{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:48:11Z","timestamp":1767340091997,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,9,22]],"date-time":"2008-09-22T00:00:00Z","timestamp":1222041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0524286"],"award-info":[{"award-number":["CNS-0524286"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,9,22]]},"DOI":"10.1145\/1460877.1460908","type":"proceedings-article","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T17:33:43Z","timestamp":1254159223000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Voice pharming attack and the trust of VoIP"],"prefix":"10.1145","author":[{"given":"Xinyuan","family":"Wang","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Ruishan","family":"Zhang","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Xiaohui","family":"Yang","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Xuxian","family":"Jiang","sequence":"additional","affiliation":[{"name":"N.C. State University, Raleigh, NC"}]},{"given":"Duminda","family":"Wijesekera","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA"}]}],"member":"320","published-online":{"date-parts":[[2008,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IETF","author":"Andreasen F.","year":"2003","unstructured":"F. Andreasen and B. Foster . Media Gateway Control Protocol (MGCP) Version 1.0. RFC 3435 , IETF , January 2003 . F. Andreasen and B. Foster. Media Gateway Control Protocol (MGCP) Version 1.0. RFC 3435, IETF, January 2003."},{"key":"e_1_3_2_1_2_1","unstructured":"Anti-Phishing Working Group. Consumer Advice: How to Avoid Phishing Scams. http:\/\/www.antiphishing.org\/consumer_recs.html  Anti-Phishing Working Group. Consumer Advice: How to Avoid Phishing Scams. http:\/\/www.antiphishing.org\/consumer_recs.html"},{"key":"e_1_3_2_1_3_1","volume-title":"IETF","author":"Arkko J.","year":"2003","unstructured":"J. Arkko , V. Torvinen , G. Camarillo , A. Niemi and T. Haukka . Security Mechanism Agreement for the Session Initiation Protocol (SIP). RFC 3329 , IETF , January 2003 . J. Arkko, V. Torvinen, G. Camarillo, A. Niemi and T. Haukka. Security Mechanism Agreement for the Session Initiation Protocol (SIP). RFC 3329, IETF, January 2003."},{"key":"e_1_3_2_1_4_1","unstructured":"ABI Study Predicts 267 Million Residential VoIP Subscribers Worldwide by 2012. P. Barnard. http:\/\/www.tmcnet.com\/voip\/ip-communications\/articles\/4824-abi-study-predicts-267-million- residential-voip-subscribers.htm.  ABI Study Predicts 267 Million Residential VoIP Subscribers Worldwide by 2012. P. Barnard. http:\/\/www.tmcnet.com\/voip\/ip-communications\/articles\/4824-abi-study-predicts-267-million- residential-voip-subscribers.htm."},{"key":"e_1_3_2_1_6_1","unstructured":"Report: Cable VoIP Market Set to Surge. M. Perez. http:\/\/www.voip-news.com\/news\/cable-voip-market-report-080406\/.  Report: Cable VoIP Market Set to Surge. M. Perez. http:\/\/www.voip-news.com\/news\/cable-voip-market-report-080406\/."},{"key":"e_1_3_2_1_7_1","volume-title":"IETF","author":"Dierks T.","year":"1999","unstructured":"T. Dierks and C. Allen . The TLS Protocol. RFC 2246 , IETF , January 1999 T. Dierks and C. Allen. The TLS Protocol. RFC 2246, IETF, January 1999"},{"key":"e_1_3_2_1_8_1","unstructured":"Dsniff. http:\/\/www.monkey.org\/dugsong\/dsniff\/  Dsniff. http:\/\/www.monkey.org\/dugsong\/dsniff\/"},{"key":"e_1_3_2_1_9_1","unstructured":"John E. Dunn. Expert scares world with VoIP hacking proof. http:\/\/www.techworld.com\/security\/news\/index.cfm?newsid=10736  John E. Dunn. Expert scares world with VoIP hacking proof. http:\/\/www.techworld.com\/security\/news\/index.cfm?newsid=10736"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102171"},{"key":"e_1_3_2_1_11_1","unstructured":"Enterprise VoIP adoption in North America will more than double in 2010. http:\/\/www.voip-news.com\/press-releases\/enterprise- adoption-america-forecast-projection-021407\/.  Enterprise VoIP adoption in North America will more than double in 2010. http:\/\/www.voip-news.com\/press-releases\/enterprise- adoption-america-forecast-projection-021407\/."},{"key":"e_1_3_2_1_12_1","volume-title":"IETF","author":"Franks J.","year":"1999","unstructured":"J. Franks , P. Hallam-Baker , J. Hostetler , S. Lawrence , P. Leach , A. Luotonen and L. Stewart . HTTP Authentication: Basic and Digest Access Authentication. RFC 2617 , IETF , June 1999 . J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen and L. Stewart. HTTP Authentication: Basic and Digest Access Authentication. RFC 2617, IETF, June 1999."},{"key":"e_1_3_2_1_13_1","unstructured":"Sharon Gaudin. Pharming Attack Slams 65 Financial Targets. http:\/\/www.informationweek.com\/showArticle.jhtml?articleID=197008230  Sharon Gaudin. Pharming Attack Slams 65 Financial Targets. http:\/\/www.informationweek.com\/showArticle.jhtml?articleID=197008230"},{"key":"e_1_3_2_1_14_1","first-page":"147","volume-title":"SIP Security Mechanisms: A State-of-the-art Review. In the Proceedings of the Fifth International Network Conference (INC 2005","author":"Geneiatakis D.","year":"2005","unstructured":"D. Geneiatakis , G. Kambourakis , T. Dagiuklas , C. Lambrinoudakis and S. Gritzalis . SIP Security Mechanisms: A State-of-the-art Review. In the Proceedings of the Fifth International Network Conference (INC 2005 ), pages 147 -- 155 , July 2005 , Samos, Greece , D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis and S. Gritzalis. SIP Security Mechanisms: A State-of-the-art Review. In the Proceedings of the Fifth International Network Conference (INC 2005), pages 147--155, July 2005, Samos, Greece,"},{"key":"e_1_3_2_1_15_1","unstructured":"Gizmo. http:\/\/gizmo5.com  Gizmo. http:\/\/gizmo5.com"},{"key":"e_1_3_2_1_16_1","volume-title":"IETF","author":"Handley M.","year":"1998","unstructured":"M. Handley and V. Jacobson . SDP: Session Description Protocol. RFC 2327 , IETF , April 1998 . M. Handley and V. Jacobson. SDP: Session Description Protocol. RFC 2327, IETF, April 1998."},{"key":"e_1_3_2_1_17_1","unstructured":"Identity Theft Resource Center. http:\/\/www.idtheftcenter.org\/  Identity Theft Resource Center. http:\/\/www.idtheftcenter.org\/"},{"key":"e_1_3_2_1_18_1","unstructured":"R. Jaques. Cyber-Criminals Switch to VoIP 'Vishing'. http:\/\/www.vnunet.com\/vnunet\/news\/2160004\/cyber-criminals-talk-voip.  R. Jaques. Cyber-Criminals Switch to VoIP 'Vishing'. http:\/\/www.vnunet.com\/vnunet\/news\/2160004\/cyber-criminals-talk-voip."},{"key":"e_1_3_2_1_19_1","volume-title":"IETF","author":"Kent S.","year":"1998","unstructured":"S. Kent and R. Atkinson . Security Architecture for the Internet Protocol. RFC 2401 , IETF , November 1998 . S. Kent and R. Atkinson. Security Architecture for the Internet Protocol. RFC 2401, IETF, November 1998."},{"key":"e_1_3_2_1_20_1","unstructured":"Jeremy Kirk. 'Pharming' attack hits 50 banks. http:\/\/www.techworld.com\/security\/news\/index.cfm?newsid=8102  Jeremy Kirk. 'Pharming' attack hits 50 banks. http:\/\/www.techworld.com\/security\/news\/index.cfm?newsid=8102"},{"key":"e_1_3_2_1_21_1","unstructured":"P. D. Kretkowski. VoIP: How Free Can It Be? http:\/\/www.voip-news.com\/feature\/voip-how-free-can-be-120307\/  P. D. Kretkowski. VoIP: How Free Can It Be? http:\/\/www.voip-news.com\/feature\/voip-how-free-can-be-120307\/"},{"key":"e_1_3_2_1_22_1","unstructured":"Andrew Lavallee. Email Scammers Try New Bait in Voice 'Phishing'. http:\/\/www.post-gazette.com\/pg\/06198\/706477-96.stm.  Andrew Lavallee. Email Scammers Try New Bait in Voice 'Phishing'. http:\/\/www.post-gazette.com\/pg\/06198\/706477-96.stm."},{"key":"e_1_3_2_1_23_1","unstructured":"Hank Layton. Phone Scammers Targeting Veterans Patriot Guard. http:\/\/www.leavenworthtimes.com\/articles\/2008\/01\/07\/news\/news06.txt  Hank Layton. Phone Scammers Targeting Veterans Patriot Guard. http:\/\/www.leavenworthtimes.com\/articles\/2008\/01\/07\/news\/news06.txt"},{"key":"e_1_3_2_1_24_1","unstructured":"Jim Louderback. Security Holes Make VoIP a Risky Business. http:\/\/www.eweek.com\/article2\/0 1759 1591127 00.asp#talkback  Jim Louderback. Security Holes Make VoIP a Risky Business. http:\/\/www.eweek.com\/article2\/0 1759 1591127 00.asp#talkback"},{"key":"e_1_3_2_1_25_1","unstructured":"Man-In-The-Middle Attack. http:\/\/en.wikipedia.org\/wiki\/Man_in_the_ middle_attack  Man-In-The-Middle Attack. http:\/\/en.wikipedia.org\/wiki\/Man_in_the_ middle_attack"},{"key":"e_1_3_2_1_26_1","volume-title":"Second VoIP Security Workshop","author":"McGann S.","year":"2005","unstructured":"S. McGann and D. C. Sicker . An analysis of Security Threats and Tools in SIP-Based VoIP Systems . Second VoIP Security Workshop , 2005 . S. McGann and D. C. Sicker. An analysis of Security Threats and Tools in SIP-Based VoIP Systems. Second VoIP Security Workshop, 2005."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDT.2006.17"},{"key":"e_1_3_2_1_28_1","unstructured":"R. Naraine. Voice Phishers Dialing for PayPal Dollars. http:\/\/www.eweek.com\/article2\/0 1895 1985966 00.asp.  R. Naraine. Voice Phishers Dialing for PayPal Dollars. http:\/\/www.eweek.com\/article2\/0 1895 1985966 00.asp."},{"key":"e_1_3_2_1_29_1","unstructured":"Nuance Speaker Verification Delivers Biometric Security without Expensive Equipment or Special Hardware. http:\/\/www.nuance.com\/news\/pressreleases\/2006\/20060803_biometric.asp.  Nuance Speaker Verification Delivers Biometric Security without Expensive Equipment or Special Hardware. http:\/\/www.nuance.com\/news\/pressreleases\/2006\/20060803_biometric.asp."},{"key":"e_1_3_2_1_30_1","volume-title":"IETF","author":"Peterson J.","year":"2002","unstructured":"J. Peterson . A Privacy Mechanism for the Session Initiation Protocol (SIP). RFC 3323 , IETF , November 2002 . J. Peterson. A Privacy Mechanism for the Session Initiation Protocol (SIP). RFC 3323, IETF, November 2002."},{"key":"e_1_3_2_1_31_1","unstructured":"Pharming. URL. http:\/\/en.wikipedia.org\/wiki\/Pharming  Pharming. URL. http:\/\/en.wikipedia.org\/wiki\/Pharming"},{"key":"e_1_3_2_1_32_1","unstructured":"Phishing. URL. http:\/\/en.wikipedia.org\/wiki\/Phishing  Phishing. URL. http:\/\/en.wikipedia.org\/wiki\/Phishing"},{"key":"e_1_3_2_1_33_1","unstructured":"B. Prince. Experts: Enterprises Must Focus on VOIP Security. http:\/\/www.eweek.com\/article2\/0 1895 2154629 00.asp  B. Prince. Experts: Enterprises Must Focus on VOIP Security. http:\/\/www.eweek.com\/article2\/0 1895 2154629 00.asp"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359550"},{"key":"e_1_3_2_1_35_1","volume-title":"Corporate VoIP Market","author":"The Radicati Group","year":"2005","unstructured":"The Radicati Group . Corporate VoIP Market , 2005 --2009. http:\/\/www.peterdehaas.net\/2005\/09\/corporate_voip_.html The Radicati Group. Corporate VoIP Market, 2005--2009. http:\/\/www.peterdehaas.net\/2005\/09\/corporate_voip_.html"},{"key":"e_1_3_2_1_36_1","volume-title":"IETF","author":"Ramsdell B.","year":"1999","unstructured":"B. Ramsdell , Editor. S\/MIME Version 3 Message Specification. RFC 2633 , IETF , June 1999 . B. Ramsdell, Editor. S\/MIME Version 3 Message Specification. RFC 2633, IETF, June 1999."},{"key":"e_1_3_2_1_37_1","unstructured":"ITU-T Recommendation H.323v.4 Packet-based multimedia communications systems. November 2000.  ITU-T Recommendation H.323v.4 Packet-based multimedia communications systems. November 2000."},{"key":"e_1_3_2_1_38_1","volume-title":"Secure IP Telephony Using Multi-layered Protection In Proceedgins of the 2003 Network and Distributed System Security Symposium (NDSS 2003","author":"Reynolds B.","year":"2003","unstructured":"B. Reynolds and D. Ghosal . Secure IP Telephony Using Multi-layered Protection In Proceedgins of the 2003 Network and Distributed System Security Symposium (NDSS 2003 ), Feburary 2003 . B. Reynolds and D. Ghosal. Secure IP Telephony Using Multi-layered Protection In Proceedgins of the 2003 Network and Distributed System Security Symposium (NDSS 2003), Feburary 2003."},{"key":"e_1_3_2_1_39_1","volume-title":"IETF","author":"Rivest R.","year":"1992","unstructured":"R. Rivest . The MD5 Message-Digest Algorithm. RFC 1321 , IETF , April 1992 . R. Rivest. The MD5 Message-Digest Algorithm. RFC 1321, IETF, April 1992."},{"key":"e_1_3_2_1_40_1","volume-title":"IETF","author":"Rosenberg J.","year":"2002","unstructured":"J. Rosenberg , H. Schulzrinne , G. Camarillo , A. Johnston , J. Peterson , R. Sparks , M Handley and E. Schooler . SIP: Session Initiation Protocol. RFC 3261 , IETF , June 2002 . J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M Handley and E. Schooler. SIP: Session Initiation Protocol. RFC 3261, IETF, June 2002."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2002.1081764"},{"key":"e_1_3_2_1_42_1","volume-title":"CRC","author":"Schulzrinne H.","year":"2004","unstructured":"H. Schulzrinne . Internet Telephony. In Practical Handbook of Internet Computing , CRC , 2004 H. Schulzrinne. Internet Telephony. In Practical Handbook of Internet Computing, CRC, 2004"},{"key":"e_1_3_2_1_43_1","volume-title":"IETF","author":"Schulzrinne H.","year":"1996","unstructured":"H. Schulzrinne , S. Casner , R. Frederick and V. Jacobson . RTP: A Transport Protocol for Real-Time Applications. RFC 1889 , IETF , January 1996 . H. Schulzrinne, S. Casner, R. Frederick and V. Jacobson. RTP: A Transport Protocol for Real-Time Applications. RFC 1889, IETF, January 1996."},{"key":"e_1_3_2_1_44_1","first-page":"83","volume-title":"Proceedings of International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV 1998","author":"Schulzrinne H.","year":"1998","unstructured":"H. Schulzrinne and J. Rosenberg . A Comparison of SIP and H.323 for Internet Telephony . In Proceedings of International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV 1998 ), pages 83 -- 86 , Cambridge, England , July 1998 . H. Schulzrinne and J. Rosenberg. A Comparison of SIP and H.323 for Internet Telephony. In Proceedings of International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV 1998), pages 83--86, Cambridge, England, July 1998."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/876901.881221"},{"volume-title":"Secure Computing Warns of New VoIP Based Phishing Scam","author":"Secure Computing Corporation","key":"e_1_3_2_1_46_1","unstructured":"Secure Computing Corporation . Secure Computing Warns of New VoIP Based Phishing Scam ; Credit Card and Banking Customers Warned to Be on Guard Against ID Theft By Phone. http:\/\/www.securecomputing.com\/press_releases.cfm? ID =879984 Secure Computing Corporation. Secure Computing Warns of New VoIP Based Phishing Scam; Credit Card and Banking Customers Warned to Be on Guard Against ID Theft By Phone. http:\/\/www.securecomputing.com\/press_releases.cfm? ID=879984"},{"key":"e_1_3_2_1_47_1","unstructured":"Larry Seltzer. Don't Believe That Lying Telephone. http:\/\/www.eweek.com\/article2\/0 1759 2004426 00.asp  Larry Seltzer. Don't Believe That Lying Telephone. http:\/\/www.eweek.com\/article2\/0 1759 2004426 00.asp"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS.2006.250469"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.73"},{"key":"e_1_3_2_1_50_1","unstructured":"Skype - the Global Internet Telephony Company. http:\/\/www.skype.org  Skype - the Global Internet Telephony Company. http:\/\/www.skype.org"},{"key":"e_1_3_2_1_51_1","unstructured":"Radu State. Remote eavesdropping with SIP Phone GXV-3000. http:\/\/www.voipsa.org\/pipermail\/voipsec_voipsa.org\/2007-August\/002424.html  Radu State. Remote eavesdropping with SIP Phone GXV-3000. http:\/\/www.voipsa.org\/pipermail\/voipsec_voipsa.org\/2007-August\/002424.html"},{"key":"e_1_3_2_1_52_1","volume-title":"PBX Revenue to Exceed $7.5 Billion","author":"Adoption IP","year":"2011","unstructured":"Fueled by Vo IP Adoption , PBX Revenue to Exceed $7.5 Billion in 2011 . J. Torres . http:\/\/ipcommunications.tmcnet.com\/hot- topics\/gateway\/articles\/4738-fueled-voip-adoption- pbx-revenue-exceed-75-billion.htm Fueled by VoIP Adoption, PBX Revenue to Exceed $7.5 Billion in 2011. J. Torres. http:\/\/ipcommunications.tmcnet.com\/hot- topics\/gateway\/articles\/4738-fueled-voip-adoption- pbx-revenue-exceed-75-billion.htm"},{"key":"e_1_3_2_1_53_1","unstructured":"Bob Violino. After Phishing? Pharming! http:\/\/www.csoonline.com\/read\/100105\/pharm.html  Bob Violino. After Phishing? Pharming! http:\/\/www.csoonline.com\/read\/100105\/pharm.html"},{"key":"e_1_3_2_1_54_1","unstructured":"Vishing. http:\/\/en.wikipedia.org\/wiki\/Vishing  Vishing. http:\/\/en.wikipedia.org\/wiki\/Vishing"},{"key":"e_1_3_2_1_55_1","unstructured":"Vonage Is Still #1 In VoIP Market Share. http:\/\/www.voipnow.org\/2006\/07\/vonage_is_still.html.  Vonage Is Still #1 In VoIP Market Share. http:\/\/www.voipnow.org\/2006\/07\/vonage_is_still.html."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102133"},{"key":"e_1_3_2_1_57_1","first-page":"433","volume-title":"SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments In Proceedgins of the 2004 International Conference on Dependable Systems and Networks (DSN 2004","author":"Wu Y.","year":"2004","unstructured":"Y. Wu , S. Bagchi , S. Garg , N. Singh . SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments In Proceedgins of the 2004 International Conference on Dependable Systems and Networks (DSN 2004 ), Pages 433 -- 442 , July 2004 . Y. Wu, S. Bagchi, S. Garg, N. Singh. SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments In Proceedgins of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), Pages 433--442, July 2004."},{"key":"e_1_3_2_1_58_1","volume-title":"Billing Attacks on SIP-Based VoIP Systems In Proceedings of the 1st USENIX Workshop on Offensive Technologies (WOOT 2007)","author":"Zhang R.","year":"2007","unstructured":"R. Zhang , X. Wang , X. Yang , X. Jiang . Billing Attacks on SIP-Based VoIP Systems In Proceedings of the 1st USENIX Workshop on Offensive Technologies (WOOT 2007) , August 2007 . R. Zhang, X. Wang, X. Yang, X. Jiang. Billing Attacks on SIP-Based VoIP Systems In Proceedings of the 1st USENIX Workshop on Offensive Technologies (WOOT 2007), August 2007."}],"event":{"name":"Securecomm08: Fourth International Conference On Security on Privacy for communication Networks","sponsor":["Create-Net","INRIA Institut Natl de Recherche en Info et en Automatique","SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Istanbul Turkey","acronym":"Securecomm08"},"container-title":["Proceedings of the 4th international conference on Security and privacy in communication netowrks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460877.1460908","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1460877.1460908","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:43:49Z","timestamp":1750290229000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460877.1460908"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,22]]},"references-count":57,"alternative-id":["10.1145\/1460877.1460908","10.1145\/1460877"],"URL":"https:\/\/doi.org\/10.1145\/1460877.1460908","relation":{},"subject":[],"published":{"date-parts":[[2008,9,22]]},"assertion":[{"value":"2008-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}