{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T05:58:51Z","timestamp":1771480731614,"version":"3.50.1"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030904272","type":"print"},{"value":"9783030904289","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-90428-9_5","type":"book-chapter","created":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T07:02:54Z","timestamp":1635577374000},"page":"102-128","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE"],"prefix":"10.1007","author":[{"given":"Itzel","family":"Vazquez Sandoval","sequence":"first","affiliation":[]},{"given":"Arash","family":"Atashpendar","sequence":"additional","affiliation":[]},{"given":"Gabriele","family":"Lenzini","sequence":"additional","affiliation":[]},{"given":"Peter Y. A.","family":"Ryan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,31]]},"reference":[{"key":"5_CR1","unstructured":"Abdalla, M., Barbosa, M.: Perfect forward security of SPAKE2. Cryptology ePrint Archive, Report 2019\/1194 (2019). https:\/\/eprint.iacr.org\/2019\/1194"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-540-30574-3_14","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"M Abdalla","year":"2005","unstructured":"Abdalla, M., Pointcheval, D.: Simple password-based encrypted key exchange protocols. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 191\u2013208. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-30574-3_14"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Alexander, C., Goldberg, I.: Improved user authentication in off-the-record messaging. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society. ACM (2007)","DOI":"10.1145\/1314333.1314340"},{"key":"5_CR4","unstructured":"Atashpendar, A., Vazquez Sandoval, I.: PakeMail (2020). https:\/\/github.com\/CryptographySandbox\/PakeMail"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-030-40186-3_10","volume-title":"Topics in Cryptology \u2013 CT-RSA 2020","author":"G Avoine","year":"2020","unstructured":"Avoine, G., Canard, S., Ferreira, L.: Symmetric-Key Authenticated Key Exchange (SAKE) with perfect forward secrecy. In: Jarecki, S. (ed.) CT-RSA 2020. LNCS, vol. 12006, pp. 199\u2013224. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-40186-3_10"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Bagherzandi, A., Jarecki, S., Saxena, N., Lu, Y.: Password-protected secret sharing. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 433\u2013444 (2011)","DOI":"10.1145\/2046707.2046758"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/978-3-030-01446-9_21","volume-title":"Provable Security","author":"J Becerra","year":"2018","unstructured":"Becerra, J., Ostrev, D., \u0160krobot, M.: Forward secrecy of SPAKE2. In: Baek, J., Susilo, W., Kim, J. (eds.) ProvSec 2018. LNCS, vol. 11192, pp. 366\u2013384. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01446-9_21"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139\u2013155. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45539-6_11"},{"key":"5_CR9","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 72\u201384. IEEE Computer Society (1992)"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11745853_14","volume-title":"Public Key Cryptography - PKC 2006","author":"DJ Bernstein","year":"2006","unstructured":"Bernstein, D.J.: Curve25519: new Diffie-Hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207\u2013228. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11745853_14"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Fournet, C., Kohlweiss, M., Pironti, A., Strub, P.Y.: Implementing TLS with verified cryptographic security. In: 2013 IEEE Symposium on Security and Privacy, pp. 445\u2013459. IEEE (2013)","DOI":"10.1109\/SP.2013.37"},{"key":"5_CR12","unstructured":"Birk, V., Marques, H., Hoeneisen, B.: pEp Foundation: IANA registration of trustword lists (2019). https:\/\/tools.ietf.org\/html\/draft-birk-pep-trustwords-03"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Borisov, N., Goldberg, I., Brewer, E.: Off-the-record communication, or, why not to use PGP. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society (2004)","DOI":"10.1145\/1029179.1029200"},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/S0166-218X(00)00342-5","volume":"111","author":"F Boudot","year":"2001","unstructured":"Boudot, F., Schoenmakers, B., Traore, J.: A fair and efficient solution to the socialist millionaires\u2019 problem. Discrete Appl. Math. 111, 23\u201336 (2001)","journal-title":"Discrete Appl. Math."},{"key":"5_CR15","unstructured":"Clark, J., van Oorschot, P.C., Ruoti, S., Seamons, K., Zappala, D.: Securing email. arXiv preprint arXiv:1804.07706 (2018)"},{"key":"5_CR16","unstructured":"Couteau, G., Roscoe, A.W., Ryan, P.Y.A.: Partially-fair computation from timed-release encryption and oblivious transfer. Cryptology ePrint Archive, Report 2019\/1281 (2019). https:\/\/eprint.iacr.org\/2019\/1281"},{"key":"5_CR17","unstructured":"Dechand, S., Sch\u00fcrmann, D., Busse, K., Acar, Y., Fahl, S., Smith, M.: An empirical study of textual key-fingerprint representations. In: 25th $$\\{$$USENIX$$\\}$$ Security Symposium, pp. 193\u2013208 (2016)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Delaune, S., Kremer, S., Robin, L.: Formal verification of protocols based on short authenticated strings. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp. 130\u2013143. IEEE (2017)","DOI":"10.1109\/CSF.2017.26"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Di Raimondo, M., Gennaro, R., Krawczyk, H.: Deniable authentication and key exchange. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 400\u2013409 (2006)","DOI":"10.1145\/1180405.1180454"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-319-52153-4_11","volume-title":"Topics in Cryptology \u2013 CT-RSA 2017","author":"J Ding","year":"2017","unstructured":"Ding, J., Alsayigh, S., Lancrenon, J., RV, S., Snook, M.: Provably secure password authenticated key exchange based on RLWE for the post-quantum world. In: Handschuh, H. (ed.) CT-RSA 2017. LNCS, vol. 10159, pp. 183\u2013204. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52153-4_11"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. In: Proceedings of the 22Nd Annual Symposium on Foundations of Computer Science, SFCS 1981, pp. 350\u2013357. IEEE Computer Society (1981)","DOI":"10.1109\/SFCS.1981.32"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Fischlin, M., G\u00fcnther, F., Schmidt, B., Warinschi, B.: Key confirmation in key exchange: a formal treatment and implications for TLS 1.3. In: 2016 IEEE Symposium on Security and Privacy (SP). IEEE (2016)","DOI":"10.1109\/SP.2016.34"},{"key":"5_CR23","first-page":"9","volume":"2004","author":"JA Garay","year":"2004","unstructured":"Garay, J.A., MacKenzie, P.D., Yang, K.: Efficient and secure multi-party computation with faulty majority and complete fairness. IACR Cryptol. ePrint Arch. 2004, 9 (2004)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-642-17697-5_10","volume-title":"Transactions on Computational Science XI","author":"F Hao","year":"2010","unstructured":"Hao, F., Ryan, P.: J-PAKE: authenticated key exchange without PKI. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds.) Transactions on Computational Science XI. LNCS, vol. 6480, pp. 192\u2013206. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17697-5_10"},{"key":"5_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/978-3-319-78372-7_15","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"S Jarecki","year":"2018","unstructured":"Jarecki, S., Krawczyk, H., Xu, J.: OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10822, pp. 456\u2013486. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78372-7_15"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Kainda, R., Flechais, I., Roscoe, A.: Usability and security of out-of-band channels in secure device pairing protocols. In: Proceedings of the 5th Symposium on Usable Privacy and Security, p. 11. ACM (2009)","DOI":"10.1145\/1572532.1572547"},{"key":"5_CR27","first-page":"10","volume":"2010","author":"R Kainda","year":"2010","unstructured":"Kainda, R., Flechais, I., Roscoe, A.: Secure mobile ad-hoc interactions: reasoning about out-of-band (OOB) channels. IWSSI\/SPMU 2010, 10\u201315 (2010)","journal-title":"IWSSI\/SPMU"},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-642-19571-6_18","volume-title":"Theory of Cryptography","author":"J Katz","year":"2011","unstructured":"Katz, J., Vaikuntanathan, V.: Round-optimal password-based authenticated key exchange. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 293\u2013310. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19571-6_18"},{"key":"5_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/978-3-642-14623-7_34","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"H Krawczyk","year":"2010","unstructured":"Krawczyk, H.: Cryptographic extraction and key derivation: the HKDF scheme. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 631\u2013648. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14623-7_34"},{"issue":"6","key":"5_CR30","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1016\/j.pmcj.2009.07.008","volume":"5","author":"A Kumar","year":"2009","unstructured":"Kumar, A., Saxena, N., Tsudik, G., Uzun, E.: A comparative study of secure device pairing methods. Pervasive Mob. Comput. 5(6), 734\u2013749 (2009)","journal-title":"Pervasive Mob. Comput."},{"key":"5_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/978-3-030-03810-6_21","volume-title":"Theory of Cryptography","author":"M Naor","year":"2018","unstructured":"Naor, M., Rotem, L., Segev, G.: The security of lazy users in out-of-band authentication. In: Beimel, A., Dziembowski, S. (eds.) TCC 2018. LNCS, vol. 11240, pp. 575\u2013599. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03810-6_21"},{"issue":"1","key":"5_CR32","doi-asserted-by":"publisher","first-page":"139","DOI":"10.3233\/JCS-2010-0403","volume":"19","author":"LH Nguyen","year":"2011","unstructured":"Nguyen, L.H., Roscoe, A.W.: Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey. J. Comput. Secur. 19(1), 139\u2013201 (2011)","journal-title":"J. Comput. Secur."},{"key":"5_CR33","unstructured":"OTRv4-development: Specification of OTR version 4, October 2019. https:\/\/github.com\/otrv4\/otrv4\/blob\/master\/otrv4.md"},{"key":"5_CR34","unstructured":"pEp Security: Pretty Easy Privacy (pEp). https:\/\/www.pep.security"},{"key":"5_CR35","unstructured":"Microsoft Research, I.: F* (2020). https:\/\/fstar-lang.org\/"},{"issue":"4","key":"5_CR36","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1145\/358027.358053","volume":"27","author":"RL Rivest","year":"1984","unstructured":"Rivest, R.L., Shamir, A.: How to expose an eavesdropper. Commun. ACM 27(4), 393\u2013394 (1984)","journal-title":"Commun. ACM"},{"key":"5_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-319-62033-6_22","volume-title":"Security Protocols XXIV","author":"AW Roscoe","year":"2017","unstructured":"Roscoe, A.W.: Detecting failed attacks on human-interactive security protocols (transcript of discussion). In: Anderson, J., Maty\u00e1\u0161, V., Christianson, B., Stajano, F. (eds.) Security Protocols 2016. LNCS, vol. 10368, pp. 198\u2013205. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-62033-6_22"},{"key":"5_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-319-71075-4_31","volume-title":"Security Protocols XXV","author":"AW Roscoe","year":"2017","unstructured":"Roscoe, A.W., Ryan, P.Y.A.: Auditable PAKEs: approaching fair exchange without a TTP. In: Stajano, F., Anderson, J., Christianson, B., Maty\u00e1\u0161, V. (eds.) Security Protocols 2017. LNCS, vol. 10476, pp. 278\u2013297. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71075-4_31"},{"key":"5_CR39","unstructured":"Ruoti, S., Andersen, J., Monson, T., Zappala, D., Seamons, K.: A comparative usability study of key management in secure email. In: Fourteenth Symposium on Usable Privacy and Security, pp. 375\u2013394 (2018)"},{"key":"5_CR40","unstructured":"Sasson, E.B., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459\u2013474 (2014)"},{"key":"5_CR41","doi-asserted-by":"crossref","unstructured":"Shirvanian, M., Saxena, N.: Wiretapping via mimicry: short voice imitation man-in-the-middle attacks on crypto phones. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 868\u2013879 (2014)","DOI":"10.1145\/2660267.2660274"},{"key":"5_CR42","unstructured":"Signal: Improving registration lock with secure value recovery, February 2020. https:\/\/signal.org\/blog\/improving-registration-lock"},{"key":"5_CR43","unstructured":"Signal: Technology preview for secure value recovery (2020). https:\/\/signal.org\/blog\/secure-value-recovery"},{"key":"5_CR44","doi-asserted-by":"crossref","unstructured":"Stedman, R., Yoshida, K., Goldberg, I.: A user study of off-the-record messaging. In: 4th Symposium on Usable Privacy and Security, pp. 95\u2013104 (2008)","DOI":"10.1145\/1408664.1408678"},{"key":"5_CR45","doi-asserted-by":"crossref","unstructured":"Tan, J., Bauer, L., Bonneau, J., Cranor, L.F., Thomas, J., Ur, B.: Can unicorns help users compare crypto key fingerprints? In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 3787\u20133798. ACM (2017)","DOI":"10.1145\/3025453.3025733"},{"key":"5_CR46","doi-asserted-by":"crossref","unstructured":"Unger, N., et al.: SoK: secure messaging. In: 2015 IEEE Symposium on Security and Privacy, pp. 232\u2013249. IEEE (2015)","DOI":"10.1109\/SP.2015.22"},{"key":"5_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/11535218_19","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"S Vaudenay","year":"2005","unstructured":"Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309\u2013326. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11535218_19"},{"key":"5_CR48","doi-asserted-by":"crossref","unstructured":"Vazquez\u00a0Sandoval, I., Atashpendar, A., Lenzini, G.: Authentication and key management automation in decentralized secure email and messaging via low-entropy secrets. In: Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France (2020)","DOI":"10.5220\/0009834001670179"},{"key":"5_CR49","unstructured":"Warner, B.: Pure-Python SPAKE2 (2010). https:\/\/github.com\/warner\/python-spake2"},{"key":"5_CR50","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science (SFCS 1982), pp. 160\u2013164. IEEE (1982)","DOI":"10.1109\/SFCS.1982.38"}],"container-title":["Communications in Computer and Information Science","E-Business and Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-90428-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T07:03:13Z","timestamp":1635577393000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-90428-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030904272","9783030904289"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-90428-9_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"31 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICETE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on E-Business and Telecommunications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icete2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icete.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Primoris","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"177","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}