{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T21:07:52Z","timestamp":1771708072685,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Commission (ARC)","award":["NANOSEC"],"award-info":[{"award-number":["NANOSEC"]}]},{"name":"Belgian Fund for Scientific Research","award":["FNRS-F.R.S."],"award-info":[{"award-number":["FNRS-F.R.S."]}]},{"name":"European Commission (ERC)","award":["280141 (CRASH)"],"award-info":[{"award-number":["280141 (CRASH)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2996366.2996369","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"5-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Moments-Correlating DPA"],"prefix":"10.1145","author":[{"given":"Amir","family":"Moradi","sequence":"first","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Bochum, Germany"}]},{"given":"Fran\u00e7ois-Xavier","family":"Standaert","sequence":"additional","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Louvain-la-Neuve, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A More Efficient AES Threshold Implementation. IACR Cryptology ePrint Archive","author":"Bilgin Beg\u00fcl","year":"2013","unstructured":"Beg\u00fcl Bilgin , Benedikt Gierlichs , Svetla Nikova , Ventzislav Nikov , and Vincent Rijmen . A More Efficient AES Threshold Implementation. IACR Cryptology ePrint Archive , 2013 :697, 2013. Beg\u00fcl Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, and Vincent Rijmen. A More Efficient AES Threshold Implementation. IACR Cryptology ePrint Archive, 2013:697, 2013."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Eric\n      Brier Christophe\n      Clavier and \n      Francis\n      Olivier\n    .\n  Correlation Power Analysis with a Leakage Model\n  . In Marc Joye and Jean-Jacques Quisquater editors CHES volume \n  3156\n   of \n  Lecture Notes in Computer Science pages \n  16\n  --\n  29\n  . \n  Springer 2004\n  .  Eric Brier Christophe Clavier and Francis Olivier. Correlation Power Analysis with a Leakage Model. In Marc Joye and Jean-Jacques Quisquater editors CHES volume 3156 of Lecture Notes in Computer Science pages 16--29. Springer 2004.","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Suresh\n      Chari Charanjit S.\n      Jutla Josyula R.\n      Rao and \n      Pankaj\n      Rohatgi\n    .\n  Towards Sound Approaches to Counteract Power-Analysis Attacks\n  . In Michael J. Wiener editor CRYPTO volume \n  1666\n   of \n  Lecture Notes in Computer Science pages \n  398\n  --\n  412\n  . \n  Springer 1999\n  .   Suresh Chari Charanjit S. Jutla Josyula R. Rao and Pankaj Rohatgi. Towards Sound Approaches to Counteract Power-Analysis Attacks. In Michael J. Wiener editor CRYPTO volume 1666 of Lecture Notes in Computer Science pages 398--412. Springer 1999.","DOI":"10.1007\/3-540-48405-1_26"},{"key":"e_1_3_2_1_5_1","series-title":"Lecture Notes in Computer Science","first-page":"13","volume-title":"Burton S. Kaliski Jr., \u00c7etin Kaya Ko\u00e7","author":"Chari Suresh","year":"2002","unstructured":"Suresh Chari , Josyula R. Rao , and Pankaj Rohatgi . Template Attacks . In Burton S. Kaliski Jr., \u00c7etin Kaya Ko\u00e7 , and Christof Paar, editors, CHES, volume 2523 of Lecture Notes in Computer Science , pages 13 -- 28 . Springer , 2002 . Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi. Template Attacks. In Burton S. Kaliski Jr., \u00c7etin Kaya Ko\u00e7, and Christof Paar, editors, CHES, volume 2523 of Lecture Notes in Computer Science, pages 13--28. Springer, 2002."},{"key":"e_1_3_2_1_6_1","series-title":"Lecture Notes in Computer Science","first-page":"401","volume-title":"Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26--30","author":"Duc Alexandre","year":"2015","unstructured":"Alexandre Duc , Sebastian Faust , and Fran\u00e7ois-Xavier Standaert . Making masking security proofs concrete - or how to evaluate the security of any leaking device . In Elisabeth Oswald and Marc Fischlin, editors, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26--30 , 2015 , Proceedings, Part I, volume 9056 of Lecture Notes in Computer Science , pages 401 -- 429 . Springer , 2015. Alexandre Duc, Sebastian Faust, and Fran\u00e7ois-Xavier Standaert. Making masking security proofs concrete - or how to evaluate the security of any leaking device. In Elisabeth Oswald and Marc Fischlin, editors, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26--30, 2015, Proceedings, Part I, volume 9056 of Lecture Notes in Computer Science, pages 401--429. Springer, 2015."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Fran\u00e7ois\n      Durvaux Fran\u00e7ois-Xavier\n      Standaert and \n      Nicolas\n      Veyrat-Charvillon\n    .\n  How to certify the leakage of a chip? In Phong Q\n  . Nguyen and Elisabeth Oswald editors EUROCRYPT volume \n  8441\n   of \n  Lecture Notes in Computer Science pages \n  459\n  --\n  476\n  . \n  Springer 2014\n  .  Fran\u00e7ois Durvaux Fran\u00e7ois-Xavier Standaert and Nicolas Veyrat-Charvillon. How to certify the leakage of a chip? In Phong Q. Nguyen and Elisabeth Oswald editors EUROCRYPT volume 8441 of Lecture Notes in Computer Science pages 459--476. Springer 2014.","DOI":"10.1007\/978-3-642-55220-5_26"},{"key":"e_1_3_2_1_8_1","volume-title":"Towards easy leakage certification. IACR Cryptology ePrint Archive","author":"Durvaux Fran\u00e7ois","year":"2015","unstructured":"Fran\u00e7ois Durvaux and Fran\u00e7ois-Xavier Standaert . Towards easy leakage certification. IACR Cryptology ePrint Archive , 2015 :537, 2015. Fran\u00e7ois Durvaux and Fran\u00e7ois-Xavier Standaert. Towards easy leakage certification. IACR Cryptology ePrint Archive, 2015:537, 2015."},{"key":"e_1_3_2_1_9_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1007\/978-3-662-49890-3_10","volume-title":"Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Durvaux Fran\u00e7ois","year":"2016","unstructured":"Fran\u00e7ois Durvaux and Fran\u00e7ois-Xavier Standaert . From improved leakage detection to the detection of points of interests in leakage traces . In Marc Fischlin and Jean-S\u00e9bastien Coron, editors, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques , Vienna, Austria , May 8--12, 2016 , Proceedings, Part I, volume 9665 of Lecture Notes in Computer Science , pages 240 -- 262 . Springer , 2016. Fran\u00e7ois Durvaux and Fran\u00e7ois-Xavier Standaert. From improved leakage detection to the detection of points of interests in leakage traces. In Marc Fischlin and Jean-S\u00e9bastien Coron, editors, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8--12, 2016, Proceedings, Part I, volume 9665 of Lecture Notes in Computer Science, pages 240--262. Springer, 2016."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21476-4_3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_14"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_11"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2423274"},{"key":"e_1_3_2_1_14_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/978-3-642-40948-6","volume-title":"Smart Card Research and Advanced Applications - 12th International Conference, CARDIS","author":"Grosso Vincent","year":"2013","unstructured":"Vincent Grosso , Fran\u00e7ois-Xavier Standaert , and Emmanuel Prouff . Low entropy masking schemes, revisited . In Aur\u00e9lien Francillon and Pankaj Rohatgi, editors, Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013 , Berlin, Germany, November 27--29, 2013. Revised Selected Papers, volume 8419 of Lecture Notes in Computer Science , pages 33 -- 43 . Springer , 2013. Vincent Grosso, Fran\u00e7ois-Xavier Standaert, and Emmanuel Prouff. Low entropy masking schemes, revisited. In Aur\u00e9lien Francillon and Pankaj Rohatgi, editors, Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27--29, 2013. Revised Selected Papers, volume 8419 of Lecture Notes in Computer Science, pages 33--43. Springer, 2013."},{"key":"e_1_3_2_1_15_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-48324-4","volume-title":"Saint-Malo, France, September 13--16","author":"G\u00fcneysu Tim","year":"2015","unstructured":"Tim G\u00fcneysu and Helena Handschuh , editors. Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop , Saint-Malo, France, September 13--16 , 2015 , Proceedings, volume 9293 of Lecture Notes in Computer Science . Springer , 2015. Tim G\u00fcneysu and Helena Handschuh, editors. Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13--16, 2015, Proceedings, volume 9293 of Lecture Notes in Computer Science. Springer, 2015."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Stefan\n      Mangard\n    .\n  Hardware Countermeasures against DPA -- A Statistical Analysis of Their Effectiveness\n  . In Tatsuaki Okamoto editor CT-RSA volume \n  2964\n   of \n  Lecture Notes in Computer Science pages \n  222\n  --\n  235\n  . \n  Springer 2004\n  .  Stefan Mangard. Hardware Countermeasures against DPA -- A Statistical Analysis of Their Effectiveness. In Tatsuaki Okamoto editor CT-RSA volume 2964 of Lecture Notes in Computer Science pages 222--235. Springer 2004.","DOI":"10.1007\/978-3-540-24660-2_18"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0096"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_24"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42033-7_25"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_26"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_33"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_6"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Amir\n      Moradi Oliver\n      Mischke and \n      Thomas\n      Eisenbarth\n    .\n  Correlation-Enhanced Power Analysis Collision Attack\n  . In Stefan Mangard and Fran\u00e7ois-Xavier Standaert editors CHES volume \n  6225\n   of \n  Lecture Notes in Computer Science pages \n  125\n  --\n  139\n  . \n  Springer 2010\n  .   Amir Moradi Oliver Mischke and Thomas Eisenbarth. Correlation-Enhanced Power Analysis Collision Attack. In Stefan Mangard and Fran\u00e7ois-Xavier Standaert editors CHES volume 6225 of Lecture Notes in Computer Science pages 125--139. Springer 2010.","DOI":"10.1007\/978-3-642-15031-9_9"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5955014"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.154"},{"key":"e_1_3_2_1_26_1","first-page":"69","volume-title":"Paterson citeDBLP:conf\/eurocrypt\/2011","author":"Moradi Amir","unstructured":"Amir Moradi , Axel Poschmann , San Ling , Christof Paar , and Huaxiong Wang . Pushing the Limits: A Very Compact and a Threshold Implementation of AES . In Paterson citeDBLP:conf\/eurocrypt\/2011 , pages 69 -- 88 . Amir Moradi, Axel Poschmann, San Ling, Christof Paar, and Huaxiong Wang. Pushing the Limits: A Very Compact and a Threshold Implementation of AES. In Paterson citeDBLP:conf\/eurocrypt\/2011, pages 69--88."},{"key":"e_1_3_2_1_27_1","first-page":"453","volume-title":"Assessment of hiding the higher-order leakages in hardware - what are the achievements versus overheads? In G\u00fcneysu and Handschuh citeDBLP:conf\/ches\/2015","author":"Moradi Amir","unstructured":"Amir Moradi and Alexander Wild . Assessment of hiding the higher-order leakages in hardware - what are the achievements versus overheads? In G\u00fcneysu and Handschuh citeDBLP:conf\/ches\/2015 , pages 453 -- 474 . Amir Moradi and Alexander Wild. Assessment of hiding the higher-order leakages in hardware - what are the achievements versus overheads? In G\u00fcneysu and Handschuh citeDBLP:conf\/ches\/2015, pages 453--474."},{"key":"e_1_3_2_1_28_1","unstructured":"Morita Tech. Side-channel Attack Standard Evaluation Board (SASEBO). http:\/\/www.morita-tech.co.jp\/SAKURA\/en\/index.html.  Morita Tech. Side-channel Attack Standard Evaluation Board (SASEBO). http:\/\/www.morita-tech.co.jp\/SAKURA\/en\/index.html."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9085-7"},{"key":"e_1_3_2_1_30_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-20465-4","volume-title":"Tallinn, Estonia, May 15--19","author":"Paterson Kenneth G.","year":"2011","unstructured":"Kenneth G. Paterson , editor. Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques , Tallinn, Estonia, May 15--19 , 2011 . Proceedings, volume 6632 of Lecture Notes in Computer Science . Springer , 2011. Kenneth G. Paterson, editor. Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15--19, 2011. Proceedings, volume 6632 of Lecture Notes in Computer Science. Springer, 2011."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9086-6"},{"key":"e_1_3_2_1_32_1","first-page":"42","volume-title":"G\u00fcneysu and Handschuh citeDBLP:conf\/ches\/2015","author":"Del Pozo Santos Merino","unstructured":"Santos Merino Del Pozo and Fran\u00e7ois-Xavier Standaert . Blind source separation from single measurements using singular spectrum analysis . In G\u00fcneysu and Handschuh citeDBLP:conf\/ches\/2015 , pages 42 -- 59 . Santos Merino Del Pozo and Fran\u00e7ois-Xavier Standaert. Blind source separation from single measurements using singular spectrum analysis. In G\u00fcneysu and Handschuh citeDBLP:conf\/ches\/2015, pages 42--59."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.15"},{"key":"e_1_3_2_1_34_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-33027-8","volume-title":"Leuven, Belgium, September 9--12","author":"Prouff Emmanuel","year":"2012","unstructured":"Emmanuel Prouff and Patrick Schaumont , editors. Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop , Leuven, Belgium, September 9--12 , 2012 . Proceedings, volume 7428 of Lecture Notes in Computer Science . Springer , 2012. Emmanuel Prouff and Patrick Schaumont, editors. Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9--12, 2012. Proceedings, volume 7428 of Lecture Notes in Computer Science. Springer, 2012."},{"key":"e_1_3_2_1_35_1","first-page":"109","volume-title":"Paterson citeDBLP:conf\/eurocrypt\/2011","author":"Renauld Mathieu","unstructured":"Mathieu Renauld , Fran\u00e7ois-Xavier Standaert , Nicolas Veyrat-Charvillon , Dina Kamel , and Denis Flandre . A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices . In Paterson citeDBLP:conf\/eurocrypt\/2011 , pages 109 -- 128 . Mathieu Renauld, Fran\u00e7ois-Xavier Standaert, Nicolas Veyrat-Charvillon, Dina Kamel, and Denis Flandre. A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices. In Paterson citeDBLP:conf\/eurocrypt\/2011, pages 109--128."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0120-y"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Kai\n      Schramm Thomas J.\n      Wollinger and \n      Christof\n      Paar\n    .\n  A New Class of Collision Attacks and Its Application to DES\n  . In Thomas Johansson editor FSE volume \n  2887\n   of \n  Lecture Notes in Computer Science pages \n  206\n  --\n  222\n  . \n  Springer 2003\n  .  Kai Schramm Thomas J. Wollinger and Christof Paar. A New Class of Collision Attacks and Its Application to DES. In Thomas Johansson editor FSE volume 2887 of Lecture Notes in Computer Science pages 206--222. Springer 2003.","DOI":"10.1007\/978-3-540-39887-5_16"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862437"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Fran\u00e7ois-Xavier\n      Standaert Tal\n      Malkin and \n      Moti\n      Yung\n    .\n  A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks\n  . In Antoine Joux editor EUROCRYPT volume \n  5479\n   of \n  Lecture Notes in Computer Science pages \n  443\n  --\n  461\n  . \n  Springer 2009\n  .  Fran\u00e7ois-Xavier Standaert Tal Malkin and Moti Yung. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In Antoine Joux editor EUROCRYPT volume 5479 of Lecture Notes in Computer Science pages 443--461. Springer 2009.","DOI":"10.1007\/978-3-642-01001-9_26"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Fran\u00e7ois-Xavier\n      Standaert Nicolas\n      Veyrat-Charvillon Elisabeth\n      Oswald Benedikt\n      Gierlichs Marcel\n      Medwed Markus\n      Kasper and \n      Stefan\n      Mangard\n    .\n  The World Is Not Enough: Another Look on Second-Order DPA\n  . In Masayuki Abe editor ASIACRYPT volume \n  6477\n   of \n  Lecture Notes in Computer Science pages \n  112\n  --\n  129\n  . \n  Springer 2010\n  .  Fran\u00e7ois-Xavier Standaert Nicolas Veyrat-Charvillon Elisabeth Oswald Benedikt Gierlichs Marcel Medwed Markus Kasper and Stefan Mangard. The World Is Not Enough: Another Look on Second-Order DPA. In Masayuki Abe editor ASIACRYPT volume 6477 of Lecture Notes in Computer Science pages 112--129. Springer 2010.","DOI":"10.1007\/978-3-642-17373-8_7"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_2"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM Workshop on Theory of Implementation Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2996366.2996369","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2996366.2996369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:10Z","timestamp":1750220590000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2996366.2996369"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":41,"alternative-id":["10.1145\/2996366.2996369","10.1145\/2996366"],"URL":"https:\/\/doi.org\/10.1145\/2996366.2996369","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}