{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:01Z","timestamp":1750306081909,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/M002845\/1"],"award-info":[{"award-number":["EP\/M002845\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134631","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"327-338","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["TRAKS"],"prefix":"10.1145","author":[{"given":"Richard J.","family":"Thomas","sequence":"first","affiliation":[{"name":"University of Birmingham, Birmingham, UK"}]},{"given":"Mihai","family":"Ordean","sequence":"additional","affiliation":[{"name":"University of Birmingham, Birmingham, UK"}]},{"given":"Tom","family":"Chothia","sequence":"additional","affiliation":[{"name":"University of Birmingham, Birmingham, UK"}]},{"given":"Joeri","family":"de Ruiter","sequence":"additional","affiliation":[{"name":"Radboud University, Nijmegen, NL"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1049\/iet-ifs:20060142"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/3052973.3053027"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/PSCE.2011.5772622"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of SCADA Security Scientific Symposium.","author":"Fuloria Shailendra","year":"2010","unstructured":"Shailendra Fuloria , Ross Anderson , Kevin McGrath , Kai Hansen , and Fernando Alvarez . 2010 . The protection of substation communications . In Proceedings of SCADA Security Scientific Symposium. Shailendra Fuloria, Ross Anderson, Kevin McGrath, Kai Hansen, and Fernando Alvarez. 2010. The protection of substation communications. In Proceedings of SCADA Security Scientific Symposium."},{"unstructured":"Kevin Henry Jiayuan Sui and Ge Zhong. 2007. An Overview of the Advanced Access Content System (AACS).  Kevin Henry Jiayuan Sui and Ge Zhong. 2007. An Overview of the Advanced Access Content System (AACS).","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","volume-title":"Identity-based conference key distribution systems. In Conference on the Theory and Application of Cryptographic Techniques. Springer, 175--184","author":"Koyama Kenji","year":"1987","unstructured":"Kenji Koyama and Kazuo Ohta . 1987 . Identity-based conference key distribution systems. In Conference on the Theory and Application of Cryptographic Techniques. Springer, 175--184 . Kenji Koyama and Kazuo Ohta. 1987. Identity-based conference key distribution systems. In Conference on the Theory and Application of Cryptographic Techniques. Springer, 175--184."},{"volume-title":"Risk Assessment of the 3Des in ERTMS","author":"P\u00e9pin Florent","unstructured":"Florent P\u00e9pin and Maria Grazia Vigliotti . 2016. Risk Assessment of the 3Des in ERTMS . Springer International Publishing , Cham , 79--92. Florent P\u00e9pin and Maria Grazia Vigliotti. 2016. Risk Assessment of the 3Des in ERTMS. Springer International Publishing, Cham, 79--92.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_15_1","volume-title":"Round-efficient conference key agreement protocols with provable security. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 614--627","author":"Tzeng Wen-Guey","year":"2000","unstructured":"Wen-Guey Tzeng and Zhi-Jia Tzeng . 2000 . Round-efficient conference key agreement protocols with provable security. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 614--627 . Wen-Guey Tzeng and Zhi-Jia Tzeng. 2000. Round-efficient conference key agreement protocols with provable security. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 614--627."},{"unstructured":"UIC. 2015. UIC ERTMS Projects - UIC. (2015). http:\/\/www.uic.org\/spip.php?article383  UIC. 2015. UIC ERTMS Projects - UIC. (2015). http:\/\/www.uic.org\/spip.php?article383","key":"e_1_3_2_1_16_1"}],"event":{"acronym":"ACSAC 2017","name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134631","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134631"}},"subtitle":["A Universal Key Management Scheme for ERTMS"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":9,"alternative-id":["10.1145\/3134600.3134631","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134631","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}