(original) (raw)
{"id":"https://openalex.org/W2144391224","doi":"https://doi.org/10.1109/98.403455","title":"Trials of wireless, secure electronic mail","display_name":"Trials of wireless, secure electronic mail","publication_year":1995,"publication_date":"1995-01-01","ids":{"openalex":"https://openalex.org/W2144391224","doi":"https://doi.org/10.1109/98.403455","mag":"2144391224"},"language":"en","primary\_location":{"id":"doi:10.1109/98.403455","is\_oa":false,"landing\_page\_url":"https://doi.org/10.1109/98.403455","pdf\_url":null,"source":{"id":"https://openalex.org/S2793317","display\_name":"IEEE Personal Communications","issn_l":"1070-9916","issn":["1070-9916","1558-0652"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host\_organization\_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"\],"host\_organization\_lineage\_names":\["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Personal Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059119479","display\_name":"David R. Smith","orcid":"https://orcid.org/0000-0003-3658-4506"},"institutions":\[{"id":"https://openalex.org/I193531525","display\_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country\_code":"US","type":"education","lineage":\["https://openalex.org/I193531525"\]}\],"countries":\["US"\],"is\_corresponding":true,"raw\_author\_name":"D.R. Smith","raw_affiliation_strings":["GeorgeWashington University","Appl. Technol. Div., Computer Sci. Corp., Fall Church, VA, USA"],"affiliations":[{"raw_affiliation_string":"GeorgeWashington University","institution_ids":["https://openalex.org/I193531525"\]},{"raw\_affiliation\_string":"Appl. Technol. Div., Computer Sci. Corp., Fall Church, VA, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022711717","display\_name":"Sergi Sim\u00f3n","orcid":"https://orcid.org/0000-0002-7000-6382"},"institutions":\[\],"countries":\[\],"is\_corresponding":false,"raw\_author\_name":"S.D. Simon","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5027216094","display\_name":"L.E. Cautilli","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"L.E. Cautilli","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5059119479"\],"corresponding\_institution\_ids":\["https://openalex.org/I193531525"\],"apc\_list":null,"apc\_paid":null,"fwci":0.9717,"has\_fulltext":false,"cited\_by\_count":5,"citation\_normalized\_percentile":{"value":0.81364125,"is\_in\_top\_1\_percent":false,"is\_in\_top\_10\_percent":false},"cited\_by\_percentile\_year":null,"biblio":{"volume":"2","issue":"4","first\_page":"28","last\_page":"33"},"is\_retracted":false,"is\_paratext":false,"is\_xpac":false,"primary\_topic":{"id":"https://openalex.org/T11896","display\_name":"Opportunistic and Delay-Tolerant Networks","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display\_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display\_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display\_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display\_name":"Opportunistic and Delay-Tolerant Networks","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display\_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display\_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display\_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display\_name":"IPv6, Mobility, Handover, Networks, Security","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/2208","display\_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display\_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display\_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display\_name":"Distributed systems and fault tolerance","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1705","display\_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display\_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display\_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display\_name":"Computer science","score":0.7108884453773499},{"id":"https://openalex.org/keywords/computer-network","display\_name":"Computer network","score":0.5208128690719604},{"id":"https://openalex.org/keywords/wireless-network","display\_name":"Wireless network","score":0.4947742819786072},{"id":"https://openalex.org/keywords/computer-security","display\_name":"Computer security","score":0.48266270756721497},{"id":"https://openalex.org/keywords/data-security","display\_name":"Data security","score":0.4153839647769928},{"id":"https://openalex.org/keywords/telecommunications","display\_name":"Telecommunications","score":0.3841955363750458},{"id":"https://openalex.org/keywords/wireless","display\_name":"Wireless","score":0.36111414432525635},{"id":"https://openalex.org/keywords/encryption","display\_name":"Encryption","score":0.153095543384552}\],"concepts":\[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display\_name":"Computer science","level":0,"score":0.7108884453773499},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display\_name":"Computer network","level":1,"score":0.5208128690719604},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display\_name":"Wireless network","level":3,"score":0.4947742819786072},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display\_name":"Computer security","level":1,"score":0.48266270756721497},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display\_name":"Data security","level":3,"score":0.4153839647769928},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display\_name":"Telecommunications","level":1,"score":0.3841955363750458},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display\_name":"Wireless","level":2,"score":0.36111414432525635},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display\_name":"Encryption","level":2,"score":0.153095543384552}\],"mesh":\[\],"locations\_count":1,"locations":\[{"id":"doi:10.1109/98.403455","is\_oa":false,"landing\_page\_url":"https://doi.org/10.1109/98.403455","pdf\_url":null,"source":{"id":"https://openalex.org/S2793317","display\_name":"IEEE Personal Communications","issn_l":"1070-9916","issn":["1070-9916","1558-0652"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host\_organization\_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"\],"host\_organization\_lineage\_names":\["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Personal Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.46000000834465027,"id":"https://metadata.un.org/sdg/9"}\],"awards":\[\],"funders":\[{"id":"https://openalex.org/F4320306078","display\_name":"U.S. Department of Defense","ror":"https://ror.org/0447fe631"}\],"has\_content":{"pdf":false,"grobid\_xml":false},"content\_urls":null,"referenced\_works\_count":3,"referenced\_works":\["https://openalex.org/W2030417420","https://openalex.org/W2108834246","https://openalex.org/W3165363684"\],"related\_works":\["https://openalex.org/W2111375262","https://openalex.org/W1991205173","https://openalex.org/W2109048960","https://openalex.org/W2741481635","https://openalex.org/W2038165453","https://openalex.org/W2137328885","https://openalex.org/W2338537463","https://openalex.org/W2183644707","https://openalex.org/W1595657826","https://openalex.org/W2908230797"\],"abstract\_inverted\_index":{"The":\[0,16,48,104\],"US":\[1\],"Department":\[2\],"of":\[3,10,18,29,42,70,101,106,175\],"Defense":\[4,55\],"(DOD)":\[5\],"is":\[6\],"a":\[7,43,67,125,153,180,226\],"large":\[8\],"user":\[9,121,149\],"both":\[11\],"e-mail":\[12,46,134,192\],"and":\[13,22,24,40,63,93,117,119,138,151,160,162,196,205,221\],"security":\[14,33,87,136,208,211\],"services.":\[15\],"introduction":\[17\],"commercial":\[19,89,191,218\],"wireless":\[20,90,132,173,203\],"communications":\[21\],"networks,":\[23,92\],"the":\[25,30,36,54,79,99,112,128,172,176,184,202,207,222,232\],"recognition":\[26\],"by":\[27,231\],"industry":\[28\],"need":\[31\],"for":\[32,38,50,76,171\],"has":\[34,59\],"provided":\[35\],"opportunity":\[37\],"development":\[39\],"trials":\[41,65,82,108\],"wireless,":\[44\],"secure":\[45\],"service.":\[47\],"Center":\[49\],"Systems":\[51,57\],"Engineering":\[52\],"at":\[53\],"Information":\[56\],"Agency":\[58\],"developed":\[60,230\],"this":\[61\],"capability":\[62\],"conducted":\[64\],"with":\[66,201,206\],"small":\[68\],"community":\[69\],"DOD":\[71,85,102\],"users":\[72\],"who":\[73\],"have":\[74,83,94\],"requirements":\[75\],"mobility":\[77\],"in":\[78,144\],"workplace.":\[80\],"These":\[81\],"introduced":\[84\],"approved":\[86\],"into":\[88,98\],"data":\[91,166\],"inserted":\[95\],"advanced":\[96\],"technology":\[97\],"hands":\[100\],"users.":\[103\],"objective":\[105\],"these":\[107\],"was":\[109\],"to":\[110,147,179\],"validate":\[111\],"system":\[113\],"design,":\[114\],"evaluate":\[115\],"performance":\[116\],"utilization,":\[118\],"obtain":\[120\],"feedback.":\[122\],"To":\[123\],"realize":\[124\],"broad-based":\[126\],"trial,":\[127\],"authors":\[129\],"selected":\[130\],"multiple":\[131\],"services,":\[133\],"packages,":\[135,137\],"mobile":\[139,177\],"computers,":\[140\],"which":\[141\],"were":\[142,169,199,213\],"integrated":\[143,200\],"various":\[145\],"combinations":\[146\],"meet":\[148\],"needs":\[150\],"allow":\[152\],"thorough":\[154\],"trial.":\[155\],"Both":\[156\],"packet":\[157,165\],"radio":\[158\],"(RAM":\[159\],"ARDIS)":\[161\],"cellular":\[163\],"digital":\[164\],"(CDPD)":\[167\],"services":\[168\],"employed":\[170\],"connection":\[174\],"unit":\[178\],"mail":\[181\],"server":\[182\],"on":\[183,217,225\],"user's":\[185\],"local":\[186\],"area":\[187\],"network":\[188\],"(LAN).":\[189\],"Two":\[190,210\],"packages":\[193,212\],"(LOTUS":\[194\],"CC:Mail":\[195\],"Microsoft":\[197\],"Mail)":\[198\],"service":\[204\],"packages.":\[209\],"used,":\[214\],"one":\[215\],"based":\[216,224\],"software":\[219\],"(SecretAgent)":\[220\],"other":\[223\],"PCMCIA":\[227\],"card":\[228\],"(FORTEZZA)":\[229\],"National":\[233\],"Security":\[234\],"Agency.<":[235],"<etx":[236],"xmlns:mml=\"http: 1998="" www.w3.org="" math="" mathml\"":[237],"xmlns:xlink="\">":\[238\]},"counts\_by\_year":\[\],"updated\_date":"2025-11-06T03:46:38.306776","created\_date":"2025-10-10T00:00:00"}" title="undefined" rel="noopener noreferrer">http://www.w3.org/1999/xlink\\"">>":\[238\]},"counts\_by\_year":\[\],"updated\_date":"2025-11-06T03:46:38.306776","created\_date":"2025-10-10T00:00:00"} </etx":[236],"xmlns:mml=\"http:>