali Payandeh","raw_affiliation_strings":["Department of Computer Engineering, Maleke-ashtar University, Tehran, Iran#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Maleke-ashtar University, Tehran, Iran#TAB#","institution_ids":["https://openalex.org/I78323350"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036799779","display_name":"M. B. Ghaznavi\u2010Ghoushchi","orcid":"https://orcid.org/0000-0001-7026-9476"},"institutions":[{"id":"https://openalex.org/I119025939","display_name":"Shahed University","ror":"https://ror.org/01e8ff003","country_code":"IR","type":"education","lineage":["https://openalex.org/I119025939"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mohammad Bagher Ghaznavi\u2010Ghoushchi","raw_affiliation_strings":["School of Engineering, Shahed University, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"School of Engineering, Shahed University, Tehran, Iran","institution_ids":["https://openalex.org/I119025939"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100,"provenance":"doaj"},"apc_paid":null,"fwci":1.26,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":5,"citation_normalized_percentile":{"value":0.729531,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":80,"max":82},"biblio":{"volume":"8","issue":"9","first_page":"1659","last_page":"1671"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transport-layer-security","display_name":"Transport Layer Security","score":0.8698737},{"id":"https://openalex.org/keywords/handshake","display_name":"Handshake","score":0.82684875},{"id":"https://openalex.org/keywords/otway\u2013rees-protocol","display_name":"Otway\u2013Rees protocol","score":0.4696053}],"concepts":[{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.8698737},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.86839175},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.82684875},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7064559},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6285319},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5350661},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.53466994},{"id":"https://openalex.org/C124086997","wikidata":"https://www.wikidata.org/wiki/Q4053131","display_name":"Wide Mouth Frog protocol","level":5,"score":0.46967965},{"id":"https://openalex.org/C35788789","wikidata":"https://www.wikidata.org/wiki/Q1320237","display_name":"Otway\u2013Rees protocol","level":5,"score":0.4696053},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.43956387},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.41237277},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.3739149},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.30949205},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29441744},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.19689754},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.15534246},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.1113","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.41,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":42,"referenced_works":["https://openalex.org/W115164397","https://openalex.org/W1452942402","https://openalex.org/W1551056197","https://openalex.org/W1569231662","https://openalex.org/W1592063330","https://openalex.org/W1997438474","https://openalex.org/W2013755867","https://openalex.org/W2031795630","https://openalex.org/W2048382412","https://openalex.org/W2068376601","https://openalex.org/W2069229570","https://openalex.org/W2069726044","https://openalex.org/W2070775894","https://openalex.org/W2076217650","https://openalex.org/W2076357705","https://openalex.org/W2084690415","https://openalex.org/W2088805625","https://openalex.org/W2088979095","https://openalex.org/W2093232845","https://openalex.org/W2095569450","https://openalex.org/W2095640354","https://openalex.org/W2096333427","https://openalex.org/W2097488677","https://openalex.org/W2100107987","https://openalex.org/W2105301035","https://openalex.org/W2125724417","https://openalex.org/W2133373561","https://openalex.org/W2134215437","https://openalex.org/W2137744738","https://openalex.org/W2141286021","https://openalex.org/W2156523427","https://openalex.org/W2156923104","https://openalex.org/W2159569559","https://openalex.org/W2315566209","https://openalex.org/W2328496753","https://openalex.org/W2336008669","https://openalex.org/W2407409432","https://openalex.org/W2507788808","https://openalex.org/W3124136430","https://openalex.org/W3135559746","https://openalex.org/W588453229","https://openalex.org/W59586974"],"related_works":["https://openalex.org/W652938764","https://openalex.org/W4300851572","https://openalex.org/W4296873577","https://openalex.org/W4295681914","https://openalex.org/W2951094648","https://openalex.org/W2379075791","https://openalex.org/W2268875388","https://openalex.org/W2165575206","https://openalex.org/W2143426326","https://openalex.org/W1967193464"],"abstract_inverted_index":{"Abstract":[0],"Transport":[1],"Layer":[2],"Security":[3],"(TLS)":[4],"is":[5,16,33,56,89,109,150,166],"the":[6,12,59,78,94,110,117,154,159,172,185],"most":[7,111],"popular":[8],"security":[9,22,157,180],"protocol":[10,55,137],"of":[11,24,29,81,87,116,123,158],"transport":[13],"layer.":[14],"It":[15,32],"widely":[17],"used":[18,151],"to":[19,58,69,133,152,168],"provide":[20],"basic":[21],"services":[23],"authentication,":[25],"confidentiality,":[26],"and":[27,42,48,102,113,126,181],"integrity":[28],"sensitive":[30],"data.":[31],"carried":[34],"out":[35],"in":[36,145,178],"critical":[37],"untrusted":[38],"networks":[39],"between":[40],"client":[41],"server":[43,61],"entities,":[44],"such":[45],"as":[46,77],"e\u2010commerce":[47,71],"online":[49],"transactions.":[50],"Despite":[51],"multiple":[52],"capabilities,":[53],"TLS":[54,88,118,160],"vulnerable":[57],"malicious":[60],"attacks":[62],"that":[63,171],"may":[64],"cause":[65],"a":[66,99,103,135],"serious":[67],"threat":[68],"TLS\u2010based":[70],"communications.":[72],"This":[73,120,148],"should":[74],"be":[75,169],"considered":[76],"first":[79],"problem":[80,86],"this":[82,107,146,163],"protocol.":[83,119,161],"The":[84],"other":[85],"sending":[90],"many":[91],"messages":[92],"during":[93],"handshake":[95],"phase":[96,108,115],"for":[97],"providing":[98],"successful":[100],"negotiation":[101],"secure":[104],"communication.":[105],"So,":[106],"complex":[112],"time\u2010consuming":[114],"causes":[121],"decreasing":[122],"service":[124],"capacity":[125],"using":[127],"more":[128],"time.":[129],"We":[130],"are":[131],"going":[132,167],"propose":[134],"new":[136],"based":[138],"on":[139],"trust":[140],"model":[141,149,174],"called":[142],"\u201cTSSL":[143],"protocol\u201d":[144],"paper.":[147],"conquer":[153],"disadvantages":[155],"with":[156,184],"Through":[162],"paper,":[164],"it":[165],"indicated":[170],"proposed":[173],"has":[175],"higher":[176],"levels":[177],"both":[179],"performance":[182],"compared":[183],"conventional":[186],"TLS.":[187],"Copyright":[188],"\u00a9":[189],"2014":[190],"John":[191],"Wiley":[192],"&":[193],"Sons,":[194],"Ltd.":[195]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1606350285","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2015,"cited_by_count":1}],"updated_date":"2025-01-16T06:52:12.306452","created_date":"2016-06-24"}