{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:13:30Z","timestamp":1742912010124,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319455068"},{"type":"electronic","value":"9783319455075"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45507-5_9","type":"book-chapter","created":{"date-parts":[[2016,8,22]],"date-time":"2016-08-22T11:11:04Z","timestamp":1471864264000},"page":"124-140","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient Construction of a Compression Function for Cryptographic Hash"],"prefix":"10.1007","author":[{"given":"Rashed","family":"Mazumder","sequence":"first","affiliation":[]},{"given":"Atsuko","family":"Miyaji","sequence":"additional","affiliation":[]},{"given":"Chunhua","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,23]]},"reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-540-85053-3_18","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"A Bogdanov","year":"2008","unstructured":"Bogdanov, A., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y.: Hash functions and RFID tags: mind the gap. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 283\u2013299. Springer, Heidelberg (2008)"},{"key":"9_CR2","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"2001","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography, 5th edn. CRC Press, Boca Raton (2001)","edition":"5"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/11807964_38","volume-title":"Emerging Directions in Embedded and Ubiquitous Computing","author":"J-P Kaps","year":"2006","unstructured":"Kaps, J.-P., Sunar, B.: Energy comparison of AES and SHA-1 for ubiquitous computing. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D.Y., Jeong, Y.-S., Xu, C.-Z. (eds.) EUC Workshops 2006. LNCS, vol. 4097, pp. 372\u2013381. Springer, Heidelberg (2006)"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11426639_1","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X Wang","year":"2005","unstructured":"Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the hash functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1\u201318. Springer, Heidelberg (2005)"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/11535218_2","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X Wang","year":"2005","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17\u201336. Springer, Heidelberg (2005)"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/978-3-642-31448-3_12","volume-title":"Information Security and Privacy","author":"E Fleischmann","year":"2012","unstructured":"Fleischmann, E., Forler, C., Lucks, S., Wenzel, J.: Weimar-DM: a highly secure double-length compression function. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol. 7372, pp. 152\u2013165. Springer, Heidelberg (2012)"},{"issue":"17","key":"9_CR7","doi-asserted-by":"publisher","first-page":"2967","DOI":"10.1016\/j.comnet.2010.05.011","volume":"54","author":"J Lee","year":"2010","unstructured":"Lee, J., Kapitanova, K., Son, S.H.: The price of security in wireless sensor networks. Comput. Netw. 54(17), 2967\u20132978 (2010). Elsevier","journal-title":"Comput. Netw."},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-10868-6_11","volume-title":"Cryptography and Coding","author":"O \u00d6zen","year":"2009","unstructured":"\u00d6zen, O., Stam, M.: Another glance at double-length hashing. In: Parker, M.G. (ed.) Cryptography and Coding 2009. LNCS, vol. 5921, pp. 176\u2013201. Springer, Heidelberg (2009)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-642-19074-2_15","volume-title":"Topics in Cryptology \u2013 CT-RSA 2011","author":"J Lee","year":"2011","unstructured":"Lee, J., Stam, M.: MJH: a faster alternative to MDC-2. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 213\u2013236. Springer, Heidelberg (2011)"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/3-540-47555-9_5","volume-title":"Advances in Cryptology - EUROCRYPT \u201992","author":"X Lai","year":"1993","unstructured":"Lai, X., Massey, J.L.: Hash functions based on block ciphers. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 55\u201370. Springer, Heidelberg (1993)"},{"issue":"1","key":"9_CR11","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1587\/transfun.E94.A.104","volume":"94\u2013A","author":"J Lee","year":"2011","unstructured":"Lee, J., Kwon, D.: The security of abreast-DM in the ideal cipher model. IEICE Trans. 94\u2013A(1), 104\u2013109 (2011)","journal-title":"IEICE Trans."},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-642-22792-9_32","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"J Lee","year":"2011","unstructured":"Lee, J., Stam, M., Steinberger, J.: The collision security of Tandem-DM in the ideal cipher model. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 561\u2013577. Springer, Heidelberg (2011)"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/11799313_14","volume-title":"Fast Software Encryption","author":"S Hirose","year":"2006","unstructured":"Hirose, S.: Some plausible constructions of double-block-length hash functions. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 210\u2013225. Springer, Heidelberg (2006)"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-642-25385-0_13","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"F Armknecht","year":"2011","unstructured":"Armknecht, F., Fleischmann, E., Krause, M., Lee, J., Stam, M., Steinberger, J.: The preimage security of double-block-length compression functions. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 233\u2013251. Springer, Heidelberg (2011)"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1007\/978-3-642-34961-4_32","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"B Mennink","year":"2012","unstructured":"Mennink, B.: Optimal collision security in double block length hashing with single length key. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 526\u2013543. Springer, Heidelberg (2012)"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/3-540-45708-9_21","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"JA Black","year":"2002","unstructured":"Black, J.A., Rogaway, P., Shrimpton, T.: Black-box analysis of the block-cipher-based hash-function constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 320\u2013335. Springer, Heidelberg (2002)"},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s00145-010-9071-0","volume":"23","author":"J Black","year":"2010","unstructured":"Black, J., Rogaway, P., Shrimpton, T., Stam, M.: An analysis of the blockcipher-based hash functions from PGV. J. Cryptol. 23, 519\u2013545 (2010)","journal-title":"J. Cryptol."},{"issue":"1","key":"9_CR18","first-page":"251","volume":"95A","author":"S Hirose","year":"2012","unstructured":"Hirose, S., Kuwakado, H.: Collision resistance of hash functions in a weak ideal cipher model. IEICE Trans. 95A(1), 251\u2013255 (2012)","journal-title":"IEICE Trans."},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-540-74462-7_25","volume-title":"Selected Areas in Cryptography","author":"M Liskov","year":"2007","unstructured":"Liskov, M.: Constructing an ideal hash function from weak ideal compression functions. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 358\u2013375. Springer, Heidelberg (2007)"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/11502760_16","volume-title":"Fast Software Encryption","author":"M Nandi","year":"2005","unstructured":"Nandi, M., Lee, W.I., Sakurai, K., Lee, S.-J.: Security analysis of a 2\/3-Rate double length compression function in the black-box model. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 243\u2013254. Springer, Heidelberg (2005)"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-02617-1_2","volume-title":"Advances in Information Security and Assurance","author":"J Lee","year":"2009","unstructured":"Lee, J., Hong, S., Sung, J., Park, H.: A new double-block-length hash function using feistel structure. In: Park, J.H., Chen, H.-H., Atiquzzaman, M., Lee, C., Kim, T., Yeo, S.-S. (eds.) ISA 2009. LNCS, vol. 5576, pp. 11\u201320. Springer, Heidelberg (2009)"},{"issue":"4","key":"9_CR22","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"128","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 128(4), 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Miyaji, A., Mazumder, R.: A new (n, 2n) double block length hash function based on single key scheduling. In: IEEE Explore, AINA, pp. 564\u2013570 (2015)","DOI":"10.1109\/AINA.2015.237"},{"key":"9_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/978-3-319-06734-6_26","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2014","author":"F Abed","year":"2014","unstructured":"Abed, F., Forler, C., List, E., Lucks, S., Wenzel, J.: Counter-bDM: a provably secure family of multi-block-length compression functions. In: Pointcheval, D., Vergnaud, D. (eds.) AFRICACRYPT. LNCS, vol. 8469, pp. 440\u2013458. Springer, Heidelberg (2014)"},{"key":"9_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/11535218_26","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"J-S Coron","year":"2005","unstructured":"Coron, J.-S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-Damg\u00e5rd revisited: how to construct a hash function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 430\u2013448. Springer, Heidelberg (2005)"},{"key":"9_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/11681878_10","volume-title":"Theory of Cryptography","author":"Y Dodis","year":"2006","unstructured":"Dodis, Y., Puniya, P.: On the relation between the ideal cipher and the random oracle models. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 184\u2013206. Springer, Heidelberg (2006)"},{"key":"9_CR27","volume-title":"The Design of Rijndael, AES-The Advanced Encryption Standard","author":"D Joan","year":"2002","unstructured":"Joan, D., Vincent, R.: The Design of Rijndael, AES-The Advanced Encryption Standard. Springer, Heidelberg (2002). ISBN: 978-3-662-04722-4"},{"key":"9_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-642-45239-0_13","volume-title":"Cryptography and Coding","author":"H Kuwakado","year":"2013","unstructured":"Kuwakado, H., Hirose, S.: Hashing mode using a lightweight blockcipher. In: Stam, M. (ed.) IMACC 2013. LNCS, vol. 8308, pp. 213\u2013231. Springer, Heidelberg (2013)"},{"key":"9_CR29","series-title":"Lecture Notes in Computer Science(LNAI)","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-319-19369-4_18","volume-title":"Artificial Intelligence and Soft Computing","author":"D Burak","year":"2015","unstructured":"Burak, D.: Parallelization of a block cipher based on chaotic neural networks. In: Rutkowski, L., et al. (eds.) ICAISC 2015, Part II. LNCS(LNAI), vol. 9120, pp. 191\u2013201. Springer, Switzerland (2015)"},{"key":"9_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/978-3-642-23951-9_33","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"JW Bos","year":"2011","unstructured":"Bos, J.W., \u00d6zen, O., Stam, M.: Efficient hashing using the AES instruction set. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 507\u2013522. Springer, Heidelberg (2011)"},{"issue":"4","key":"9_CR31","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1587\/transinf.2015ICP0028","volume":"99\u2013D","author":"R Mazumder","year":"2016","unstructured":"Mazumder, R., Miyaji, A.: A new scheme of blockcipher hash. IEICE Trans. 99\u2013D(4), 796\u2013804 (2016)","journal-title":"IEICE Trans."},{"key":"9_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-642-01001-9_6","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"LR Knudsen","year":"2009","unstructured":"Knudsen, L.R., Mendel, F., Rechberger, C., Thomsen, S.S.: Cryptanalysis of MDC-2. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 106\u2013120. Springer, Heidelberg (2009)"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Miyaji, A., Mazumder, R., Sawada, T.: A new (n, n) blockcipher hash function: apposite for short messages. In: IEEE Explore, Asia JCIS, pp. 56\u201363 (2014)","DOI":"10.1109\/AsiaJCIS.2014.27"},{"key":"9_CR34","series-title":"Lecture Notes in Computer Science","first-page":"207","volume-title":"Risks and Security of Internet and Systems","author":"R Mazumder","year":"2015","unstructured":"Mazumder, R., Miyaji, A.: A single key scheduling based compression function. In: Lambrinoudakis, C., Gabillon, A. (eds.) CRiSIS 2015. LNCS, vol. 9572, pp. 207\u2013222. Springer, Switzerland (2015)"},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"Barreto, L., Celesti, A., Villari, M., Fazio, M., Puliafito, A.: An authentication model for IoT clouds. In: IEEE Explore, ASONAM, pp. 1032\u20131035 (2015)","DOI":"10.1145\/2808797.2809361"},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"Riahi, A., Natalizio, E., Challal, Y., Mitton, N., Iera, A.: A systemic and cognitive approach for IoT security. In: IEEE Explore, ICNC, pp. 183\u2013188 (2014)","DOI":"10.1109\/ICCNC.2014.6785328"},{"key":"9_CR37","doi-asserted-by":"crossref","unstructured":"Lee, J.Y., Huang, Y.H.: A lightweight authentication protocol for internet of things. In: IEEE Explore, ISNE, pp. 1\u20132 (2014)","DOI":"10.1109\/ISNE.2014.6839375"},{"issue":"8","key":"9_CR38","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing, Q., Vasilakos, A.V., Wan, J.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481\u20132501 (2014). Springer","journal-title":"Wirel. Netw."},{"key":"9_CR39","doi-asserted-by":"crossref","unstructured":"Abomhara, M., Kien, G.M.: Security and privacy in the internet of things: current status and open issues. In: IEEE Explore, PRIMS, pp. 1\u20138 (2014)","DOI":"10.1109\/PRISMS.2014.6970594"},{"issue":"1","key":"9_CR40","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"A Zanella","year":"2014","unstructured":"Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22\u201332 (2014)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"9_CR41","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"LD Xu","year":"2014","unstructured":"Xu, L.D., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Ind. Inf. 10(4), 2233\u20132243 (2014)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"9_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-24209-0_10","volume-title":"Information Security and Cryptology - ICISC 2010","author":"S Hirose","year":"2011","unstructured":"Hirose, S., Ideguchi, K., Kuwakado, H., Owada, T., Preneel, B., Yoshida, H.: A lightweight 256-Bit hash function for hardware and low-end devices: Lesamnta-LW. In: Rhee, K.-H., Nyang, D.H. (eds.) ICISC 2010. LNCS, vol. 6829, pp. 151\u2013168. Springer, Heidelberg (2011)"},{"key":"9_CR43","doi-asserted-by":"crossref","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit Blockcipher CLEFIA, IACR archive, Extended Abstract. https:\/\/www.iacr.org\/archive\/fse2007\/45930182\/45930182.pdf","DOI":"10.1007\/978-3-540-74619-5_12"},{"key":"9_CR44","unstructured":"Yoshida, H.: On the standardization of cryptographic application techniques for IoT devices in ITU techniques for IoT devices in ITU-T and ISO\/IEC JTC 1 T and ISO\/IEC JTC1 (2015). https:\/\/www.ietf.org\/proceedings\/94\/slides\/slides-94-saag-2.pdf"},{"key":"9_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-642-31410-0_16","volume-title":"Progress in Cryptology - AFRICACRYPT 2012","author":"E Fleischmann","year":"2012","unstructured":"Fleischmann, E., Forler, C., Lucks, S.: The collision security of MDC-4. In: Mitrokotsa, A., Vaudenay, S. (eds.) AFRICACRYPT 2012. LNCS, vol. 7374, pp. 252\u2013269. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability, and Security in Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45507-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,6]],"date-time":"2022-07-06T21:02:55Z","timestamp":1657141375000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45507-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319455068","9783319455075"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45507-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"23 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CD-ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salzburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ieeeares2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}