{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T07:11:45Z","timestamp":1760425905499,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Zurich Information Security and Privacy Center (ZISC)"},{"name":"Eidgen\u00f6ssische Technische Hochschule Z\u00fcrich"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384743","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:22Z","timestamp":1601915602000},"page":"73-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["PISKES: Pragmatic Internet-Scale Key-Establishment System"],"prefix":"10.1145","author":[{"given":"Benjamin","family":"Rothenberger","sequence":"first","affiliation":[{"name":"ETH Z\u00fcrich, Z\u00fcrich, Switzerland"}]},{"given":"Dominik","family":"Roos","sequence":"additional","affiliation":[{"name":"Anapaya Systems, Z\u00fcrich, Switzerland"}]},{"given":"Markus","family":"Legner","sequence":"additional","affiliation":[{"name":"ETH Z\u00fcrich, Z\u00fcrich, Switzerland"}]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[{"name":"ETH Z\u00fcrich &amp; Anapaya Systems, Z\u00fcrich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Computers & Security","volume":"39","author":"Anagnostopoulos M.","year":"2013"},{"volume":"38","volume-title":"ACM SIGCOMM Computer Communication Review","author":"Andersen D. G.","key":"e_1_3_2_2_2_1"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"T. Anderson K. Birman R. Broberg M. Caesar D. Comer C. Cotton M. J. Freedman A. Haeberlen Z. G. Ives A. Krishnamurthy etal 2013. The NEBULA future internet architecture. In The Future Internet Assembly. Springer.  T. Anderson K. Birman R. Broberg M. Caesar D. Comer C. Cotton M. J. Freedman A. Haeberlen Z. G. Ives A. Krishnamurthy et al. 2013. The NEBULA future internet architecture. In The Future Internet Assembly. Springer.","DOI":"10.1007\/978-3-642-38082-2_2"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"F. Baker and P. Savola. 2004. Ingress Filtering for Multihomed Networks. RFC 3704.  F. Baker and P. Savola. 2004. Ingress Filtering for Multihomed Networks. RFC 3704.","DOI":"10.17487\/rfc3704"},{"volume-title":"Proceedings of the Symposium on Network and Distributed System Security (NDSS).","author":"Basescu C.","key":"e_1_3_2_2_5_1"},{"key":"e_1_3_2_2_6_1","unstructured":"T. Bates. 2020. CIDR Report. https:\/\/www.cidr-report.org\/as2.0\/.  T. Bates. 2020. CIDR Report. https:\/\/www.cidr-report.org\/as2.0\/."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"A. Bittau D. Giffin M. Handley D. Mazieres Q. Slack and E. Smith. 2019. Cryptographic Protection of TCP Streams (tcpcrypt). RFC 8548.  A. Bittau D. Giffin M. Handley D. Mazieres Q. Slack and E. Smith. 2019. Cryptographic Protection of TCP Streams (tcpcrypt). RFC 8548.","DOI":"10.17487\/RFC8548"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"S. Blake-Wilson M. Nystrom D. Hopwood J. Mikkelsen and T. Wright. 2003. Transport Layer Security (TLS) Extensions. RFC 3546.  S. Blake-Wilson M. Nystrom D. Hopwood J. Mikkelsen and T. Wright. 2003. Transport Layer Security (TLS) Extensions. RFC 3546.","DOI":"10.17487\/rfc3546"},{"volume-title":"Proceedings of the Internet Measurement Conference. ACM.","author":"B\u00f6ttger T.","key":"e_1_3_2_2_10_1"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"R. Bush. 2014. Origin Validation Operation Based on the Resource Public Key Infrastructure (RPKI). RFC 7115.  R. Bush. 2014. Origin Validation Operation Based on the Resource Public Key Infrastructure (RPKI). RFC 7115.","DOI":"10.17487\/rfc7115"},{"key":"e_1_3_2_2_12_1","unstructured":"CAIDA. 2016. CAIDA Passive Monitor: equinix-chicago. https:\/\/www.caida.org\/data\/monitors\/passive-equinix-chicago.xml.  CAIDA. 2016. CAIDA Passive Monitor: equinix-chicago. https:\/\/www.caida.org\/data\/monitors\/passive-equinix-chicago.xml."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"B. Carpenter and S. Jiang. 2013. Transmission and Processing of IPv6 Extension Headers. RFC 7045.  B. Carpenter and S. Jiang. 2013. Transmission and Processing of IPv6 Extension Headers. RFC 7045.","DOI":"10.17487\/rfc7045"},{"key":"e_1_3_2_2_14_1","unstructured":"M. Casado A. Akella P. Cao N. Provos and S. Shenker. 2006. Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood Protection. In SRUTI.  M. Casado A. Akella P. Cao N. Provos and S. Shenker. 2006. Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood Protection. In SRUTI."},{"key":"e_1_3_2_2_15_1","unstructured":"Cisco. 2018. Cisco Predicts More IP Traffic in the Next Five Years Than in the History of the Internet. https:\/\/newsroom.cisco.com\/press-release-content?type=webcontent&articleId=1955935  Cisco. 2018. Cisco Predicts More IP Traffic in the Next Five Years Than in the History of the Internet. https:\/\/newsroom.cisco.com\/press-release-content?type=webcontent&articleId=1955935"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"A. Conta S. Deering and M. Gupta. 2006. Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification. RFC 4443.  A. Conta S. Deering and M. Gupta. 2006. Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification. RFC 4443.","DOI":"10.17487\/rfc4443"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280.  D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280.","DOI":"10.17487\/rfc5280"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"J. Damas M. Graff and P. Vixie. 2013. Extension Mechanisms for DNS (EDNS(0)). RFC 6891.  J. Damas M. Graff and P. Vixie. 2013. Extension Mechanisms for DNS (EDNS(0)). RFC 6891.","DOI":"10.17487\/rfc6891"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"crossref","unstructured":"J. Dickinson S. Dickinson R. Bellis A. Mankin and D. Wessels. 2016. DNS Transport over TCP - Implementation Requirements. RFC 7766.  J. Dickinson S. Dickinson R. Bellis A. Mankin and D. Wessels. 2016. DNS Transport over TCP - Implementation Requirements. RFC 7766.","DOI":"10.17487\/RFC7766"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"Z. Duan X. Yuan and J. Chandrashekar. 2006. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates. In INFOCOM.  Z. Duan X. Yuan and J. Chandrashekar. 2006. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates. In INFOCOM.","DOI":"10.1109\/INFOCOM.2006.128"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"D. Eastlake 3rd and M. Andrews. 2016. Domain Name System (DNS) Cookies. RFC 7873.  D. Eastlake 3rd and M. Andrews. 2016. Domain Name System (DNS) Cookies. RFC 7873.","DOI":"10.17487\/RFC7873"},{"key":"e_1_3_2_2_23_1","unstructured":"ECRYPT. 2019. eBATS: ECRYPT Benchmarking of Asymmetric Systems. https:\/\/bench.cr.yp.to\/results-dh.html.  ECRYPT. 2019. eBATS: ECRYPT Benchmarking of Asymmetric Systems. https:\/\/bench.cr.yp.to\/results-dh.html."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"P. Ferguson and D. Senie. 2000. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827.  P. Ferguson and D. Senie. 2000. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827.","DOI":"10.17487\/rfc2827"},{"key":"e_1_3_2_2_25_1","unstructured":"M. Gieben. 2019. DNS library in Go. https:\/\/github.com\/miekg\/dns.  M. Gieben. 2019. DNS library in Go. https:\/\/github.com\/miekg\/dns."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"F. Gont. 2010. ICMP Attacks against TCP. RFC 5927.  F. Gont. 2010. ICMP Attacks against TCP. RFC 5927.","DOI":"10.17487\/rfc5927"},{"key":"e_1_3_2_2_27_1","unstructured":"Google. 2016. Roughtime. https:\/\/roughtime.googlesource.com\/.  Google. 2016. Roughtime. https:\/\/roughtime.googlesource.com\/."},{"volume-title":"Intel AES New Instructions Set","year":"2010","author":"Gueron S.","key":"e_1_3_2_2_28_1"},{"volume-title":"IEEE Conference on Communications and Network Security (CNS).","author":"Herzberg A.","key":"e_1_3_2_2_29_1"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"P. Hoffman and P. McManus. 2018. DNS Queries over HTTPS (DoH). RFC 8484.  P. Hoffman and P. McManus. 2018. DNS Queries over HTTPS (DoH). RFC 8484.","DOI":"10.17487\/RFC8484"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"P. Hoffman and J. Schlyter. 2012. The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA. RFC 6698.  P. Hoffman and J. Schlyter. 2012. The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA. RFC 6698.","DOI":"10.17487\/rfc6698"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Z. Hu L. Zhu J. Heidemann A. Mankin D. Wessels and P. Hoffman. 2016. Specification for DNS over Transport Layer Security (TLS). RFC 7858.  Z. Hu L. Zhu J. Heidemann A. Mankin D. Wessels and P. Hoffman. 2016. Specification for DNS over Transport Layer Security (TLS). RFC 7858.","DOI":"10.17487\/RFC7858"},{"volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM.","author":"Jackson D.","key":"e_1_3_2_2_33_1"},{"volume-title":"Proceedings of the ACM conference on computer and communications security. ACM.","author":"Jin C.","key":"e_1_3_2_2_34_1"},{"volume-title":"Proceedings of the ACM SIGCOMM Conference on Internet Measurement. ACM.","author":"John W.","key":"e_1_3_2_2_35_1"},{"volume-title":"Proceedings of the Internet Measurement Conference. ACM.","author":"Jonker M.","key":"e_1_3_2_2_36_1"},{"key":"e_1_3_2_2_37_1","unstructured":"J. Katz A. J. Menezes P. C. Van Oorschot and S. A. Vanstone. 1996. Handbook of applied cryptography .CRC press.  J. Katz A. J. Menezes P. C. Van Oorschot and S. A. Vanstone. 1996. Handbook of applied cryptography .CRC press."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"C. Kaufman P. Hoffman Y. Nir P. Eronen and T. Kivinen. 2014. Internet Key Exchange Protocol Version 2 (IKEv2). RFC 7296.  C. Kaufman P. Hoffman Y. Nir P. Eronen and T. Kivinen. 2014. Internet Key Exchange Protocol Version 2 (IKEv2). RFC 7296.","DOI":"10.17487\/rfc7296"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"crossref","unstructured":"S. Kent and R. Atkinson. 1998. Security Architecture for the Internet Protocol. RFC 2401.  S. Kent and R. Atkinson. 1998. Security Architecture for the Internet Protocol. RFC 2401.","DOI":"10.17487\/rfc2401"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","unstructured":"S. Kent and K. Seo. 2005. Security Architecture for the IP. RFC 4301.  S. Kent and K. Seo. 2005. Security Architecture for the IP. RFC 4301.","DOI":"10.17487\/rfc4301"},{"volume":"44","volume-title":"ACM SIGCOMM Computer Communication Review","author":"Kim T. H.-J.","key":"e_1_3_2_2_41_1"},{"volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Li A.","key":"e_1_3_2_2_42_1"},{"volume":"3","volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies","author":"Li J.","key":"e_1_3_2_2_43_1"},{"volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Liu X.","key":"e_1_3_2_2_44_1"},{"volume-title":"Proceedings., 10th. IEEE.","year":"1997","author":"Lowe G.","key":"e_1_3_2_2_45_1"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354232"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"C. Lynn S. Kent and K. Seo. 2004. X.509 Extensions for IP Addresses and AS Identifiers. RFC 3779.  C. Lynn S. Kent and K. Seo. 2004. X.509 Extensions for IP Addresses and AS Identifiers. RFC 3779.","DOI":"10.17487\/rfc3779"},{"volume-title":"International Conference on Computer Aided Verification. Springer.","author":"Meier S.","key":"e_1_3_2_2_48_1"},{"volume-title":"Domain names - concepts and facilities. STD 13","author":"Mockapetris P.","key":"e_1_3_2_2_49_1"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485927"},{"volume-title":"Communications (APCC), 2012 18th Asia-Pacific Conference on. IEEE.","author":"Murray D.","key":"e_1_3_2_2_51_1"},{"volume-title":"Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies. ACM.","author":"Naous J.","key":"e_1_3_2_2_52_1"},{"volume-title":"14th Annual Worldwide Infrastructure Security Report. https:\/\/www.netscout.com\/sites\/default\/files\/2019-03\/SECR_005_EN-1901-WISR.pdf","author":"NETSCOUT.","key":"e_1_3_2_2_53_1"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","unstructured":"C. Neuman T. Yu S. Hartman and K. Raeburn. 2005. The Kerberos Network Authentication Service (V5). RFC 4120.  C. Neuman T. Yu S. Hartman and K. Raeburn. 2005. The Kerberos Network Authentication Service (V5). RFC 4120.","DOI":"10.17487\/rfc4120"},{"key":"e_1_3_2_2_55_1","unstructured":"NIST. 2019. RPKI Monitor. https:\/\/rpki-monitor.antd.nist.gov.  NIST. 2019. RPKI Monitor. https:\/\/rpki-monitor.antd.nist.gov."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"crossref","unstructured":"K. Park and H. Lee. 2001. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. In ACM SIGCOMM computer communication review Vol. 31. ACM.  K. Park and H. Lee. 2001. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. In ACM SIGCOMM computer communication review Vol. 31. ACM.","DOI":"10.1145\/383059.383061"},{"key":"e_1_3_2_2_57_1","unstructured":"PerfOps. 2018. DNS Performance Analytics and Comparison. https:\/\/www.dnsperf.com\/.  PerfOps. 2018. DNS Performance Analytics and Comparison. https:\/\/www.dnsperf.com\/."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67080-5"},{"key":"e_1_3_2_2_59_1","unstructured":"O. Peters. 2017. Ed25519 Supercop ref10 implementation. https:\/\/github.com\/orlp\/ed25519.  O. Peters. 2017. Ed25519 Supercop ref10 implementation. https:\/\/github.com\/orlp\/ed25519."},{"key":"e_1_3_2_2_60_1","unstructured":"D. Project. 2017. Data Plane Development Kit. https:\/\/dpdk.org.  D. Project. 2017. Data Plane Development Kit. https:\/\/dpdk.org."},{"key":"e_1_3_2_2_61_1","unstructured":"T. O. Project. 2018. OpenSSL libcrypto. https:\/\/github.com\/openssl\/openssl.  T. O. Project. 2018. OpenSSL libcrypto. https:\/\/github.com\/openssl\/openssl."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"crossref","unstructured":"T. Reddy D. Wing and P. Patil. 2017. DNS over Datagram Transport Layer Security (DTLS). RFC 8094.  T. Reddy D. Wing and P. Patil. 2017. DNS over Datagram Transport Layer Security (DTLS). RFC 8094.","DOI":"10.17487\/RFC8094"},{"key":"e_1_3_2_2_63_1","unstructured":"E. Rescorla. 2018. The TLS Protocol Version 1.3. RFC 8446.  E. Rescorla. 2018. The TLS Protocol Version 1.3. RFC 8446."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"crossref","unstructured":"E. Rescorla and N. Modadugu. 2012. Datagram Transport Layer Security Version 1.2. RFC 6347.  E. Rescorla and N. Modadugu. 2012. Datagram Transport Layer Security Version 1.2. RFC 6347.","DOI":"10.17487\/rfc6347"},{"key":"e_1_3_2_2_65_1","unstructured":"E. Rescorla K. Oku N. Sullivan and C. A. Wood. 2019. Encrypted Server Name Indication for TLS 1.3. Internet-Draft draft-ietf-tls-esni-05. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-tls-esni-05  E. Rescorla K. Oku N. Sullivan and C. A. Wood. 2019. Encrypted Server Name Indication for TLS 1.3. Internet-Draft draft-ietf-tls-esni-05. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-tls-esni-05"},{"key":"e_1_3_2_2_66_1","unstructured":"D. Roos L. Chuat and A. Perrig. 2019. SCION Control-Plane PKI. https:\/\/github.com\/scionproto\/scion\/blob\/master\/doc\/ControlPlanePKI.md  D. Roos L. Chuat and A. Perrig. 2019. SCION Control-Plane PKI. https:\/\/github.com\/scionproto\/scion\/blob\/master\/doc\/ControlPlanePKI.md"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23233"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"crossref","unstructured":"J. Salowey H. Zhou P. Eronen and H. Tschofenig. 2008. Transport Layer Security (TLS) Session Resumption without Server-Side State. RFC 5077.  J. Salowey H. Zhou P. Eronen and H. Tschofenig. 2008. Transport Layer Security (TLS) Session Resumption without Server-Side State. RFC 5077.","DOI":"10.17487\/rfc5077"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"crossref","unstructured":"J. Touch A. Mankin and R. Bonica. 2010. The TCP Authentication Option. RFC 5925.  J. Touch A. Mankin and R. Bonica. 2010. The TCP Authentication Option. RFC 5925.","DOI":"10.17487\/rfc5925"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"crossref","unstructured":"Q. Vohra and E. Chen. 2012. BGP Support for Four-Octet Autonomous System (AS) Number Space. RFC 6793.  Q. Vohra and E. Chen. 2012. BGP Support for Four-Octet Autonomous System (AS) Number Space. RFC 6793.","DOI":"10.17487\/rfc6793"},{"volume-title":"Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on. IEEE.","author":"Yaar A.","key":"e_1_3_2_2_71_1"},{"key":"e_1_3_2_2_72_1","volume-title":"IEEE\/ACM Transactions on Networking (ToN)","volume":"16","author":"Yang X.","year":"2008"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"crossref","unstructured":"S. T. Zargar J. Joshi and D. Tipper. 2013. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE communications surveys & tutorials Vol. 15 4 (2013).  S. T. Zargar J. Joshi and D. Tipper. 2013. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE communications surveys & tutorials Vol. 15 4 (2013).","DOI":"10.1109\/SURV.2013.031413.00127"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"ASIA CCS '20"},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384743","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:27Z","timestamp":1750200087000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384743"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":73,"alternative-id":["10.1145\/3320269.3384743","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384743","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}