{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:08Z","timestamp":1773510908716,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-14-1-0351"],"award-info":[{"award-number":["FA9550-14-1-0351"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012659","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872051"],"award-info":[{"award-number":["61872051"]}],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","award":["NRF2014NCR-NCR001-31"],"award-info":[{"award-number":["NRF2014NCR-NCR001-31"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007040","name":"Singapore University of Technology and Design","doi-asserted-by":"publisher","award":["SRG-ISTD-2017-124"],"award-info":[{"award-number":["SRG-ISTD-2017-124"]}],"id":[{"id":"10.13039\/501100007040","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359827","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Proof of aliveness"],"prefix":"10.1145","author":[{"given":"Chenglu","family":"Jin","sequence":"first","affiliation":[{"name":"University of Connecticut"}]},{"given":"Zheng","family":"Yang","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]},{"given":"Marten","family":"van Dijk","sequence":"additional","affiliation":[{"name":"University of Connecticut"}]},{"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2015. SWaT: Secure Water Treatment Testbed. https:\/\/itrust.sutd.edu.sg\/testbeds\/secure-water-treatment-swat\/. https:\/\/itrust.sutd.edu.sg\/testbeds\/secure-water-treatment-swat\/  2015. SWaT: Secure Water Treatment Testbed. https:\/\/itrust.sutd.edu.sg\/testbeds\/secure-water-treatment-swat\/. https:\/\/itrust.sutd.edu.sg\/testbeds\/secure-water-treatment-swat\/"},{"key":"e_1_3_2_1_2_1","volume-title":"Technology Administration","author":"Barker Elaine B","unstructured":"Elaine B Barker and John Michael Kelsey . 2007. Recommendation for random number generation using deterministic random bit generators (revised). US Department of Commerce , Technology Administration , National Institute of .... Elaine B Barker and John Michael Kelsey. 2007. Recommendation for random number generation using deterministic random bit generators (revised). US Department of Commerce, Technology Administration, National Institute of ...."},{"key":"e_1_3_2_1_3_1","volume-title":"EUROCRYPT (Lecture Notes in Computer Science)","author":"Bellare Mihir","unstructured":"Mihir Bellare and Phillip Rogaway . 2006. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs . In EUROCRYPT (Lecture Notes in Computer Science) , Vol. 4004 . Springer , 409--426. Mihir Bellare and Phillip Rogaway. 2006. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. In EUROCRYPT (Lecture Notes in Computer Science), Vol. 4004. Springer, 409--426."},{"key":"e_1_3_2_1_4_1","volume-title":"TCC (Lecture Notes in Computer Science)","author":"Biham Eli","unstructured":"Eli Biham , Yaron J. Goren , and Yuval Ishai . 2008. Basing Weak Public-Key Cryptography on Strong One-Way Functions . In TCC (Lecture Notes in Computer Science) , Vol. 4948 . Springer , 55--72. Eli Biham, Yaron J. Goren, and Yuval Ishai. 2008. Basing Weak Public-Key Cryptography on Strong One-Way Functions. In TCC (Lecture Notes in Computer Science), Vol. 4948. Springer, 55--72."},{"key":"e_1_3_2_1_5_1","volume-title":"Trisis has the security world spooked, stumped and searching for answers. https:\/\/www.cyberscoop.com\/trisis-ics-malware-saudi-arabia\/ [Accessed","author":"Bing Chris","year":"2018","unstructured":"Chris Bing . 2018. Trisis has the security world spooked, stumped and searching for answers. https:\/\/www.cyberscoop.com\/trisis-ics-malware-saudi-arabia\/ [Accessed Oct. , 2018 ]. Chris Bing. 2018. Trisis has the security world spooked, stumped and searching for answers. https:\/\/www.cyberscoop.com\/trisis-ics-malware-saudi-arabia\/ [Accessed Oct., 2018]."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.647965"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1008731.1008734"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21568-2_10"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653711"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Shang-Ming Chang Shiuhpyng Shieh Warren W. Lin and Chih-Ming Hsieh. 2006. An efficient broadcast authentication scheme in wireless sensor networks. In AsiaCCS. ACM 311--320.  Shang-Ming Chang Shiuhpyng Shieh Warren W. Lin and Chih-Ming Hsieh. 2006. An efficient broadcast authentication scheme in wireless sensor networks. In AsiaCCS. ACM 311--320.","DOI":"10.1145\/1128817.1128864"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134621"},{"key":"e_1_3_2_1_12_1","first-page":"1","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016 . Intel SGX Explained . IACR Cryptology ePrint Archive 2016 , 086 (2016), 1 -- 118 . Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive 2016, 086 (2016), 1--118.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_13_1","volume-title":"CRYPTO (Lecture Notes in Computer Science)","author":"De Anindya","unstructured":"Anindya De , Luca Trevisan , and Madhur Tulsiani . 2010. Time Space Tradeoffs for Attacks against One-Way Functions and PRGs . In CRYPTO (Lecture Notes in Computer Science) , Vol. 6223 . Springer , 649--665. Anindya De, Luca Trevisan, and Madhur Tulsiani. 2010. Time Space Tradeoffs for Attacks against One-Way Functions and PRGs. In CRYPTO (Lecture Notes in Computer Science), Vol. 6223. Springer, 649--665."},{"key":"e_1_3_2_1_14_1","volume-title":"EUROCRYPT (2) (Lecture Notes in Computer Science)","author":"Dodis Yevgeniy","unstructured":"Yevgeniy Dodis , Siyao Guo , and Jonathan Katz . 2017. Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input , Revisited. In EUROCRYPT (2) (Lecture Notes in Computer Science) , Vol. 10211 . 473--495. Yevgeniy Dodis, Siyao Guo, and Jonathan Katz. 2017. Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited. In EUROCRYPT (2) (Lecture Notes in Computer Science), Vol. 10211. 473--495."},{"key":"e_1_3_2_1_15_1","volume-title":"https:\/\/duo.com\/. Accessed","author":"Security Duo","year":"2018","unstructured":"Duo. 2018. Duo Security . https:\/\/duo.com\/. Accessed : Dec. 2018 . Duo. 2018. Duo Security. https:\/\/duo.com\/. Accessed: Dec. 2018."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02254791"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Amos Fiat and Moni Naor. 1991. Rigorous Time\/Space Tradeoffs for Inverting Functions. In STOC. ACM 534--541.  Amos Fiat and Moni Naor. 1991. Rigorous Time\/Space Tradeoffs for Inverting Functions. In STOC. ACM 534--541.","DOI":"10.1145\/103418.103473"},{"key":"e_1_3_2_1_18_1","volume-title":"Lower Bounds on the Efficiency of Generic Cryptographic Constructions","author":"Gennaro Rosario","unstructured":"Rosario Gennaro and Luca Trevisan . 2000. Lower Bounds on the Efficiency of Generic Cryptographic Constructions . In FOCS. IEEE Computer Society , 305--313. Rosario Gennaro and Luca Trevisan. 2000. Lower Bounds on the Efficiency of Generic Cryptographic Constructions. In FOCS. IEEE Computer Society, 305--313."},{"key":"e_1_3_2_1_19_1","volume-title":"PAtt: Physics-based Attestation of Control Systems. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID}).","author":"Ghaeini Hamid Reza","year":"2019","unstructured":"Hamid Reza Ghaeini , Matthew Chan , Raad Bahmani , Ferdinand Brasser , Luis Garcia , Jianying Zhou , Ahmad-Reza Sadeghi , Nils Ole Tippenhauer , and Saman Zonouz . 2019 . PAtt: Physics-based Attestation of Control Systems. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID}). Hamid Reza Ghaeini, Matthew Chan, Raad Bahmani, Ferdinand Brasser, Luis Garcia, Jianying Zhou, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer, and Saman Zonouz. 2019. PAtt: Physics-based Attestation of Control Systems. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID})."},{"key":"e_1_3_2_1_20_1","volume-title":"The Foundations of Cryptography -","author":"Goldreich Oded","unstructured":"Oded Goldreich . 2001. The Foundations of Cryptography - Volume 1 , Basic Techniques. Cambridge University Press . Oded Goldreich. 2001. The Foundations of Cryptography - Volume 1, Basic Techniques. Cambridge University Press."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"e_1_3_2_1_22_1","volume-title":"https:\/\/www.google.com\/landing\/2step\/. Accessed","author":"Step Verification Google","year":"2018","unstructured":"Google. 2018. Google 2- Step Verification . https:\/\/www.google.com\/landing\/2step\/. Accessed : Dec. 2018 . Google. 2018. Google 2-Step Verification. https:\/\/www.google.com\/landing\/2step\/. Accessed: Dec. 2018."},{"key":"e_1_3_2_1_23_1","volume-title":"Computer Security","author":"Govil Naman","unstructured":"Naman Govil , Anand Agrawal , and Nils Ole Tippenhauer . 2017. On ladder logic bombs in industrial control systems . In Computer Security . Springer , 110--126. Naman Govil, Anand Agrawal, and Nils Ole Tippenhauer. 2017. On ladder logic bombs in industrial control systems. In Computer Security. Springer, 110--126."},{"key":"e_1_3_2_1_24_1","first-page":"97","article-title":"How To Re-initialize a Hash Chain","volume":"2004","author":"Goyal Vipul","year":"2004","unstructured":"Vipul Goyal . 2004 . How To Re-initialize a Hash Chain . IACR Cryptology ePrint Archive 2004 (2004), 97 . Vipul Goyal. 2004. How To Re-initialize a Hash Chain. IACR Cryptology ePrint Archive 2004 (2004), 97.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Neil Haller. 1995. The S\/KEY one-time password system. (1995).  Neil Haller. 1995. The S\/KEY one-time password system. (1995).","DOI":"10.17487\/rfc1760"},{"key":"e_1_3_2_1_26_1","volume-title":"Security and privacy for implantable medical devices","author":"Halperin Daniel","year":"2008","unstructured":"Daniel Halperin , Thomas S Heydt-Benjamin , Kevin Fu , Tadayoshi Kohno , and William H Maisel . 2008. Security and privacy for implantable medical devices . IEEE pervasive computing 1 ( 2008 ), 30--39. Daniel Halperin, Thomas S Heydt-Benjamin, Kevin Fu, Tadayoshi Kohno, and William H Maisel. 2008. Security and privacy for implantable medical devices. IEEE pervasive computing 1 (2008), 30--39."},{"key":"e_1_3_2_1_27_1","volume-title":"Exploiting Network Surveillance Cameras Like a Hollywood Hacker. Black Hat USA","author":"Heffner Craig","year":"2013","unstructured":"Craig Heffner . 2013. Exploiting Network Surveillance Cameras Like a Hollywood Hacker. Black Hat USA ( 2013 ). Craig Heffner. 2013. Exploiting Network Surveillance Cameras Like a Hollywood Hacker. Black Hat USA (2013)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056220"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00189260"},{"key":"e_1_3_2_1_30_1","unstructured":"Blake Johnson Dan Caban Marina Krotofil Dan Scali Nathan Brubaker and Christopher Glyer. 2017. Attackers Deploy New ICS Attack Framework \"TRITON\" and Cause Operational Disruption to Critical Infrastructure. https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/12\/attackers-deploy-new-ics-attack-framework-triton.html [Accessed Oct. 2018].  Blake Johnson Dan Caban Marina Krotofil Dan Scali Nathan Brubaker and Christopher Glyer. 2017. Attackers Deploy New ICS Attack Framework \"TRITON\" and Cause Operational Disruption to Critical Infrastructure. https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/12\/attackers-deploy-new-ics-attack-framework-triton.html [Accessed Oct. 2018]."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23074"},{"key":"e_1_3_2_1_32_1","volume-title":"Introduction to modern cryptography","author":"Katz Jonathan","unstructured":"Jonathan Katz and Yehuda Lindell . 2014. Introduction to modern cryptography . CRC press . Jonathan Katz and Yehuda Lindell. 2014. Introduction to modern cryptography. CRC press."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346865"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133989"},{"key":"e_1_3_2_1_35_1","volume-title":"Man pleads guilty in CalISO computer attack. https:\/\/www.bizjournals.com\/sacramento\/stories\/2007\/12\/10\/daily65.html [Accessed","author":"Lamb Celia","year":"2018","unstructured":"Celia Lamb . 2007. Man pleads guilty in CalISO computer attack. https:\/\/www.bizjournals.com\/sacramento\/stories\/2007\/12\/10\/daily65.html [Accessed Oct. , 2018 ]. Celia Lamb. 2007. Man pleads guilty in CalISO computer attack. https:\/\/www.bizjournals.com\/sacramento\/stories\/2007\/12\/10\/daily65.html [Accessed Oct., 2018]."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2012.07.007"},{"key":"e_1_3_2_1_39_1","volume-title":"ZERO THINGS COOL ABOUT A THREAT GROUP TARGETING THE POWER GRID. Black Hat USA","author":"Lee Robert","year":"2017","unstructured":"Robert Lee , Joe Slowik , Ben Miller , Anton Cherepanov , and Robert Lipovsky . 2017. INDUSTROYER\/CRASHOVERRIDE : ZERO THINGS COOL ABOUT A THREAT GROUP TARGETING THE POWER GRID. Black Hat USA ( 2017 ). Robert Lee, Joe Slowik, Ben Miller, Anton Cherepanov, and Robert Lipovsky. 2017. INDUSTROYER\/CRASHOVERRIDE: ZERO THINGS COOL ABOUT A THREAT GROUP TARGETING THE POWER GRID. Black Hat USA (2017)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1027794.1027800"},{"key":"e_1_3_2_1_41_1","unstructured":"Miracl 2018. MIRACL Cryptographic Library. https:\/\/bit.ly\/2MltKVG  Miracl 2018. MIRACL Cryptographic Library. https:\/\/bit.ly\/2MltKVG"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/240799.240801"},{"key":"e_1_3_2_1_43_1","volume-title":"Totp: Time-based one-time password algorithm. Technical Report.","author":"M'Raihi David","year":"2011","unstructured":"David M'Raihi , Salah Machani , Mingliang Pei , and Johan Rydell . 2011 . Totp: Time-based one-time password algorithm. Technical Report. David M'Raihi, Salah Machani, Mingliang Pei, and Johan Rydell. 2011. Totp: Time-based one-time password algorithm. Technical Report."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.501988"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4082"},{"key":"e_1_3_2_1_46_1","volume-title":"Dawn Xiaodong Song, and J. D. Tygar","author":"Perrig Adrian","year":"2001","unstructured":"Adrian Perrig , Ran Canetti , Dawn Xiaodong Song, and J. D. Tygar . 2001 . Efficient and Secure Source Authentication for Multicast. In NDSS. The Internet Society . Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, and J. D. Tygar. 2001. Efficient and Secure Source Authentication for Multicast. In NDSS. The Internet Society."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"e_1_3_2_1_48_1","volume-title":"197: Advanced encryption standard (AES). Federal information processing standards publication 197, 441","author":"Pub NIST FIPS","year":"2001","unstructured":"NIST FIPS Pub . 2001. 197: Advanced encryption standard (AES). Federal information processing standards publication 197, 441 ( 2001 ), 0311. NIST FIPS Pub. 2001. 197: Advanced encryption standard (AES). Federal information processing standards publication 197, 441 (2001), 0311."},{"key":"e_1_3_2_1_49_1","volume-title":"SAS 2019: Triton ICS Malware Hits A Second Victim. https:\/\/threatpost.com\/triton-ics-malware-second-victim\/143658\/ [Accessed","author":"Seals Tara","year":"2019","unstructured":"Tara Seals . 2019 . SAS 2019: Triton ICS Malware Hits A Second Victim. https:\/\/threatpost.com\/triton-ics-malware-second-victim\/143658\/ [Accessed Jun., 2019]. Tara Seals. 2019. SAS 2019: Triton ICS Malware Hits A Second Victim. https:\/\/threatpost.com\/triton-ics-malware-second-victim\/143658\/ [Accessed Jun., 2019]."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"e_1_3_2_1_52_1","volume-title":"Plc-blaster: A worm living solely in the plc. Black Hat Asia (p. N\/A)","author":"Spenneberg Ralf","year":"2016","unstructured":"Ralf Spenneberg , Maik Br\u00fcggemann , and Hendrik Schwartke . 2016 . Plc-blaster: A worm living solely in the plc. Black Hat Asia (p. N\/A) (2016). Ralf Spenneberg, Maik Br\u00fcggemann, and Hendrik Schwartke. 2016. Plc-blaster: A worm living solely in the plc. Black Hat Asia (p. N\/A) (2016)."},{"key":"e_1_3_2_1_53_1","volume-title":"National Institute of Standards and Technology","author":"Standard Secure Hash","year":"2002","unstructured":"Secure Hash Standard . 2002. FIPS PUB 180-2. National Institute of Standards and Technology ( 2002 ). Secure Hash Standard. 2002. FIPS PUB 180-2. National Institute of Standards and Technology (2002)."},{"key":"e_1_3_2_1_54_1","unstructured":"Hoeteck Wee. 2005. On obfuscating point functions. In STOC. ACM 523--532.  Hoeteck Wee. 2005. On obfuscating point functions. In STOC. ACM 523--532."},{"key":"e_1_3_2_1_55_1","volume-title":"2010 3rd International Conference on Computer Science and Information Technology","volume":"8","author":"Yang X.","unstructured":"X. Yang , J. Wang , J. Chen , and X. Pan . 2010. A self-renewal hash chain scheme based on fair exchange idea(SRHC-FEI) . In 2010 3rd International Conference on Computer Science and Information Technology , Vol. 8 . 152--156. X. Yang, J. Wang, J. Chen, and X. Pan. 2010. A self-renewal hash chain scheme based on fair exchange idea(SRHC-FEI). In 2010 3rd International Conference on Computer Science and Information Technology, Vol. 8. 152--156."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42045-0_14"},{"key":"e_1_3_2_1_57_1","unstructured":"Kim Zetter. 2016. INSIDE THE CUNNING UNPRECEDENTED HACK OF UKRAINE'S POWER GRID. https:\/\/www.wired.com\/2016\/03\/inside-cunning-unprecedented-hack-ukraines-power-grid\/. Accessed: 2019-05-18.  Kim Zetter. 2016. INSIDE THE CUNNING UNPRECEDENTED HACK OF UKRAINE'S POWER GRID. https:\/\/www.wired.com\/2016\/03\/inside-cunning-unprecedented-hack-ukraines-power-grid\/. Accessed: 2019-05-18."},{"key":"e_1_3_2_1_58_1","volume-title":"EUC (2)","author":"Zhang Haojun","unstructured":"Haojun Zhang , Xiaoxue Li , and Rui Ren . 2008. A Novel Self-Renewal Hash Chain and Its Implementation . In EUC (2) . IEEE Computer Society , 144--149. Haojun Zhang, Xiaoxue Li, and Rui Ren. 2008. A Novel Self-Renewal Hash Chain and Its Implementation. In EUC (2). IEEE Computer Society, 144--149."},{"key":"e_1_3_2_1_59_1","volume-title":"WISE (Lecture Notes in Computer Science)","author":"Zhang Haojun","unstructured":"Haojun Zhang and Yuefei Zhu . 2006. Self-Updating Hash Chains and Their Implementations . In WISE (Lecture Notes in Computer Science) , Vol. 4255 . Springer , 387--397. Haojun Zhang and Yuefei Zhu. 2006. Self-Updating Hash Chains and Their Implementations. In WISE (Lecture Notes in Computer Science), Vol. 4255. Springer, 387--397."}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA","acronym":"ACSAC '19"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359827","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359827","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359827"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":58,"alternative-id":["10.1145\/3359789.3359827","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359827","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}