{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T17:13:41Z","timestamp":1769447621036,"version":"3.49.0"},"reference-count":56,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2013,12,1]],"date-time":"2013-12-01T00:00:00Z","timestamp":1385856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["287611"],"award-info":[{"award-number":["287611"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Archit. Code Optim."],"published-print":{"date-parts":[[2013,12]]},"abstract":"<jats:p>\n            Secure and energy-efficient communication between Implantable Medical Devices (IMDs) and authorized external users is attracting increasing attention these days. However, there currently exists no systematic approach to the problem, while solutions from neighboring fields, such as wireless sensor networks, are not directly transferable due to the peculiarities of the IMD domain. This work describes an original, efficient solution for secure IMD communication. A new implant system architecture is proposed, where security and main-implant functionality are made completely decoupled by running the tasks onto two separate cores. Wireless communication goes through a custom security ASIP, called SISC (Smart-Implant Security Core), which runs an energy-efficient security protocol. The security core is powered by RF-harvested energy until it performs external-reader authentication, providing an elegant defense mechanism against battery Denial-of-Service (DoS) and other, more common attacks. The system has been evaluated based on a realistic case study involving an artificial pancreas implant. When synthesized for a UMC 90nm CMOS ASIC technology, our system architecture achieves defense against unauthorized accesses having\n            <jats:italic>zero energy cost<\/jats:italic>\n            , running entity authentication through harvesting only 7.45\u03bc\n            <jats:italic>J<\/jats:italic>\n            of RF energy from the requesting entity. In all other successfully authenticated accesses, our architecture achieves secure data exchange without affecting the performance of the main IMD functionality, adding less than 1\u2030 (1.3\n            <jats:italic>mJ<\/jats:italic>\n            ) to the daily energy consumption of a typical implant. Compared to a singe-core, secure reference IMD, which would still be more vulnerable to some types of attacks, our secure system on chip (SoC) achieves high security levels at 56% energy savings and at an area overhead of less than 15%.\n          <\/jats:p>","DOI":"10.1145\/2541228.2555313","type":"journal-article","created":{"date-parts":[[2014,1,14]],"date-time":"2014-01-14T13:39:57Z","timestamp":1389706797000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["A system architecture, processor, and communication protocol for secure implants"],"prefix":"10.1145","volume":"10","author":[{"given":"Christos","family":"Strydis","sequence":"first","affiliation":[{"name":"Neuroscience Dept., Erasmus MC &amp; SCT Dept., Delft University of Technology, The Netherlands"}]},{"given":"Robert M.","family":"Seepers","sequence":"additional","affiliation":[{"name":"Neuroscience Dept., Erasmus MC, The Netherlands"}]},{"given":"Pedro","family":"Peris-Lopez","sequence":"additional","affiliation":[{"name":"CS Dept., Universidad Carlos III de Madrid, Madrid, Spain"}]},{"given":"Dimitrios","family":"Siskos","sequence":"additional","affiliation":[{"name":"SCT Dept., Delft University of Technology, GA Delft, The Netherlands"}]},{"given":"Ioannis","family":"Sourdis","sequence":"additional","affiliation":[{"name":"CSE Dept., Chalmers University of Technology, Gothenburg, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2013,12]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370905.1370910"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093698.2093760"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the 2012 World Congress on Internet Security (WorldCIS\u201912)","author":"Bogari E. A.","unstructured":"Bogari , E. A. , Zavarsky , P. , Lindskog , D. , and Ruhl , R . 2012. An analysis of security weaknesses in the evolution of RFID enabled passport . In Proceedings of the 2012 World Congress on Internet Security (WorldCIS\u201912) . 158--166. Bogari, E. A., Zavarsky, P., Lindskog, D., and Ruhl, R. 2012. An analysis of security weaknesses in the evolution of RFID enabled passport. In Proceedings of the 2012 World Congress on Internet Security (WorldCIS\u201912). 158--166."},{"key":"e_1_2_1_4_1","unstructured":"Boyd C. and Mathuria A. 2010. Protocols for authentication and key establishment. In Information Security and Cryptography 3rd Ed. Springer Publishing Company Incorporated.   Boyd C. and Mathuria A. 2010. Protocols for authentication and key establishment. In Information Security and Cryptography 3rd Ed. Springer Publishing Company Incorporated."},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the Vehicular Technology Conference.","volume":"5","author":"Cam H.","unstructured":"Cam , H. , Ozdemir , S. , Muthuavinashiappan , D. , and Nair , P . 2003. Energy efficient security protocol for wireless sensor networks . In Proceedings of the Vehicular Technology Conference. Vol. 5 . IEEE, 2981--2984. Cam, H., Ozdemir, S., Muthuavinashiappan, D., and Nair, P. 2003. Energy efficient security protocol for wireless sensor networks. In Proceedings of the Vehicular Technology Conference. Vol. 5. IEEE, 2981--2984."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.17"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1093\/ajcn\/67.6.1186"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS\u201912)","author":"Daniluk K.","unstructured":"Daniluk , K. and Niewiadomska-Szynkiewicz , E . 2012. Energy-efficient security in implantable medical devices . In Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS\u201912) . IEEE, 773--778. Daniluk, K. and Niewiadomska-Szynkiewicz, E. 2012. Energy-efficient security in implantable medical devices. In Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS\u201912). IEEE, 773--778."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753462"},{"key":"e_1_2_1_10_1","first-page":"1","article-title":"Absence makes the heart grow fonder: New directions for implantable medical device security. In Proceedings of the 3rd Conference on Hot Topics in Security","volume":"5","author":"Denning T.","year":"2008","unstructured":"Denning , T. , Fu , K. , and Kohno , T. 2008 . Absence makes the heart grow fonder: New directions for implantable medical device security. In Proceedings of the 3rd Conference on Hot Topics in Security . USENIX Association , 5 : 1 -- 5 :7. Denning, T., Fu, K., and Kohno, T. 2008. Absence makes the heart grow fonder: New directions for implantable medical device security. In Proceedings of the 3rd Conference on Hot Topics in Security. USENIX Association, 5:1--5:7.","journal-title":"USENIX Association"},{"key":"e_1_2_1_11_1","unstructured":"EPCglobal Inc. 2008. Class-1 Generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz (version 1.2.0).  EPCglobal Inc. 2008. Class-1 Generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz (version 1.2.0)."},{"key":"e_1_2_1_12_1","unstructured":"FCC. 2003. MICS Medical Implant Communication Services. FCC 47CFR95.601-95.673 Subpart E\/I. Rules for MedRadio Services.  FCC. 2003. MICS Medical Implant Communication Services. FCC 47CFR95.601-95.673 Subpart E\/I. Rules for MedRadio Services."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.73510"},{"key":"e_1_2_1_14_1","volume-title":"Human enhancement: Could you become infected with a computer virus&quest","author":"Gasson M. N.","unstructured":"Gasson , M. N. 2010. Human enhancement: Could you become infected with a computer virus&quest ; In Proceedings of the IEEE International Symposium on Technology and Society (ISTAS\u2019 10). 61--68. Gasson, M. N. 2010. Human enhancement: Could you become infected with a computer virus&quest; In Proceedings of the IEEE International Symposium on Technology and Society (ISTAS\u201910). 61--68."},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Gollakota S. Hassanieh H. Ransford B. Katabi D. and Fu K. 2011. They Can Hear Your Heartbeats: Non-invasive Security for Implantable Medical Devices. Retrieved December 2 2013 from http:\/\/groups.csail.mit.edu\/netmit\/IMDShield\/paper.pdf.  Gollakota S. Hassanieh H. Ransford B. Katabi D. and Fu K. 2011. They Can Hear Your Heartbeats: Non-invasive Security for Implantable Medical Devices. Retrieved December 2 2013 from http:\/\/groups.csail.mit.edu\/netmit\/IMDShield\/paper.pdf.","DOI":"10.1145\/2018436.2018438"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2006.19"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.16"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the 1990 16th Annual Northeast Bioengineering Conference. 137--138","author":"Harrigal C.","unstructured":"Harrigal , C. and Walters , R . 1990. The development of a microprocessor controlled implantable device . In Proceedings of the 1990 16th Annual Northeast Bioengineering Conference. 137--138 . Harrigal, C. and Walters, R. 1990. The development of a microprocessor controlled implantable device. In Proceedings of the 1990 16th Annual Northeast Bioengineering Conference. 137--138."},{"key":"e_1_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Hei X. Du X. Wu J. and Hu F. 2010. Defending resource depletion attacks on implantable medical devices. In GLOBECOM. IEEE 1--5.  Hei X. Du X. Wu J. and Hu F. 2010. Defending resource depletion attacks on implantable medical devices. In GLOBECOM. IEEE 1--5.","DOI":"10.1109\/GLOCOM.2010.5685228"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISMICT.2011.5759785"},{"key":"e_1_2_1_22_1","first-page":"2008","article-title":"Information technology--Security techniques--Entity authentication--Part 2: Mechanisms using symmetric encipherment algorithms","volume":"9798","author":"ISO.","year":"1999","unstructured":"ISO. 1999 . Information technology--Security techniques--Entity authentication--Part 2: Mechanisms using symmetric encipherment algorithms , ISO\/IEC 9798-2 : 2008 . International Standard. ISO. 1999. Information technology--Security techniques--Entity authentication--Part 2: Mechanisms using symmetric encipherment algorithms, ISO\/IEC 9798-2:2008. International Standard.","journal-title":"ISO\/IEC"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the 9th Annual Conference of the International FES Society.","author":"Jalilian E.","unstructured":"Jalilian , E. , Turner , L. , Jullien , G. , and Mitchev , M . 2004. Design of an implantable multichannel neurostimulator for restoring impaired gastrointestinal motility . In Proceedings of the 9th Annual Conference of the International FES Society. Jalilian, E., Turner, L., Jullien, G., and Mitchev, M. 2004. Design of an implantable multichannel neurostimulator for restoring impaired gastrointestinal motility. In Proceedings of the 9th Annual Conference of the International FES Society."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2065210"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.237"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.011"},{"key":"e_1_2_1_28_1","unstructured":"Li C. Raghunathan A. and Jha N. K. 2011. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In Proceedins of the 13th IEEE International Conferenc on e-Health Networking Applications and Services (Healthcom\u201911). 150--156.  Li C. Raghunathan A. and Jha N. K. 2011. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In Proceedins of the 13th IEEE International Conferenc on e-Health Networking Applications and Services (Healthcom\u201911). 150--156."},{"key":"e_1_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Martin Feldhofer S. D. and Wolkerstorfer J. 2004. Strong authentication for RFID systems using the AES algorithm. In Cryptographic Hardware and Embedded-Systems. Springer 85--99.  Martin Feldhofer S. D. and Wolkerstorfer J. 2004. Strong authentication for RFID systems using the AES algorithm. In Cryptographic Hardware and Embedded-Systems. Springer 85--99.","DOI":"10.1007\/978-3-540-28632-5_26"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1086297.1086330"},{"key":"e_1_2_1_31_1","volume-title":"Recommendation for Block Cipher Modes of Operation\u2014Methods and Techniques. NIST Special Publication 800-38a","unstructured":"NIST. 2001. Recommendation for Block Cipher Modes of Operation\u2014Methods and Techniques. NIST Special Publication 800-38a . National Institute of Standards and Technology . NIST. 2001. Recommendation for Block Cipher Modes of Operation\u2014Methods and Techniques. NIST Special Publication 800-38a. National Institute of Standards and Technology."},{"key":"e_1_2_1_32_1","volume-title":"Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. NIST Special Publication 800-38b","unstructured":"NIST. 2005. Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. NIST Special Publication 800-38b . National Institute of Standards and Technology . NIST. 2005. Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. NIST Special Publication 800-38b. National Institute of Standards and Technology."},{"key":"e_1_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Ohta H. and Matsui M. 2000. A description of the misty1 encryption algorithm. RFC2994 November.   Ohta H. and Matsui M. 2000. A description of the misty1 encryption algorithm. RFC2994 November.","DOI":"10.17487\/rfc2994"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2010.2085042"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the Biomedical Circuits and Systems Conference (BioCAS\u201911)","author":"Pagkalos I.","unstructured":"Pagkalos , I. , Herrero , P. , El-Sharkawy , M. , Pesl , P. , Oliver , N. , and Georgiou , P . 2011. Vhdl implementation of the biostator ii glucose control algorithm for critical care . In Proceedings of the Biomedical Circuits and Systems Conference (BioCAS\u201911) . IEEE, 94--97. Pagkalos, I., Herrero, P., El-Sharkawy, M., Pesl, P., Oliver, N., and Georgiou, P. 2011. Vhdl implementation of the biostator ii glucose control algorithm for critical care. In Proceedings of the Biomedical Circuits and Systems Conference (BioCAS\u201911). IEEE, 94--97."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/944645.944684"},{"key":"e_1_2_1_37_1","unstructured":"Poulson K. 2008. Hackers Assault Epilepsy Patients via Computer. Retrieved from www.wired.com\/politics\/security\/news\/2008\/03\/epilepsy.  Poulson K. 2008. Hackers Assault Epilepsy Patients via Computer. Retrieved from www.wired.com\/politics\/security\/news\/2008\/03\/epilepsy."},{"key":"e_1_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Pournaghshband V. Sarrafzadeh M. and Reiher P. 2012. Securing legacy mobile medical devices. In MobiHealth.  Pournaghshband V. Sarrafzadeh M. and Reiher P. 2012. Securing legacy mobile medical devices. In MobiHealth.","DOI":"10.1007\/978-3-642-37893-5_19"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653712"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/11506157_16"},{"key":"e_1_2_1_41_1","volume-title":"Fast Software Encryption","author":"Rivest R. L.","unstructured":"Rivest , R. L. 1995. The rc5 encryption algorithm . In Fast Software Encryption . Springer , 86--96. Rivest, R. L. 1995. The rc5 encryption algorithm. In Fast Software Encryption. Springer, 86--96."},{"key":"e_1_2_1_42_1","volume-title":"Heart Disease and Stroke Statistics -- 2011 Update: A Report from the American Heart Association","author":"Roger V. L.","unstructured":"Roger , V. L. , Turner , M. B. , Heart Disease and Stroke Statistics -- 2011 Update: A Report from the American Heart Association . American Heart Association . Roger, V. L., Turner, M. B., et al. 2011. Heart Disease and Stroke Statistics -- 2011 Update: A Report from the American Heart Association. American Heart Association."},{"key":"e_1_2_1_43_1","unstructured":"Schechter S. 2010. Security that is Meant to be Skin Deep Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices. In HealthSec. USENIX.  Schechter S. 2010. Security that is Meant to be Skin Deep Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices. In HealthSec. USENIX."},{"key":"e_1_2_1_44_1","volume-title":"Proceedings of the IEEE Conference on Custom Integrated Circuits","author":"Shukuri S.","year":"2001","unstructured":"Shukuri , S. , Yanagisawa , K. , and Ishibashi , K . 2001. Cmos process compatible ie-flash (inverse gate electrode flash) technology for system-on-a-chip . In Proceedings of the IEEE Conference on Custom Integrated Circuits , 2001 . 179--182. Shukuri, S., Yanagisawa, K., and Ishibashi, K. 2001. Cmos process compatible ie-flash (inverse gate electrode flash) technology for system-on-a-chip. In Proceedings of the IEEE Conference on Custom Integrated Circuits, 2001. 179--182."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_29"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162092"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/4.18588"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1366230.1366272"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2004.834389"},{"key":"e_1_2_1_52_1","unstructured":"van der Lubbe J. C. A. 1998. Basic Methods of Cryptography. VSSD.   van der Lubbe J. C. A. 1998. Basic Methods of Cryptography. VSSD."},{"key":"e_1_2_1_53_1","first-page":"310","article-title":"Attacks on rfid protocols","volume":"2008","author":"van Deursen T.","year":"2008","unstructured":"van Deursen , T. and Radomirovic , S. 2008 . Attacks on rfid protocols . IACR Cryptology ePrint Archive 2008 , 310 . van Deursen, T. and Radomirovic, S. 2008. Attacks on rfid protocols. IACR Cryptology ePrint Archive 2008, 310.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1250897"},{"key":"e_1_2_1_55_1","volume-title":"Proceedings of the 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS\u201904)","author":"Wang L.","unstructured":"Wang , L. , Hammond , P. , Johannessen , E. , Tang , T. , Astaras , A. , Beaumont , S. , Murray , A. , Cooper , J. , and Cumming , D . 2004. An on-chip programmable instrumentation microsystem for gastrointestinal telemetry applications . In Proceedings of the 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS\u201904) . 2109--2112. Wang, L., Hammond, P., Johannessen, E., Tang, T., Astaras, A., Beaumont, S., Murray, A., Cooper, J., and Cumming, D. 2004. An on-chip programmable instrumentation microsystem for gastrointestinal telemetry applications. In Proceedings of the 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS\u201904). 2109--2112."},{"key":"e_1_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Wouters P. Cooman M. D. Lapadatu D. and Puers R. 1994. A low power multi-sensor interface for injectable microprocessor-based animal monitoring system. Sensors and Actuators A: Physical. 41--42 198--206.  Wouters P. Cooman M. D. Lapadatu D. and Puers R. 1994. A low power multi-sensor interface for injectable microprocessor-based animal monitoring system. Sensors and Actuators A: Physical. 41--42 198--206.","DOI":"10.1016\/0924-4247(94)80111-8"},{"key":"e_1_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Xu F. Qin Z. Tan C. C. Wang B. and Li Q. 2011. IMDGuard: Securing implantable medical devices with the external wearable guardian. IEEE INFOCOM 1862--1870.  Xu F. Qin Z. Tan C. C. Wang B. and Li Q. 2011. IMDGuard: Securing implantable medical devices with the external wearable guardian. IEEE INFOCOM 1862--1870.","DOI":"10.1109\/INFCOM.2011.5934987"},{"key":"e_1_2_1_58_1","first-page":"3","article-title":"Security analysis of a new ultra-lightweight RFID protocol and its improvement","volume":"4","author":"Zhuang X.","year":"2013","unstructured":"Zhuang , X. , Wang , Z.-H. , Chang , C.-C. , and Zhu , Y. 2013 . Security analysis of a new ultra-lightweight RFID protocol and its improvement . Journal of Information Hiding and Multimedia Signal Processing 4 , 3 . Zhuang, X., Wang, Z.-H., Chang, C.-C., and Zhu, Y. 2013. Security analysis of a new ultra-lightweight RFID protocol and its improvement. Journal of Information Hiding and Multimedia Signal Processing 4, 3.","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"}],"container-title":["ACM Transactions on Architecture and Code Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2541228.2555313","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2541228.2555313","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:35:01Z","timestamp":1750232101000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2541228.2555313"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":56,"aliases":["10.1145\/2555289.2555313"],"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["10.1145\/2541228.2555313"],"URL":"https:\/\/doi.org\/10.1145\/2541228.2555313","relation":{},"ISSN":["1544-3566","1544-3973"],"issn-type":[{"value":"1544-3566","type":"print"},{"value":"1544-3973","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12]]},"assertion":[{"value":"2013-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}