{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:51:29Z","timestamp":1726062689362},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030372279"},{"type":"electronic","value":"9783030372286"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-37228-6_6","type":"book-chapter","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T10:00:05Z","timestamp":1576490405000},"page":"105-125","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["POKs Based Secure and Energy-Efficient Access Control for Implantable Medical Devices"],"prefix":"10.1007","author":[{"given":"Chenglong","family":"Fu","sequence":"first","affiliation":[]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Longfei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Amr","family":"Mohamed","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,13]]},"reference":[{"key":"6_CR1","unstructured":"Barnaby jack hacks diabetes insulin pump live at hacker halted (2011). \nhttps:\/\/www.infosecurity-magazine.com\/news"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/3-540-48405-1_14","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"J Black","year":"1999","unstructured":"Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: UMAC: fast and secure message authentication. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 216\u2013233. Springer, Heidelberg (1999). \nhttps:\/\/doi.org\/10.1007\/3-540-48405-1_14"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-642-10628-6_6","volume-title":"Progress in Cryptology - INDOCRYPT 2009","author":"J Bringer","year":"2009","unstructured":"Bringer, J., Chabanne, H., Icart, T.: On physical obfuscation of cryptographic algorithms. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 88\u2013103. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-10628-6_6"},{"issue":"2","key":"6_CR4","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/S0031-3203(02)00030-4","volume":"36","author":"J Daugman","year":"2003","unstructured":"Daugman, J.: The importance of being random: statistical principles of iris recognition. Pattern Recogn. 36(2), 279\u2013291 (2003)","journal-title":"Pattern Recogn."},{"issue":"1","key":"6_CR5","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J Daugman","year":"2004","unstructured":"Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21\u201330 (2004)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/11836810_13","volume-title":"Information Security","author":"C Canni\u00e8re","year":"2006","unstructured":"Canni\u00e8re, C.: Trivium: a stream cipher construction inspired by block cipher design principles. In: Katsikas, S.K., L\u00f3pez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 171\u2013186. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11836810_13"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"De Meulenaer, G., Gosset, F., Standaert, F.X., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WIMOB 2008, pp. 580\u2013585. IEEE (2008)","DOI":"10.1109\/WiMob.2008.16"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Denning, T., Borning, A., Friedman, B., Gill, B.T., Kohno, T., Maisel, W.H.: Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices. In: SIGCHI Conference on Human Factors in Computing Systems (2010)","DOI":"10.1145\/1753326.1753462"},{"key":"6_CR9","unstructured":"Denning, T., Fu, K., Kohno, T.: Absence makes the heart grow fonder: New directions for implantable medical device security. In: USENIX HotSec (2008)"},{"issue":"3","key":"6_CR10","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/TWC.2009.060598","volume":"8","author":"X Du","year":"2009","unstructured":"Du, X., Guizani, M., Xiao, Y., Chen, H.H.: Transactions papers a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Trans. Wireless Commun. 8(3), 1223\u20131229 (2009)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Du, X., Xiao, Y., Ci, S., Guizani, M., Chen, H.H.: A routing-driven key management scheme for heterogeneous sensor networks. In: 2007 IEEE International Conference on Communications, pp. 3407\u20133412. IEEE (2007)","DOI":"10.1109\/ICC.2007.564"},{"issue":"1","key":"6_CR12","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.adhoc.2006.05.012","volume":"5","author":"X Du","year":"2007","unstructured":"Du, X., Xiao, Y., Guizani, M., Chen, H.H.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24\u201334 (2007)","journal-title":"Ad Hoc Netw."},{"key":"6_CR13","unstructured":"Fueki, S.: Semiconductor integrated circuit on IC card protected against tampering. US Patent App. 09\/962,224, 26 September 2001"},{"issue":"2","key":"6_CR14","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TIP.2013.2292332","volume":"23","author":"J Galbally","year":"2014","unstructured":"Galbally, J., Marcel, S., Fierrez, J.: Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans. Image Process. 23(2), 710\u2013724 (2014)","journal-title":"IEEE Trans. Image Process."},{"key":"6_CR15","unstructured":"Gassend, B.L.: Physical random functions. Ph.D. thesis, Massachusetts Institute of Technology (2003)"},{"issue":"4","key":"6_CR16","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/2043164.2018438","volume":"41","author":"S Gollakota","year":"2011","unstructured":"Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., Fu, K.: They can hear your heartbeats: non-invasive security for implantable medical devices. ACM SIGCOMM Comput. Commun. Rev. 41(4), 2\u201313 (2011)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., Fu, K.: They can hear your heartbeats: non-invasive security for implantable medical devices. In: ACM SIGCOMM (2011)","DOI":"10.1145\/2018436.2018438"},{"key":"6_CR18","unstructured":"Gupta, S.: Dick cheney\u2019s heart, October 2013. \nhttp:\/\/www.cbsnews.com\/news\/dick-cheneys-heart\/"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Halperin, D., et al.: Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses. In: IEEE S&P (2008)","DOI":"10.1109\/SP.2008.31"},{"issue":"9","key":"6_CR20","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"F Hao","year":"2006","unstructured":"Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Trans. Comput. 55(9), 1081\u20131088 (2006)","journal-title":"IEEE Trans. Comput."},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Hei, X., Du, X.: Biometric-based two-level secure access control for implantable medical devices during emergencies. In: IEEE INFOCOM (2011)","DOI":"10.1109\/INFCOM.2011.5935179"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Hei, X., Du, X., Lin, S., Lee, I.: PIPAC: patient infusion pattern based access control scheme for wireless insulin pump system. In: 2013 Proceedings IEEE INFOCOM, pp. 3030\u20133038. IEEE (2013)","DOI":"10.1109\/INFCOM.2013.6567115"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Hei, X., Du, X., Wu, J., Hu, F.: Defending resource depletion attacks on implantable medical devices. In: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp. 1\u20135. IEEE (2010)","DOI":"10.1109\/GLOCOM.2010.5685228"},{"issue":"9","key":"6_CR24","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.1109\/TC.2008.212","volume":"58","author":"DE Holcomb","year":"2009","unstructured":"Holcomb, D.E., Burleson, W.P., Fu, K.: Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Trans. Comput. 58(9), 1198\u20131210 (2009)","journal-title":"IEEE Trans. Comput."},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Hu, C., Cheng, X., Zhang, F., Wu, D., Liao, X., Chen, D.: OPFKA: secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In: IEEE INFOCOM (2013)","DOI":"10.1109\/INFCOM.2013.6567031"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Karpinskyy, B., Lee, Y., Choi, Y., Kim, Y., Noh, M., Lee, S.: 8.7 physically unclonable function for secure key generation with a key error rate of 2E-38 in 45nm smart-card chips. In: 2016 IEEE International Solid-State Circuits Conference (ISSCC), pp. 158\u2013160. IEEE (2016)","DOI":"10.1109\/ISSCC.2016.7417955"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Kazmi, A.R., Afzal, M., Amjad, M.F., Abbas, H., Yang, X.: Algebraic side channel attack on trivium and grain ciphers. IEEE Access (2017)","DOI":"10.1109\/COMTECH.2017.8065763"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Kohli, N., Yadav, D., Vatsa, M., Singh, R., Noore, A.: Detecting medley of iris spoofing attacks using desist. In: 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/BTAS.2016.7791168"},{"key":"6_CR29","unstructured":"Li, C., Raghunathan, A., Jha, N.K.: Hijacking an insulin pump: security attacks and defenses for a diabetes therapy system. In: IEEE HealthCom (2011)"},{"issue":"10","key":"6_CR30","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"D Lim","year":"2005","unstructured":"Lim, D., Lee, J.W., Gassend, B., Suh, G.E., Van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 13(10), 1200\u20131205 (2005)","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"6_CR31","unstructured":"Min, B.J., et al.: An embedded nonvolatile FRAM with electrical fuse repair scheme and one time programming scheme for high performance smart cards. In: 2005 Proceedings of the IEEE Custom Integrated Circuits Conference, pp. 255\u2013258. IEEE (2005)"},{"issue":"11","key":"6_CR32","first-page":"2519","volume":"85","author":"C Ming-Chien","year":"2002","unstructured":"Ming-Chien, C., Chi-Wei, K.: Stolen-verifier attack on two new strong-password authentication protocols. IEICE Trans. Commun. 85(11), 2519\u20132521 (2002)","journal-title":"IEICE Trans. Commun."},{"key":"6_CR33","unstructured":"Pope, A., Bouxsein, P., Manning, F.J., Hanna, K.E., et\u00a0al.: Innovation and invention in medical devices: workshop summary. National Academies Press (2001)"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Potestad-Ord\u00f3\u00f1ez, F., Jim\u00e9nez-Fern\u00e1ndez, C.J., Valencia-Barrero, M.: Fault attack on FPGA implementations of trivium stream cipher. In: 2016 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 562\u2013565. IEEE (2016)","DOI":"10.1109\/ISCAS.2016.7527302"},{"issue":"8","key":"6_CR35","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1016\/j.jss.2010.01.015","volume":"83","author":"A Prayati","year":"2010","unstructured":"Prayati, A., Antonopoulos, C., Stoyanova, T., Koulamas, C., Papadopoulos, G.: A modeling approach on the TelosB WSN platform power consumption. J. Syst. Softw. 83(8), 1355\u20131363 (2010)","journal-title":"J. Syst. Softw."},{"key":"6_CR36","unstructured":"Radcliffe, J.: Hacking medical devices for fun and insulin: breaking the human SCADA system. In: Black Hat Conference Presentation Slides, vol. 2011 (2011)"},{"key":"6_CR37","unstructured":"Ravikanth, P.S.: Physical one-way functions. Ph.D. thesis, Massachusetts Institute Of Technology (2001)"},{"key":"6_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-68351-3_1","volume-title":"New Stream Cipher Designs","author":"M Robshaw","year":"2008","unstructured":"Robshaw, M.: The eSTREAM project. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 1\u20136. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-68351-3_1"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Rostami, M., Burleson, W., Juels, A., Koushanfar, F.: Balancing security and utility in medical devices? In: IEEE Design Automation Conference (DAC) (2013)","DOI":"10.1145\/2463209.2488750"},{"key":"6_CR40","doi-asserted-by":"crossref","unstructured":"Rostami, M., Juels, A., Koushanfar, F.: Heart-to-heart (H2H): authentication for implanted medical devices. In: ACM CCS (2013)","DOI":"10.1145\/2508859.2516658"},{"key":"6_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-642-15031-9_11","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"S Skorobogatov","year":"2010","unstructured":"Skorobogatov, S.: Flash Memory \u2018Bumping\u2019 Attacks. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 158\u2013172. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-15031-9_11"},{"key":"6_CR42","doi-asserted-by":"crossref","unstructured":"Somov, A., Minakov, I., Simalatsar, A., Fontana, G., Passerone, R.: A methodology for power consumption evaluation of wireless sensor networks. In: 2009 IEEE Conference on Emerging Technologies & Factory Automation, ETFA 2009, pp. 1\u20138. IEEE (2009)","DOI":"10.1109\/ETFA.2009.5347152"},{"key":"6_CR43","unstructured":"Wei, Z., Qiu, X., Sun, Z., Tan, T.: Counterfeit iris detection based on texture analysis. In: 2008 19th International Conference on Pattern Recognition, ICPR 2008, pp. 1\u20134. IEEE (2008)"},{"key":"6_CR44","doi-asserted-by":"publisher","first-page":"14757","DOI":"10.1109\/ACCESS.2017.2730843","volume":"5","author":"Q Xia","year":"2017","unstructured":"Xia, Q., Sifah, E.B., Asamoah, K.O., Gao, J., Du, X., Guizani, M.: MeDShare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5, 14757\u201314767 (2017)","journal-title":"IEEE Access"},{"issue":"11\u201312","key":"6_CR45","doi-asserted-by":"publisher","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","volume":"30","author":"Y Xiao","year":"2007","unstructured":"Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Comput. Commun. 30(11\u201312), 2314\u20132341 (2007)","journal-title":"Comput. Commun."},{"key":"6_CR46","unstructured":"Xu, F., Qin, Z., Tan, C.C., Wang, B., Li, Q.: IMDGuard: securing implantable medical devices with the external wearable guardian. In: INFOCOM, 2011 Proceedings IEEE, pp. 1862\u20131870. IEEE (2011)"},{"key":"6_CR47","doi-asserted-by":"crossref","unstructured":"Zheng, G., Fang, G., Orgun, M.A., Shankaran, R.: A non-key based security scheme supporting emergency treatment of wireless implants. In: IEEE ICC (2014)","DOI":"10.1109\/ICC.2014.6883392"},{"issue":"99","key":"6_CR48","first-page":"655","volume":"PP","author":"G Zheng","year":"2016","unstructured":"Zheng, G., et al.: Multiple ECG fiducial points based random binary sequence generation for securing wireless body area networks. IEEE J. Biomed. Health Inform. PP(99), 655\u2013663 (2016)","journal-title":"IEEE J. Biomed. Health Inform."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37228-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T10:05:14Z","timestamp":1576490714000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37228-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030372279","9783030372286"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37228-6_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"13 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}