{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:14Z","timestamp":1750221374850,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176337","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"111-118","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["SPEED"],"prefix":"10.1145","author":[{"given":"Mahmoud","family":"Ammar","sequence":"first","affiliation":[{"name":"imec-DistriNet, KU Leuven, Leuven, Belgium"}]},{"given":"Wilfried","family":"Daniels","sequence":"additional","affiliation":[{"name":"imec-DistriNet, KU Leuven, Leuven, Belgium"}]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[{"name":"imec-DistriNet, KU Leuven, Leuven, Belgium"}]},{"given":"Danny","family":"Hughes","sequence":"additional","affiliation":[{"name":"imec-DistriNet, KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2905020"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPNC.2012.6268749"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2017.7962675"},{"key":"e_1_3_2_1_4_1","unstructured":"Atmel. 2009. AVR Atmega 1284p 8-bit microcontroller. http:\/\/www.atmel.com\/images\/doc8059.pdf. (2009). {Online; accessed 13-April-2017}.  Atmel. 2009. AVR Atmega 1284p 8-bit microcontroller. http:\/\/www.atmel.com\/images\/doc8059.pdf. (2009). {Online; accessed 13-April-2017}."},{"volume-title":"http:\/\/ww1.microchip.com\/downloads\/en\/DeviceDoc\/Atmel-8351-MCU_Wireless-AT86RF233_Datasheet.pdf. (2014). {Online","year":"2017","key":"e_1_3_2_1_5_1","unstructured":"Atmel. 2014. AT86RF233. http:\/\/ww1.microchip.com\/downloads\/en\/DeviceDoc\/Atmel-8351-MCU_Wireless-AT86RF233_Datasheet.pdf. (2014). {Online ; accessed 13- July - 2017 }. Atmel. 2014. AT86RF233. http:\/\/ww1.microchip.com\/downloads\/en\/DeviceDoc\/Atmel-8351-MCU_Wireless-AT86RF233_Datasheet.pdf. (2014). {Online; accessed 13-July-2017}."},{"key":"e_1_3_2_1_6_1","unstructured":"G Avoine MA Bingol Ioana Boureanu S Capkun G Hancke S Kardas CH Kim C Lauradoux B Martin J Munilla etal 2017. Security of Distance-Bounding: A Survey. Comput. Surveys (2017).  G Avoine MA Bingol Ioana Boureanu S Capkun G Hancke S Kardas CH Kim C Lauradoux B Martin J Munilla et al. 2017. Security of Distance-Bounding: A Survey. Comput. Surveys (2017)."},{"volume-title":"Distance-bounding protocols. InWorkshop on the Theory and Application of of Cryptographic Techniques","author":"Brands Stefan","key":"e_1_3_2_1_8_1","unstructured":"Stefan Brands and David Chaum . 1993. Distance-bounding protocols. InWorkshop on the Theory and Application of of Cryptographic Techniques . Springer , 344--359. Stefan Brands and David Chaum. 1993. Distance-bounding protocols. InWorkshop on the Theory and Application of of Cryptographic Techniques. Springer, 344--359."},{"key":"e_1_3_2_1_9_1","first-page":"15","article-title":"Major security problems with the unforgeable(Feige)- Fiat-Shamir proofs of identity and how to overcome them","volume":"88","author":"Desmedt Yvo","year":"1988","unstructured":"Yvo Desmedt . 1988 . Major security problems with the unforgeable(Feige)- Fiat-Shamir proofs of identity and how to overcome them . In Proceedings of SECURICOM , Vol. 88. 15 -- 17 . Yvo Desmedt. 1988. Major security problems with the unforgeable(Feige)- Fiat-Shamir proofs of identity and how to overcome them. In Proceedings of SECURICOM, Vol. 88. 15--17.","journal-title":"Proceedings of SECURICOM"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987260.1987273"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2014.066419"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22846-4_17"},{"key":"e_1_3_2_1_13_1","volume-title":"http:\/\/www.metirionic.com\/en\/technology.html. (2015). {Online","author":"XPRO.","year":"2017","unstructured":"metirionic. 2015. ATSAMR21- XPRO. http:\/\/www.metirionic.com\/en\/technology.html. (2015). {Online ; accessed 13- July - 2017 }. metirionic. 2015. ATSAMR21-XPRO. http:\/\/www.metirionic.com\/en\/technology.html. (2015). {Online; accessed 13-July-2017}."},{"key":"e_1_3_2_1_14_1","volume-title":"Sancus: A Low-Cost Security Architecture for Distributed IoT Applications on a Shared Infrastructure.","author":"Noorman Job","year":"2017","unstructured":"Job Noorman . 2017 . Sancus: A Low-Cost Security Architecture for Distributed IoT Applications on a Shared Infrastructure. (2017). Job Noorman. 2017. Sancus: A Low-Cost Security Architecture for Distributed IoT Applications on a Shared Infrastructure. (2017)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888881.1888931"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.41"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2005.1542879"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988546"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/173668.168635"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39595-1_13"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741980"}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Tempe AZ USA","acronym":"CODASPY '18"},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176337"}},"subtitle":["Secure Provable Erasure for Class-1 IoT Devices"],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":20,"alternative-id":["10.1145\/3176258.3176337","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176337","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}