{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T08:42:28Z","timestamp":1776415348316,"version":"3.51.2"},"reference-count":55,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T00:00:00Z","timestamp":1595376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2020,7,22]]},"abstract":"<jats:p>\n            Transport Layer Security (TLS) 1.3 is a redesign of the Web's most important security protocol. It was standardized in August 2018 after a four year-long, unprecedented design process involving many cryptographers and industry stakeholders. We use the rare opportunity to track deployment, uptake, and use of a new mission-critical security protocol from the early design phase until well over a year after standardization. For a profound view, we combine and analyze data from active domain scans, passive monitoring of large networks, and a crowd-sourcing effort on Android devices. In contrast to TLS 1.2, where adoption took more than five years and was prompted by severe attacks on previous versions, TLS 1.3 is deployed surprisingly speedily and without security concerns calling for it. Just 15 months after standardization, it is used in about 20% of connections we observe. Deployment on popular domains is at 30% and at about 10% across the\n            <jats:italic>com\/net\/org<\/jats:italic>\n            top-level domains (TLDs). We show that the development and fast deployment of TLS 1.3 is best understood as a story of experimentation and centralization. Very few giant, global actors drive the development. We show that Cloudflare alone brings deployment to sizable numbers and describe how actors like Facebook and Google use their control over both client and server endpoints to experiment with the protocol and ultimately deploy it at scale. This story cannot be captured by a single dataset alone, highlighting the need for multi-perspective studies on Internet evolution.\n          <\/jats:p>","DOI":"10.1145\/3411740.3411742","type":"journal-article","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T22:16:55Z","timestamp":1595456215000},"page":"3-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":54,"title":["Tracking the deployment of TLS 1.3 on the web"],"prefix":"10.1145","volume":"50","author":[{"given":"Ralph","family":"Holz","sequence":"first","affiliation":[{"name":"University of Twente and University of Sydney"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jens","family":"Hiller","sequence":"additional","affiliation":[{"name":"RWTH Aachen University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Johanna","family":"Amann","sequence":"additional","affiliation":[{"name":"University of Sydney and ICSI"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abbas","family":"Razaghpanah","sequence":"additional","affiliation":[{"name":"ICSI"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thomas","family":"Jost","sequence":"additional","affiliation":[{"name":"RWTH Aachen University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Narseo","family":"Vallina-Rodriguez","sequence":"additional","affiliation":[{"name":"ICSI and IMDEA Networks"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Oliver","family":"Hohlfeld","sequence":"additional","affiliation":[{"name":"Brandenburg University of Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,7,22]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"[n.d.]. massdns. A high-performance DNS stub resolver in C. Fork of massdns by Quirin Scheitle. https:\/\/github.com\/quirins\/massdns.  [n.d.]. massdns. A high-performance DNS stub resolver in C. Fork of massdns by Quirin Scheitle. https:\/\/github.com\/quirins\/massdns."},{"key":"e_1_2_1_2_1","unstructured":"[n.d.]. OpenSSL changelog. https:\/\/www.openssl.org\/news\/changelog.html.  [n.d.]. OpenSSL changelog. https:\/\/www.openssl.org\/news\/changelog.html."},{"key":"e_1_2_1_3_1","unstructured":"[n.d.]. Zeek Network Security Monitor. https:\/\/www.zeek.org\/.  [n.d.]. Zeek Network Security Monitor. https:\/\/www.zeek.org\/."},{"key":"e_1_2_1_4_1","unstructured":"[n.d.]. zgrab. Go application layer scanner. Fork of zgrab. https:\/\/github.com\/tls-evolution\/zgrab.  [n.d.]. zgrab. Go application layer scanner. Fork of zgrab. https:\/\/github.com\/tls-evolution\/zgrab."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813707"},{"key":"e_1_2_1_6_1","volume-title":"Proc. of the International Web Conference (WWW).","author":"Akhawe D.","unstructured":"D. Akhawe , J. Amann , M. Vallentin , and R. Sommer . 2013. Here's my Cert, so trust me, maybe? Understanding TLS errors on the Web . In Proc. of the International Web Conference (WWW). D. Akhawe, J. Amann, M. Vallentin, and R. Sommer. 2013. Here's my Cert, so trust me, maybe? Understanding TLS errors on the Web. In Proc. of the International Web Conference (WWW)."},{"key":"e_1_2_1_7_1","unstructured":"Alessandro Ghedini. 2018. You get TLS 1.3! You get TLS 1.3! Everyone gets TLS 1.3! https:\/\/blog.cloudflare.com\/you-get-tls-1-3-you-get-tls-1-3-everyone-gets-tls-1-3\/.  Alessandro Ghedini. 2018. You get TLS 1.3! You get TLS 1.3! Everyone gets TLS 1.3! https:\/\/blog.cloudflare.com\/you-get-tls-1-3-you-get-tls-1-3-everyone-gets-tls-1-3\/."},{"key":"e_1_2_1_8_1","volume-title":"Proc. IEEE Symposium on Security and Privacy (S&P).","author":"AlFardan N. J.","unstructured":"N. J. AlFardan and K. G. Paterson . 2013. Lucky Thirteen: breaking the TLS and DTLS record protocols . In Proc. IEEE Symposium on Security and Privacy (S&P). N. J. AlFardan and K. G. Paterson. 2013. Lucky Thirteen: breaking the TLS and DTLS record protocols. In Proc. IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_2_1_9_1","volume-title":"Proc. ACM Internet Measurement Conference (IMC)","author":"Amann J.","unstructured":"J. Amann , O. Gasser , Q. Scheitle , L. Brent , G. Carle , and R. Holz . 2017. Mission accomplished? HTTPS security after DigiNotar . In Proc. ACM Internet Measurement Conference (IMC) . London. J. Amann, O. Gasser, Q. Scheitle, L. Brent, G. Carle, and R. Holz. 2017. Mission accomplished? HTTPS security after DigiNotar. In Proc. ACM Internet Measurement Conference (IMC). London."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523665"},{"key":"e_1_2_1_11_1","volume-title":"Technical Report TR-12-014. ICSI.","author":"Amann J.","year":"2012","unstructured":"J. Amann , M. Vallentin , S. Hall , and R. Sommer . 2012 . Extracting certificates from live traffic: a near real-time SSL notary service. Technical Report TR-12-014. ICSI. J. Amann, M. Vallentin, S. Hall, and R. Sommer. 2012. Extracting certificates from live traffic: a near real-time SSL notary service. Technical Report TR-12-014. ICSI."},{"key":"e_1_2_1_12_1","volume-title":"Proc. USENIX Security Symposium.","author":"Aviram Nimrod","year":"2016","unstructured":"Nimrod Aviram , Sebastian Schinzel , Juraj Somorovsky , Nadia Heninger , Maik Dankel , Jens Steube , Luke Valenta , David Adrian , J. Alex Halderman , Viktor Dukhovni , Emilia K\u00e4sper , Shaanan Cohney , Susanne Engels , Christof Paar , and Yuval Shavitt . 2016 . DROWN: breaking TLS using SSLv2 . In Proc. USENIX Security Symposium. Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia K\u00e4sper, Shaanan Cohney, Susanne Engels, Christof Paar, and Yuval Shavitt. 2016. DROWN: breaking TLS using SSLv2. In Proc. USENIX Security Symposium."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26059-4_5"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_10"},{"key":"e_1_2_1_15_1","unstructured":"David Benjamin. 01 Jun 2016. [TLS] Downgrade protection fallbacks and server time. https:\/\/mailarchive.ietf.org\/arch\/msg\/tls\/la87rmkU4Ay0hrhyiddmbjoQRsY\/.  David Benjamin. 01 Jun 2016. [TLS] Downgrade protection fallbacks and server time. https:\/\/mailarchive.ietf.org\/arch\/msg\/tls\/la87rmkU4Ay0hrhyiddmbjoQRsY\/."},{"key":"e_1_2_1_16_1","volume-title":"TLS ecosystem woes. Talk at RWC","author":"Benjamin David","year":"2018","unstructured":"David Benjamin . 11 Jan 2018. TLS ecosystem woes. Talk at RWC 2018 . https:\/\/youtu.be\/_mE_JmwFi1Y?t=1167. David Benjamin. 11 Jan 2018. TLS ecosystem woes. Talk at RWC 2018. https:\/\/youtu.be\/_mE_JmwFi1Y?t=1167."},{"key":"e_1_2_1_17_1","unstructured":"David Benjamin. 18 Dec 2017. Additional TLS 1.3 results from Chrome. Post to IETF mailing list. https:\/\/mailarchive.ietf.org\/arch\/msg\/tls\/i9blmvG2BEPf1s1OJkenHknRw9c\/.  David Benjamin. 18 Dec 2017. Additional TLS 1.3 results from Chrome. Post to IETF mailing list. https:\/\/mailarchive.ietf.org\/arch\/msg\/tls\/i9blmvG2BEPf1s1OJkenHknRw9c\/."},{"key":"e_1_2_1_18_1","unstructured":"D. Benjamin. 2019. Applying GREASE to TLS extensibility. https:\/\/tools.ietf.org\/html\/draft-ietf-tls-grease-02  D. Benjamin. 2019. Applying GREASE to TLS extensibility. https:\/\/tools.ietf.org\/html\/draft-ietf-tls-grease-02"},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"D. Benjamin. 2020. Applying Generate Random Extensions And Sustain Extensibility (GREASE) to TLS extensibility. https:\/\/tools.ietf.org\/html\/rfc8701  D. Benjamin. 2020. Applying Generate Random Extensions And Sustain Extensibility (GREASE) to TLS extensibility. https:\/\/tools.ietf.org\/html\/rfc8701","DOI":"10.17487\/RFC8701"},{"key":"e_1_2_1_20_1","volume-title":"USENIX Workshop on Offensive Technologies (WOOT).","author":"Beurdouche Benjamin","year":"2015","unstructured":"Benjamin Beurdouche , Antoine Delignat-Lavaud , Nadim Kobeissi , Alfredo Pironti , and Karthikeyan Bhargavan . 2015 . FLEXTLS: a tool for testing TLS implementations . In USENIX Workshop on Offensive Technologies (WOOT). Benjamin Beurdouche, Antoine Delignat-Lavaud, Nadim Kobeissi, Alfredo Pironti, and Karthikeyan Bhargavan. 2015. FLEXTLS: a tool for testing TLS implementations. In USENIX Workshop on Offensive Technologies (WOOT)."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.26"},{"key":"e_1_2_1_22_1","unstructured":"Google blog. 2019. Android Q features and APIs. https:\/\/android-developers.googleblog.com\/2019\/03\/introducing-android-q-beta.html.  Google blog. 2019. Android Q features and APIs. https:\/\/android-developers.googleblog.com\/2019\/03\/introducing-android-q-beta.html."},{"key":"e_1_2_1_23_1","volume-title":"IEEE Conference on Communications and Network Security (CNS).","author":"Chuat L.","unstructured":"L. Chuat , P. Szalachowski , A. Perrig , B. Laurie , and E. Messeri . 2015. Efficient gossip protocols for verifying the consistency of certificate logs . In IEEE Conference on Communications and Network Security (CNS). L. Chuat, P. Szalachowski, A. Perrig, B. Laurie, and E. Messeri. 2015. Efficient gossip protocols for verifying the consistency of certificate logs. In IEEE Conference on Communications and Network Security (CNS)."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.41"},{"key":"e_1_2_1_25_1","unstructured":"Blue Coat. 2017. ProxySG ASG and WSS will interrupt SSL connections when clients using TLS 1.3 access sites also using TLS 1.3. https:\/\/web.archive.org\/web\/20170912061432\/http:\/\/bluecoat.force.com\/knowledgebase\/articles\/Technical_Alert\/000032878.  Blue Coat. 2017. ProxySG ASG and WSS will interrupt SSL connections when clients using TLS 1.3 access sites also using TLS 1.3. https:\/\/web.archive.org\/web\/20170912061432\/http:\/\/bluecoat.force.com\/knowledgebase\/articles\/Technical_Alert\/000032878."},{"key":"e_1_2_1_26_1","volume-title":"Proc. ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM.","author":"Cremers Cas","unstructured":"Cas Cremers , Marko Horvat , Jonathan Hoyland , Sam Scott , and Thyla van der Merwe. 2017. A comprehensive symbolic analysis of TLS 1.3 . In Proc. ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM. Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, and Thyla van der Merwe. 2017. A comprehensive symbolic analysis of TLS 1.3. In Proc. ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.58"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813653"},{"key":"e_1_2_1_30_1","volume-title":"Proc. USENIX Security Symposium.","author":"Durumeric Zakir","year":"2013","unstructured":"Zakir Durumeric , Eric Wustrow , and J Alex Halderman . 2013 . ZMap: Fast Internet-wide scanning and its security applications . In Proc. USENIX Security Symposium. Zakir Durumeric, Eric Wustrow, and J Alex Halderman. 2013. ZMap: Fast Internet-wide scanning and its security applications. In Proc. USENIX Security Symposium."},{"key":"e_1_2_1_31_1","unstructured":"Facebook. 2018. Deploying TLS 1.3 at scale with Fizz a performant open source TLS library. https:\/\/code.fb.com\/security\/fizz\/.  Facebook. 2018. Deploying TLS 1.3 at scale with Fizz a performant open source TLS library. https:\/\/code.fb.com\/security\/fizz\/."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54328-4_7"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815696"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23055"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068856"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813657"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278568"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.18"},{"key":"e_1_2_1_40_1","unstructured":"Bodo M\u00f6ller. 2014. This POODLE bites: exploiting the SSL 3.0 fallback. Google blog. https:\/\/security.googleblog.com\/2014\/10\/this-poodle-bites-exploiting-ssl-30.html.  Bodo M\u00f6ller. 2014. This POODLE bites: exploiting the SSL 3.0 fallback. Google blog. https:\/\/security.googleblog.com\/2014\/10\/this-poodle-bites-exploiting-ssl-30.html."},{"key":"e_1_2_1_41_1","unstructured":"Nick Sullivan. 2016. Introducing TLS 1.3. https:\/\/blog.cloudflare.com\/introducing-tls-1-3\/.  Nick Sullivan. 2016. Introducing TLS 1.3. https:\/\/blog.cloudflare.com\/introducing-tls-1-3\/."},{"key":"e_1_2_1_42_1","unstructured":"Nick Sullivan. 2017. Introducing Zero Round Trip Time Resumption (0-RTT). https:\/\/blog.cloudflare.com\/introducing-0-rtt\/.  Nick Sullivan. 2017. Introducing Zero Round Trip Time Resumption (0-RTT). https:\/\/blog.cloudflare.com\/introducing-0-rtt\/."},{"key":"e_1_2_1_43_1","unstructured":"Nick Sullivan. 2017. Why TLS 1.3 isn't in browsers yet. https:\/\/blog.cloudflare.com\/why-tls-1-3-isnt-in-browsers-yet\/.  Nick Sullivan. 2017. Why TLS 1.3 isn't in browsers yet. https:\/\/blog.cloudflare.com\/why-tls-1-3-isnt-in-browsers-yet\/."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896816"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143400"},{"key":"e_1_2_1_46_1","volume-title":"Haystack: A multi-purpose mobile vantage point in user space. https:\/\/arxiv.org\/abs\/1510.01419.","author":"Razaghpanah Abbas","year":"2015","unstructured":"Abbas Razaghpanah , Narseo Vallina-Rodriguez , Srikanth Sundaresan , Christian Kreibich , Phillipa Gill , Mark Allman , and Vern Paxson . 2015 . Haystack: A multi-purpose mobile vantage point in user space. https:\/\/arxiv.org\/abs\/1510.01419. Abbas Razaghpanah, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Christian Kreibich, Phillipa Gill, Mark Allman, and Vern Paxson. 2015. Haystack: A multi-purpose mobile vantage point in user space. https:\/\/arxiv.org\/abs\/1510.01419."},{"key":"e_1_2_1_47_1","unstructured":"Eric Rescorla. 2016. The Transport Layer Security (TLS) Protocol Version 1.3 - Draft 16. https:\/\/tools.ietf.org\/html\/draft-ietf-tls-tls13-16  Eric Rescorla. 2016. The Transport Layer Security (TLS) Protocol Version 1.3 - Draft 16. https:\/\/tools.ietf.org\/html\/draft-ietf-tls-tls13-16"},{"key":"e_1_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla. 2017. The Transport Layer Security (TLS) Protocol Version 1.3 - Draft 22. https:\/\/tools.ietf.org\/html\/draft-ietf-tls-tls13-22  Eric Rescorla. 2017. The Transport Layer Security (TLS) Protocol Version 1.3 - Draft 22. https:\/\/tools.ietf.org\/html\/draft-ietf-tls-tls13-22","DOI":"10.17487\/RFC8446"},{"key":"e_1_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446 (Historic). https:\/\/tools.ietf.org\/html\/rfc8446 RFC 8446.  Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446 (Historic). https:\/\/tools.ietf.org\/html\/rfc8446 RFC 8446.","DOI":"10.17487\/RFC8446"},{"key":"e_1_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3 - Draft 28. https:\/\/tools.ietf.org\/html\/draft-ietf-tls-tls13-28  Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3 - Draft 28. https:\/\/tools.ietf.org\/html\/draft-ietf-tls-tls13-28","DOI":"10.17487\/RFC8446"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23379"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3232755.3232756"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278562"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278574"},{"key":"e_1_2_1_55_1","volume-title":"Proc. ACM Internet Measurement Conference (IMC).","author":"VanderSloot B.","unstructured":"B. VanderSloot , J. Amann , M. Bernhard , Z. Durumeric , M. Bailey , and J.A. Halderman . 2016. Towards a complete view of the certificate ecosystem . In Proc. ACM Internet Measurement Conference (IMC). B. VanderSloot, J. Amann, M. Bernhard, Z. Durumeric, M. Bailey, and J.A. Halderman. 2016. Towards a complete view of the certificate ecosystem. In Proc. ACM Internet Measurement Conference (IMC)."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644896"},{"key":"e_1_2_1_57_1","volume-title":"Proc. ACM Internet Measurement Conference (IMC).","author":"Zhang L.","unstructured":"L. Zhang , D. Choffnes , D. Levin , T. Dumitras , A. Mislove , A. Schulman , and C. Wilson . 2014. Analysis of SSL certificate reissues and revocations in the wake of Heartbleed . In Proc. ACM Internet Measurement Conference (IMC). L. Zhang, D. Choffnes, D. Levin, T. Dumitras, A. Mislove, A. Schulman, and C. Wilson. 2014. Analysis of SSL certificate reissues and revocations in the wake of Heartbleed. In Proc. ACM Internet Measurement Conference (IMC)."}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411740.3411742","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411740.3411742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:39Z","timestamp":1750197759000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411740.3411742"}},"subtitle":["a story of experimentation and centralization"],"short-title":[],"issued":{"date-parts":[[2020,7,22]]},"references-count":55,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,7,22]]}},"alternative-id":["10.1145\/3411740.3411742"],"URL":"https:\/\/doi.org\/10.1145\/3411740.3411742","relation":{},"ISSN":["0146-4833"],"issn-type":[{"value":"0146-4833","type":"print"}],"subject":[],"published":{"date-parts":[[2020,7,22]]},"assertion":[{"value":"2020-07-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}