{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:00:30Z","timestamp":1740099630832,"version":"3.37.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030358686"},{"type":"electronic","value":"9783030358693"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-35869-3_15","type":"book-chapter","created":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T01:04:25Z","timestamp":1574211865000},"page":"214-230","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware Implementations"],"prefix":"10.1007","author":[{"given":"Krishna","family":"Bagadia","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4631-2208","authenticated-orcid":false,"given":"Urbi","family":"Chatterjee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4664-5237","authenticated-orcid":false,"given":"Debapriya Basu","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3588-163X","authenticated-orcid":false,"given":"Rajat Subhra","family":"Chakraborty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,21]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Bagadia, K., Chatterjee, U., Roy, D.B., Mukhopadhyay, D., Chakraborty, R.S.: Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse. In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 167\u2013167. May 2017","DOI":"10.1109\/HST.2017.7951831"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2001","author":"Nicholas J. Hopper","year":"2001","unstructured":"Hopper, N.J., Blum, M.: Secure human identification protocols. In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9\u201313, 2001, Proceedings, 2001, pp. 52\u201366 (2001). \nhttps:\/\/doi.org\/10.1007\/3-540-45682-1_4"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"Ari Juels","year":"2005","unstructured":"Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14\u201318, 2005, Proceedings, 2005, pp. 293\u2013308 (2005). \nhttps:\/\/doi.org\/10.1007\/11535218_18"},{"key":"15_CR4","doi-asserted-by":"publisher","unstructured":"Bringer, J., Chabanne, H., Dottax, E.: HB$${}^{\\text{++}}$$: a lightweight authentication protocol secure against some attacks. In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, 2006, pp. 28\u201333 (2006). \nhttps:\/\/doi.org\/10.1109\/SECPERU.2006.10","DOI":"10.1109\/SECPERU.2006.10"},{"key":"15_CR5","doi-asserted-by":"publisher","unstructured":"Gilbert, H., Robshaw, M.J.B., Seurin, Y.: HB$$^{\\#}$$: increasing the security and efficiency of HB$$^{+}$$. In: Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings, pp. 361\u2013378 (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-78967-3_21","DOI":"10.1007\/978-3-540-78967-3_21"},{"key":"15_CR6","unstructured":"Duc, D.N., Kim, K.: Securing HB+ against GRS man-in-the-middle attack. Information and Communication Engineers, Symposium on Cryptography and Information Security (2007). \nhttp:\/\/caislab.kaist.ac.kr\/publication\/paper_files\/2007\/SCIS2007_Duc.pdf"},{"issue":"9","key":"15_CR7","doi-asserted-by":"publisher","first-page":"2262","DOI":"10.1016\/j.comnet.2007.01.011","volume":"51","author":"J. Munilla","year":"2007","unstructured":"Munilla, J., Peinado, A.: HB-MP: a further step in the HB-family of lightweight authentication protocols. Computer Networks, vol. 51, no. 9, pp. 2262\u20132267 (2007). \nhttps:\/\/doi.org\/10.1016\/j.comnet.2007.01.011","journal-title":"Computer Networks"},{"key":"15_CR8","unstructured":"Leng, K.M.X., Markantonakis, K.: HB-MP+: a protocol: an improvement on the HB-MP protocol. In: Proceedings IEEE International Conference RFID, pp. 118\u2013124 (2008). \nhttps:\/\/repository.royalholloway.ac.uk\/file\/1a749a12-a370-bc54-c2dd-5749004241ef\/8\/HB_MP_Protocol_An_Improvement_on_the_HB_MP_Protocol.pdf"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-03748-1_16","volume-title":"Trust, Privacy and Security in Digital Business","author":"Panagiotis Rizomiliotis","year":"2009","unstructured":"Rizomiliotis, P.: HB - MAC: improving the random - HB$$^{\\#}$$ authentication protocol. In: Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3\u20134, 2009. Proceedings, pp. 159\u2013168 (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-03748-1_16"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-540-68914-0_21","volume-title":"Applied Cryptography and Network Security","author":"Ghaith Hammouri","year":"2008","unstructured":"Hammouri, G., Sunar, B.: PUF-HB: a tamper-resilient HB based authentication protocol. In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3\u20136, 2008. Proceedings, pp. 346\u2013365 (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-68914-0_21"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-88625-9_3","volume-title":"Information and Communications Security","author":"Ghaith Hammouri","year":"2008","unstructured":"Hammouri, G., \u00d6zt\u00fcrk, E., Birand, B., Sunar, B.: Unclonable lightweight authentication scheme. In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20\u201322, 2008, Proceedings, pp. 33\u201348 (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-88625-9_3"},{"issue":"1","key":"15_CR12","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s11277-013-1006-2","volume":"72","author":"Guanyang Deng","year":"2013","unstructured":"Deng, G., Li, H., Zhang, Y., Wang, J.: Tree-LSHB+: an LPN-Based lightweight mutual authentication RFID protocol. In: Wireless Personal Communications, vol. 72, no. 1, pp. 159\u2013174 (2013). \nhttps:\/\/doi.org\/10.1007\/s11277-013-1006-2","journal-title":"Wireless Personal Communications"},{"issue":"9","key":"15_CR13","doi-asserted-by":"publisher","first-page":"4339","DOI":"10.1109\/TIT.2008.928290","volume":"54","author":"Julien Bringer","year":"2008","unstructured":"Bringer, J., Chabanne, H.: Trusted-HB: a low-cost version of HB $${}^{\\text{+ }}$$ secure against man-in-the-middle attacks. In: IEEE Transition Information Theory, vol. 54, no. 9, pp. 4339\u20134342 (2008). \nhttps:\/\/doi.org\/10.1109\/TIT.2008.928290","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-3-642-31284-7_29","volume-title":"Applied Cryptography and Network Security","author":"Panagiotis Rizomiliotis","year":"2012","unstructured":"Rizomiliotis, P., Gritzalis, S.: GHB #: a provably secure HB-Like lightweight authentication protocol. In: Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26\u201329, 2012. Proceedings, pp. 489\u2013506 (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-31284-7_29"},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-642-34047-5_20","volume-title":"Fast Software Encryption","author":"Stefan Heyse","year":"2012","unstructured":"Heyse, S., Kiltz, E., Lyubashevsky, V., Paar, C., Pietrzak, K.: Lapin: an efficient authentication protocol based on ring-LPN. In: Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19\u201321, 2012. Revised Selected Papers, pp. 346\u2013365 (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-34047-5_20"},{"key":"15_CR16","unstructured":"Gilbert, H., Robshaw, M.J.B., Sibert, H.: An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol. IACR Cryptology ePrint Archive, vol. 2005, p. 237 (2005). \nhttp:\/\/eprint.iacr.org\/2005\/237"},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-540-85230-8_12","volume-title":"Financial Cryptography and Data Security","author":"Henri Gilbert","year":"2008","unstructured":"Gilbert, H., Robshaw, M.J.B., Seurin, Y.: Good variants of HB$${}^{\\text{+ }}$$ are hard to find. In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28\u201331, 2008, Revised Selected Papers, pp. 156\u2013170 (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-85230-8_12"},{"issue":"9","key":"15_CR18","doi-asserted-by":"publisher","first-page":"2317","DOI":"10.1109\/TMC.2015.2492553","volume":"15","author":"Gildas Avoine","year":"2016","unstructured":"Avoine, G., Carpent, X., Hernandez-Castro, J.: Pitfalls in ultralightweight authentication protocol designs, In: IEEE Transition Mobility Computation, vol. 15, no. 9, pp. 2317\u20132332 (2016). \nhttps:\/\/doi.org\/10.1109\/TMC.2015.2492553","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"6","key":"15_CR19","doi-asserted-by":"publisher","first-page":"4042","DOI":"10.1109\/TIT.2013.2253892","volume":"59","author":"Zhijun Li","year":"2013","unstructured":"Li, Z., Gong, G., Qin, Z.: Secure and efficient LCMQ entity authentication protocol. In: IEEE Transition Information Theory, vol. 59, no. 6, pp. 4042\u20134054 (2013). \nhttps:\/\/doi.org\/10.1109\/TIT.2013.2253892","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR20","doi-asserted-by":"publisher","unstructured":"Boneh, D., Lipton, R.J.: Effect of operators on straight line complexity. In: Fifth Israel Symposium on Theory of Computing and Systems, ISTCS 1997, Ramat-Gan, Israel, June 17\u201319, 1997, Proceedings, pp. 1\u20135 (1997). \nhttps:\/\/doi.org\/10.1109\/ISTCS.1997.595151","DOI":"10.1109\/ISTCS.1997.595151"},{"key":"15_CR21","unstructured":"Loubet-Moundi, P., Vigilant, D., Olivier, F.: Static Fault Attacks on Hardware DES Registers, IACR Cryptology ePrint Archive, vol. 2011, p. 531 (2011). \nhttp:\/\/eprint.iacr.org\/2011\/531"},{"key":"15_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"G Piret","year":"2003","unstructured":"Piret, G., Quisquater, J.-J.: A differential fault attack technique against SPN structures, with application to the AES and Khazad. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77\u201388. Springer, Heidelberg (2003). \nhttps:\/\/doi.org\/10.1007\/978-3-540-45238-6_7"},{"key":"15_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-21040-2_15","volume-title":"Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication","author":"M Tunstall","year":"2011","unstructured":"Tunstall, M., Mukhopadhyay, D., Ali, S.: Differential fault analysis of the advanced encryption standard using a single fault. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 224\u2013233. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-21040-2_15"},{"key":"15_CR24","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-540-76788-6_22","volume-title":"Lecture Notes in Computer Science","author":"Chong Hee Kim","year":"2007","unstructured":"Kim, C.H., Shin, J.H., Quisquater, J., Lee, P.J.: Safe-error attack on SPA-FA resistant exponentiations using a HW modular multiplier. In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29\u201330, 2007, Proceedings, pp. 273\u2013281 (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-76788-6_22"},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-319-04852-9_11","volume-title":"Topics in Cryptology \u2013 CT-RSA 2014","author":"Lubos Gaspar","year":"2014","unstructured":"Gaspar, L., Leurent, G., Standaert, F.: Hardware implementation and side-channel analysis of lapin. In: Topics in Cryptology - CT-RSA 2014 - The Cryptographer\u2019s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25\u201328, 2014. Proceedings, pp. 206\u2013226 (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-04852-9_11"},{"key":"15_CR26","unstructured":"Carrijo, J., Tonicelli, R., Nascimento, A.C.A.: A fault analytic method against HB$${}^{\\text{+ }}$$. In: IEICE Transactions, vol. 94-A, no. 2, pp. 855\u2013859 (2011). \nhttp:\/\/search.ieice.org\/bin\/summary.php?id=e94-a_2_855"},{"key":"15_CR27","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-319-54669-8_15","volume-title":"Smart Card Research and Advanced Applications","author":"F Berti","year":"2017","unstructured":"Berti, F., Standaert, F.-X.: An analysis of the learning parity with noise assumption against fault attacks. In: Lemke-Rust, K., Tunstall, M. (eds.) Smart Card Research and Advanced Applications, pp. 245\u2013264. Springer International Publishing, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-54669-8_15"},{"key":"15_CR28","unstructured":"Wang, X., Tehranipoor, M., Plusquellic, J.: Detecting malicious inclusions in secure hardware: challenges and solutions. In: 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, June 2008, pp. 15\u201319 (2008)"},{"key":"15_CR29","unstructured":"King, S.T., Tucek, J., Cozzie, A., Grier, C., Jiang, W., Zhou, Y.: Designing and implementing malicious hardware. In: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, ser. LEET 2008. Berkeley, CA, USA: USENIX Association, 2008, pp. 5:1\u20135:8 (2008). \nhttp:\/\/dl.acm.org\/citation.cfm?id=1387709.1387714"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Jin, Y., Kupp, N., Makris, Y.: Experiences in hardware trojan design and implementation. In: 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, July 2009, pp. 50\u201357 (2009)","DOI":"10.1109\/HST.2009.5224971"},{"key":"15_CR31","first-page":"382","volume-title":"Lecture Notes in Computer Science","author":"Lang Lin","year":"2009","unstructured":"Lin, L., Kasper, M., G\u00fcneysu, T., Paar, C., Burleson, W.: Trojan side-channels: lightweight hardware trojans through side-channel engineering. In: Clavier, C., Gaj, K. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2009, Springer, Berlin, pp. 382\u2013395 (2009)"},{"key":"15_CR32","doi-asserted-by":"publisher","unstructured":"Lin, L., Burleson, W., Paar, C.: MOLES: malicious off-chip leakage enabled by side-channels. In: 2009 International Conference on Computer-Aided Design, ICCAD 2009, San Jose, CA, USA, November 2\u20135, 2009, pp. 117\u2013122 (2009). \nhttps:\/\/doi.org\/10.1145\/1687399.1687425","DOI":"10.1145\/1687399.1687425"},{"key":"15_CR33","doi-asserted-by":"publisher","unstructured":"Ali, S., Chakraborty, R.S., Mukhopadhyay, D., Bhunia, S.: Multi-level attacks: an emerging security concern for cryptographic hardware. In: Design, Automation and Test in Europe, DATE 2011, Grenoble, France, March 14\u201318, 2011, 2011, pp. 1176\u20131179 (2011). \nhttps:\/\/doi.org\/10.1109\/DATE.2011.5763307","DOI":"10.1109\/DATE.2011.5763307"},{"key":"15_CR34","doi-asserted-by":"publisher","unstructured":"Johnson, A.P., Saha, S., Chakraborty, R.S., Mukhopadhyay, D., G\u00f6ren, S.: Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet. In: Proceedings of the 9th Workshop on Embedded Systems Security, WESS 2014, New Delhi, India, October 17, 2014, 2014, pp. 1:1\u20131:8 (2014). \nhttps:\/\/doi.org\/10.1145\/2668322.2668323","DOI":"10.1145\/2668322.2668323"},{"key":"15_CR35","unstructured":"The big hack: How china used a tiny chip to infiltrate u.s. companies - bloomberg. \nhttps:\/\/www.bloomberg.com\/news\/features\/2018-10-04\/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies\n\n. Accessed on 07 Oct 2019"},{"issue":"3","key":"15_CR36","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TIT.1978.1055873","volume":"24","author":"E. Berlekamp","year":"1978","unstructured":"Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the inherent intractability of certain coding problems (Corresp.). In: IEEE Transition Information Theory, vol. 24, no. 3, pp. 384\u2013386 (1978). \nhttps:\/\/doi.org\/10.1109\/TIT.1978.1055873","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR37","volume-title":"Computers and Intractability; A Guide to the Theory of NP-Completeness","author":"MR Garey","year":"1990","unstructured":"Garey, M.R., Johnson, D.S.: Computers and Intractability; A Guide to the Theory of NP-Completeness. W. H. Freeman & Co., New York (1990)"},{"key":"15_CR38","unstructured":"Trust-Hub.org. \nhttps:\/\/www.trust-hub.org\/home\n\n. Accessed on 07 Oct 2019"},{"key":"15_CR39","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-319-24126-5_15","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"Debapriya Basu Roy","year":"2015","unstructured":"Roy, D.B., Bhasin, S., Guilley, S., Danger, J., Mukhopadhyay, D., Ngo, X.T., Najm, Z.: Reconfigurable LUT: a double edged sword for security-critical applications. In: Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3\u20137, 2015, Proceedings, 2015, pp. 248\u2013268 (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-24126-5_15"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-35869-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T01:16:14Z","timestamp":1574212574000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-35869-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030358686","9783030358693"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-35869-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"21 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gandhinagar","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.isical.ac.in\/~space2019\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}