{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T11:51:10Z","timestamp":1759146670420,"version":"3.41.0"},"reference-count":61,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Des. Autom. Electron. Syst."],"published-print":{"date-parts":[[2018,5,31]]},"abstract":"<jats:p>The Internet of Things (IoT), an emerging global network of uniquely identifiable embedded computing devices within the existing Internet infrastructure, is transforming how we live and work by increasing the connectedness of people and things on a scale that was once unimaginable. In addition to facilitated information and service exchange between connected objects, enhanced computing power and analytic capabilities of individual objects, and increased interaction between objects and their environments, the IoT also raises new security and privacy challenges. Hardware trust across the IoT supply chain is the foundation of IoT security and privacy. Two major supply chain issues\u2014disappearance\/theft of authentic IoT devices and appearance of inauthentic ones\u2014have to be addressed to secure the IoT supply chain and lay the foundation for further security and privacy-defensive measures. Comprehensive solutions that enable IoT device authentication and traceability across the entire supply chain (i.e., during distribution and after being provisioned) need to be established. Existing hardware, software, and network protection methods, however, do not address IoT supply chain issues. To mitigate this shortcoming, we propose an RFID-enabled solution called ReSC that aims at defending the IoT supply chain. By incorporating three techniques\u2014one-to-one mapping between RFID tag identity and control chip identity; unique tag trace, which records tag provenance and history information; and neighborhood attestation of IoT devices\u2014ReSC is resistant to split attacks (i.e., separating tag from product, swapping tags), counterfeit injection, product theft throughout the entire supply chain, device recycling, and illegal network service access (e.g., Internet, cable TV, online games, remote firmware updates). Simulations, theoretical analysis, and experimental results based on a printed circuit board (PCB) prototype demonstrate the effectiveness of ReSC. Finally, we evaluate the security of our proposed scheme against various attacks.<\/jats:p>","DOI":"10.1145\/3174850","type":"journal-article","created":{"date-parts":[[2018,2,2]],"date-time":"2018-02-02T13:36:22Z","timestamp":1517578582000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["ReSC"],"prefix":"10.1145","volume":"23","author":[{"given":"Kun","family":"Yang","sequence":"first","affiliation":[{"name":"University of Florida, Gainesville, FL"}]},{"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL"}]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL"}]}],"member":"320","published-online":{"date-parts":[[2018,2]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Internet of things: A survey on enabling technologies, protocols, and applications","author":"Al-Fuqaha Ala","year":"2015","unstructured":"Ala Al-Fuqaha , Mohsen Guizani , Mehdi Mohammadi , Mohammed Aledhari , and Moussa Ayyash . 2015. Internet of things: A survey on enabling technologies, protocols, and applications . IEEE Communications Surveys 8 Tutorials 17, 4 ( 2015 ), 2347--237. Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, and Moussa Ayyash. 2015. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys 8 Tutorials 17, 4 (2015), 2347--237."},{"doi-asserted-by":"publisher","key":"e_1_2_1_2_1","DOI":"10.1016\/j.comnet.2010.05.010"},{"volume-title":"Automation 8 Test in Europe Conference 8 Exhibition (DATE\u201916)","author":"Aysu Aydin","unstructured":"Aydin Aysu , Shravya Gaddam , Harsha Mandadi , Carol Pinto , Luke Wegryn , and Patrick Schaumont . 2016. A design method for remote integrity checking of complex PCBs. In 2016 Design , Automation 8 Test in Europe Conference 8 Exhibition (DATE\u201916) . IEEE , 1517--1522. Aydin Aysu, Shravya Gaddam, Harsha Mandadi, Carol Pinto, Luke Wegryn, and Patrick Schaumont. 2016. A design method for remote integrity checking of complex PCBs. In 2016 Design, Automation 8 Test in Europe Conference 8 Exhibition (DATE\u201916). IEEE, 1517--1522.","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings (INFOCOM\u201900)","volume":"2","author":"Bahl Paramvir","unstructured":"Paramvir Bahl and Venkata N. Padmanabhan . 2000. RADAR: An in-building RF-based user location and tracking system . In Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings (INFOCOM\u201900) . Vol. 2 . IEEE, 775--784. Paramvir Bahl and Venkata N. Padmanabhan. 2000. RADAR: An in-building RF-based user location and tracking system. In Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings (INFOCOM\u201900). Vol. 2. IEEE, 775--784."},{"volume-title":"Coke Machine on the Internet.","author":"Carnegie Mellon University","unstructured":"Carnegie Mellon University . 1982. The \u201cOnly \u201d Coke Machine on the Internet. Retrieved from https:\/\/www.cs.cmu.edu\/&sim;coke\/history_long.txt?reposted_at=2015-09-8. Carnegie Mellon University. 1982. The \u201cOnly\u201d Coke Machine on the Internet. Retrieved from https:\/\/www.cs.cmu.edu\/&sim;coke\/history_long.txt?reposted_at=2015-09-8.","key":"e_1_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_6_1","DOI":"10.1016\/j.csi.2006.04.004"},{"key":"e_1_2_1_7_1","volume-title":"Designing and Implementing the Factory of the Future at Mahindra Vehicle Manufacturers. (April","author":"Holmes Christopher","year":"2015","unstructured":"Christopher Holmes . 2015. Designing and Implementing the Factory of the Future at Mahindra Vehicle Manufacturers. (April 2015 ). Retrieved from http:\/\/www.cisco.com\/c\/dam\/en\/us\/solutions\/collateral\/industry-solutions\/idc-manufacturing.pdf. Christopher Holmes. 2015. Designing and Implementing the Factory of the Future at Mahindra Vehicle Manufacturers. (April 2015). Retrieved from http:\/\/www.cisco.com\/c\/dam\/en\/us\/solutions\/collateral\/industry-solutions\/idc-manufacturing.pdf."},{"unstructured":"Tim Cicerchi. 2014. High-Capacity RFID Tags. Retrieved from http:\/\/blog.pepperl-fuchs.us\/high-capacity-rfid-tags.  Tim Cicerchi. 2014. High-Capacity RFID Tags. Retrieved from http:\/\/blog.pepperl-fuchs.us\/high-capacity-rfid-tags.","key":"e_1_2_1_8_1"},{"volume-title":"How Cisco Transformed Its Supply Chain. (May","year":"2014","unstructured":"Cisco. 2014. How Cisco Transformed Its Supply Chain. (May 2014 ). Retrieved from http:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/enterprise\/cisco-on-cisco\/cs-boit-05272014-supply-chain.pdf. Cisco. 2014. How Cisco Transformed Its Supply Chain. (May 2014). Retrieved from http:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/enterprise\/cisco-on-cisco\/cs-boit-05272014-supply-chain.pdf.","key":"e_1_2_1_9_1"},{"unstructured":"John Coyle C. Langley Robert Novack and Brian Gibson. 2012. Supply Chain Management: A Logistics Perspective. Cengage Learning.  John Coyle C. Langley Robert Novack and Brian Gibson. 2012. Supply Chain Management: A Logistics Perspective. Cengage Learning.","key":"e_1_2_1_10_1"},{"unstructured":"Joan Daemen and Vincent Rijmen. 1999. AES proposal: Rijndael.  Joan Daemen and Vincent Rijmen. 1999. AES proposal: Rijndael.","key":"e_1_2_1_11_1"},{"volume-title":"HawkEyes: An advanced IP geolocation approach: IP geolocation using semantic and measurement based techniques. In 2011 2nd Worldwide Cybersecurity Summit (WCS\u201911)","author":"Dahnert Art","unstructured":"Art Dahnert . 2011. HawkEyes: An advanced IP geolocation approach: IP geolocation using semantic and measurement based techniques. In 2011 2nd Worldwide Cybersecurity Summit (WCS\u201911) . IEEE , 1--3. Art Dahnert. 2011. HawkEyes: An advanced IP geolocation approach: IP geolocation using semantic and measurement based techniques. In 2011 2nd Worldwide Cybersecurity Summit (WCS\u201911). IEEE, 1--3.","key":"e_1_2_1_12_1"},{"doi-asserted-by":"crossref","unstructured":"Tim Dierks. 2008. The transport layer security (TLS) protocol version 1.2. Retrieved from https:\/\/www.ietf.org\/rfc\/rfc5246.txt.  Tim Dierks. 2008. The transport layer security (TLS) protocol version 1.2. Retrieved from https:\/\/www.ietf.org\/rfc\/rfc5246.txt.","key":"e_1_2_1_13_1","DOI":"10.17487\/rfc5246"},{"doi-asserted-by":"publisher","key":"e_1_2_1_14_1","DOI":"10.1016\/j.comnet.2011.08.011"},{"doi-asserted-by":"publisher","key":"e_1_2_1_15_1","DOI":"10.1016\/j.comnet.2012.06.018"},{"key":"e_1_2_1_16_1","first-page":"1","article-title":"The internet of things: How the next evolution of the internet is changing everything","volume":"1","author":"Evans Dave","year":"2011","unstructured":"Dave Evans . 2011 . The internet of things: How the next evolution of the internet is changing everything . CISCO White Paper 1 (2011), 1 -- 11 . Dave Evans. 2011. The internet of things: How the next evolution of the internet is changing everything. CISCO White Paper 1 (2011), 1--11.","journal-title":"CISCO White Paper"},{"unstructured":"FUJITSU. 2014. World\u2019s Largest-Capacity 64KByte FRAM Metal Mount RFID Tag. Retrieved from http:\/\/www.fujitsu.com\/downloads\/AIT\/ait-downloads-64kbtag.pdf.  FUJITSU. 2014. World\u2019s Largest-Capacity 64KByte FRAM Metal Mount RFID Tag. Retrieved from http:\/\/www.fujitsu.com\/downloads\/AIT\/ait-downloads-64kbtag.pdf.","key":"e_1_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_18_1","DOI":"10.1109\/TNET.2006.886332"},{"doi-asserted-by":"publisher","key":"e_1_2_1_19_1","DOI":"10.1145\/2593069.2593157"},{"doi-asserted-by":"publisher","key":"e_1_2_1_20_1","DOI":"10.1007\/978-3-540-88313-5_18"},{"doi-asserted-by":"publisher","key":"e_1_2_1_21_1","DOI":"10.5555\/977405.978630"},{"doi-asserted-by":"publisher","key":"e_1_2_1_22_1","DOI":"10.1109\/TC.2008.212"},{"doi-asserted-by":"publisher","key":"e_1_2_1_23_1","DOI":"10.1109\/ATS.2014.70"},{"key":"e_1_2_1_24_1","volume-title":"2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops\u201910)","author":"Hu Ling","year":"2010","unstructured":"Ling Hu and Cyrus Shahabi . 2010 . Privacy assurance in mobile sensing networks: Go beyond trusted servers . In 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops\u201910) . IEEE, 613--619. Ling Hu and Cyrus Shahabi. 2010. Privacy assurance in mobile sensing networks: Go beyond trusted servers. In 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops\u201910). IEEE, 613--619."},{"unstructured":"EPCglobal Inc. 2015. EPC Radio-Frequency Identity Protocols Generation-2 UHF RFID Protocol for Communications at 860 MHz - 960 MHz Version 2.0.1. Retrieved from https:\/\/www.gs1.org\/sites\/default\/files\/docs\/epc\/Gen2_Protocol_Standard.pdf.  EPCglobal Inc. 2015. EPC Radio-Frequency Identity Protocols Generation-2 UHF RFID Protocol for Communications at 860 MHz - 960 MHz Version 2.0.1. Retrieved from https:\/\/www.gs1.org\/sites\/default\/files\/docs\/epc\/Gen2_Protocol_Standard.pdf.","key":"e_1_2_1_25_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_26_1","DOI":"10.1007\/11761679_19"},{"doi-asserted-by":"publisher","key":"e_1_2_1_27_1","DOI":"10.1007\/s102070100002"},{"doi-asserted-by":"publisher","key":"e_1_2_1_28_1","DOI":"10.1145\/2517968.2517976"},{"volume-title":"Introduction to Modern Cryptography","author":"Katz Jonathan","unstructured":"Jonathan Katz and Yehuda Lindell . 2014. Introduction to Modern Cryptography . CRC Press . Jonathan Katz and Yehuda Lindell. 2014. Introduction to Modern Cryptography. CRC Press.","key":"e_1_2_1_29_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_30_1","DOI":"10.1145\/1177080.1177090"},{"key":"e_1_2_1_31_1","volume-title":"Supply Chain Hardware Integrity for Electronics Defense (SHIELD). (March","author":"Bernstein Kerry","year":"2014","unstructured":"Kerry Bernstein . 2014. Supply Chain Hardware Integrity for Electronics Defense (SHIELD). (March 2014 ). Retrieved from http:\/\/www.darpa.mil\/program\/supply-chain-hardware-integrity-for-electronics-defense. Kerry Bernstein. 2014. Supply Chain Hardware Integrity for Electronics Defense (SHIELD). (March 2014). Retrieved from http:\/\/www.darpa.mil\/program\/supply-chain-hardware-integrity-for-electronics-defense."},{"doi-asserted-by":"publisher","key":"e_1_2_1_32_1","DOI":"10.1109\/MWSCAS.2014.6908424"},{"key":"e_1_2_1_33_1","volume-title":"Attackers Use Stolen Credentials to Hack Cisco Networking Devices. (August","author":"Kovacs Eduard","year":"2015","unstructured":"Eduard Kovacs . 2015. Attackers Use Stolen Credentials to Hack Cisco Networking Devices. (August 2015 ). Retrieved from http:\/\/www.securityweek.com\/attackers-use-stolen-credentials-hack-cisco-networking-devices. Eduard Kovacs. 2015. Attackers Use Stolen Credentials to Hack Cisco Networking Devices. (August 2015). Retrieved from http:\/\/www.securityweek.com\/attackers-use-stolen-credentials-hack-cisco-networking-devices."},{"key":"e_1_2_1_34_1","volume-title":"HMAC: Keyed-hashing for message authentication.","author":"Krawczyk Hugo","year":"1997","unstructured":"Hugo Krawczyk , Ran Canetti , and Mihir Bellare . 1997 . HMAC: Keyed-hashing for message authentication. Hugo Krawczyk, Ran Canetti, and Mihir Bellare. 1997. HMAC: Keyed-hashing for message authentication."},{"doi-asserted-by":"publisher","key":"e_1_2_1_35_1","DOI":"10.1007\/978-3-642-01516-8_20"},{"doi-asserted-by":"publisher","key":"e_1_2_1_36_1","DOI":"10.1145\/1592451.1592455"},{"unstructured":"NXP Semiconductors. 2014. I2C Bus Specification and User Manual. (April). Retrieved from https:\/\/www.nxp.com\/docs\/en\/user-guide\/UM10204.pdf.  NXP Semiconductors. 2014. I2C Bus Specification and User Manual. (April). Retrieved from https:\/\/www.nxp.com\/docs\/en\/user-guide\/UM10204.pdf.","key":"e_1_2_1_37_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_38_1","DOI":"10.1145\/964723.383073"},{"doi-asserted-by":"publisher","key":"e_1_2_1_39_1","DOI":"10.1145\/990680.990707"},{"unstructured":"Proofpoint. 2014. Proofpoint Uncovers Internet of Things (IoT) Cyberattack. (January). Retrieved from http:\/\/investors.proofpoint.com\/releasedetail.cfm?releaseid&equals;819799.  Proofpoint. 2014. Proofpoint Uncovers Internet of Things (IoT) Cyberattack. (January). Retrieved from http:\/\/investors.proofpoint.com\/releasedetail.cfm?releaseid&equals;819799.","key":"e_1_2_1_40_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_41_1","DOI":"10.1109\/ISVLSI.2012.40"},{"doi-asserted-by":"publisher","key":"e_1_2_1_42_1","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"e_1_2_1_43_1","first-page":"589","article-title":"Retail theft prevention and information device. (Dec. 31 1996)","volume":"5","author":"Robinson Donald G.","year":"1996","unstructured":"Donald G. Robinson , Michael W. Geatz , and Michael J. Corcoran . 1996 . Retail theft prevention and information device. (Dec. 31 1996) . US Patent 5 , 589 ,820. Donald G. Robinson, Michael W. Geatz, and Michael J. Corcoran. 1996. Retail theft prevention and information device. (Dec. 31 1996). US Patent 5,589,820.","journal-title":"US Patent"},{"doi-asserted-by":"publisher","key":"e_1_2_1_44_1","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"e_1_2_1_45_1","first-page":"233","article-title":"Access control of networked data. (May 15, 2001)","volume":"6","author":"Shannon Steven","year":"2001","unstructured":"Steven Shannon . 2001 . Access control of networked data. (May 15, 2001) . US Patent 6 , 233 ,618. Steven Shannon. 2001. Access control of networked data. (May 15, 2001). US Patent 6,233,618.","journal-title":"US Patent"},{"doi-asserted-by":"publisher","key":"e_1_2_1_46_1","DOI":"10.1145\/1278480.1278484"},{"doi-asserted-by":"publisher","key":"e_1_2_1_47_1","DOI":"10.1109\/TC.2007.4"},{"doi-asserted-by":"publisher","key":"e_1_2_1_48_1","DOI":"10.1109\/MDT.2010.7"},{"key":"e_1_2_1_49_1","first-page":"367","article-title":"Wireless sensor network security: A survey. Security in Distributed","volume":"1","author":"Walters John Paul","year":"2007","unstructured":"John Paul Walters , Zhengqiang Liang , Weisong Shi , and Vipin Chaudhary . 2007 . Wireless sensor network security: A survey. Security in Distributed , Grid, Mobile, and Pervasive Computing 1 (2007), 367 . John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary. 2007. Wireless sensor network security: A survey. Security in Distributed, Grid, Mobile, and Pervasive Computing 1 (2007), 367.","journal-title":"Grid, Mobile, and Pervasive Computing"},{"doi-asserted-by":"publisher","key":"e_1_2_1_50_1","DOI":"10.1109\/TWC.2009.080437"},{"doi-asserted-by":"publisher","key":"e_1_2_1_51_1","DOI":"10.1145\/2906147"},{"doi-asserted-by":"publisher","key":"e_1_2_1_52_1","DOI":"10.1109\/TCAD.2014.2356453"},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the International Test Conference","author":"Yang Bo","year":"2004","unstructured":"Bo Yang , Kaijie Wu , and Ramesh Karri . 2004 . Scan based side channel attack on dedicated hardware implementations of data encryption standard . In Proceedings of the International Test Conference , 2004 (ITC\u201904). IEEE, 339--344. Bo Yang, Kaijie Wu, and Ramesh Karri. 2004. Scan based side channel attack on dedicated hardware implementations of data encryption standard. In Proceedings of the International Test Conference, 2004 (ITC\u201904). IEEE, 339--344."},{"key":"e_1_2_1_54_1","volume-title":"Workshop on RFID and Lightweight Crypto.","author":"Yang Jeongkyu","year":"2005","unstructured":"Jeongkyu Yang , Jaemin Park , Hyunrok Lee , Kui Ren , and Kwangjo Kim . 2005 . Mutual authentication protocol . In Workshop on RFID and Lightweight Crypto. Jeongkyu Yang, Jaemin Park, Hyunrok Lee, Kui Ren, and Kwangjo Kim. 2005. Mutual authentication protocol. In Workshop on RFID and Lightweight Crypto."},{"doi-asserted-by":"publisher","key":"e_1_2_1_55_1","DOI":"10.1007\/978-3-319-24837-0_3"},{"doi-asserted-by":"publisher","key":"e_1_2_1_56_1","DOI":"10.1145\/2639108.2639111"},{"key":"e_1_2_1_57_1","volume-title":"An efficient authentication and access control scheme for perception layer of internet of things. Applied Mathematics 8 Information Sciences 8, 4","author":"Ye Ning","year":"2014","unstructured":"Ning Ye , Yan Zhu , Ru-Chuan Wang , Reza Malekian , and Lin Qiao-min. 2014. An efficient authentication and access control scheme for perception layer of internet of things. Applied Mathematics 8 Information Sciences 8, 4 ( 2014 ), 1617. Ning Ye, Yan Zhu, Ru-Chuan Wang, Reza Malekian, and Lin Qiao-min. 2014. An efficient authentication and access control scheme for perception layer of internet of things. Applied Mathematics 8 Information Sciences 8, 4 (2014), 1617."},{"doi-asserted-by":"publisher","key":"e_1_2_1_58_1","DOI":"10.1109\/MILCOM.2007.4454918"},{"unstructured":"Davide Zanetti Srdjan Capkun and Ari Juels. 2013. Tailing RFID tags for clone detection. In NDSS.  Davide Zanetti Srdjan Capkun and Ari Juels. 2013. Tailing RFID tags for clone detection. In NDSS.","key":"e_1_2_1_59_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_60_1","DOI":"10.1109\/RFID.2010.5467257"},{"key":"e_1_2_1_61_1","volume-title":"Black Hat USA","author":"Zillner Tobias","year":"2015","unstructured":"Tobias Zillner and Sebastian Strobl . 2015 . Zigbee exploited - The good, the bad and the ugly . In Black Hat USA 2015. Tobias Zillner and Sebastian Strobl. 2015. Zigbee exploited - The good, the bad and the ugly. In Black Hat USA 2015."}],"container-title":["ACM Transactions on Design Automation of Electronic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3174850","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3174850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:33Z","timestamp":1750212693000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3174850"}},"subtitle":["An RFID-Enabled Solution for Defending IoT Supply Chain"],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":61,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,5,31]]}},"alternative-id":["10.1145\/3174850"],"URL":"https:\/\/doi.org\/10.1145\/3174850","relation":{},"ISSN":["1084-4309","1557-7309"],"issn-type":[{"type":"print","value":"1084-4309"},{"type":"electronic","value":"1557-7309"}],"subject":[],"published":{"date-parts":[[2018,2]]},"assertion":[{"value":"2017-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-02-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}