{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:05:59Z","timestamp":1775228759747,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T00:00:00Z","timestamp":1636761600000},"content-version":"vor","delay-in-days":1,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1717948, 1750704, 1932447, 2114113"],"award-info":[{"award-number":["1717948, 1750704, 1932447, 2114113"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484580","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:27Z","timestamp":1636805127000},"page":"1118-1134","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["On-device IoT Certificate Revocation Checking with Small Memory and Low Latency"],"prefix":"10.1145","author":[{"given":"Xiaofeng","family":"Shi","sequence":"first","affiliation":[{"name":"University of California, Santa Cruz, Santa Cruz, CA, USA"}]},{"given":"Shouqian","family":"Shi","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz, Santa Cruz, CA, USA"}]},{"given":"Minmei","family":"Wang","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz, Santa Cruz, CA, USA"}]},{"given":"Jonne","family":"Kaunisto","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz, Santa Cruz, CA, USA"}]},{"given":"Chen","family":"Qian","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz, Santa Cruz, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2016. An Internet of Things Reference Architecture. White Paper Symantec."},{"key":"e_1_3_2_2_2_1","unstructured":"2019. Why Digital Certificates Are Essential for Managing Mobile Devices. White Paper DigiCert Symantec's Website Security business."},{"key":"e_1_3_2_2_3_1","unstructured":"2020. TinyCR source code. https:\/\/github.com\/jonnekaunisto\/TinyCR."},{"key":"e_1_3_2_2_4_1","volume-title":"https:\/\/censys.io\/certificates. Accessed","year":"2019","unstructured":"2021. Censys. https:\/\/censys.io\/certificates. Accessed: 2019."},{"key":"e_1_3_2_2_5_1","volume-title":"https:\/\/cloud.google.com\/bigquery. Accessed","author":"BigQuery Google","year":"2019","unstructured":"2021. Google BigQuery. https:\/\/cloud.google.com\/bigquery. Accessed: 2019."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2805700"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_2_9_1","volume-title":"Bloomier Filters: A Second Look. In In Proceedings of the European Symposium on Algorithms (ESA).","author":"Charles Denis","year":"2008","unstructured":"Denis Charles and Kumar Chellapilla. 2008. Bloomier Filters: A Second Look. In In Proceedings of the European Symposium on Algorithms (ESA)."},{"key":"e_1_3_2_2_10_1","volume-title":"The Bloomier Filter: An Efficient Data Structure for Static Support Lookup Tables. In In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA). 30--39","author":"Chazelle Bernard","year":"2004","unstructured":"Bernard Chazelle, Joe Kilian, Ronitt Rubinfeld, and Ayellet Tal. 2004. The Bloomier Filter: An Efficient Data Structure for Static Support Lookup Tables. In In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA). 30--39."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Donald Eastlake et al. 2011. Transport Layer Security (TLS) Extensions: Extension Definitions. Technical Report. RFC 6066 January.","DOI":"10.17487\/rfc6066"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674994"},{"key":"e_1_3_2_2_13_1","volume-title":"Revoking Intermediate Certificates: Introducing Onecrl. Mozilla Security Blog","author":"Goodwin Mark","year":"2015","unstructured":"Mark Goodwin. 2015. Revoking Intermediate Certificates: Introducing Onecrl. Mozilla Security Blog (2015)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7633"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Russell Housley Warwick Ford William Polk and David Solo. 1999. Internet X. 509 Public Key Infrastructure Certificate and CRL Profile. Technical Report. RFC 2459 January.","DOI":"10.17487\/rfc2459"},{"key":"e_1_3_2_2_16_1","volume-title":"2016 IEEE 41st Conference on Local Computer Networks (LCN).","author":"Hu Qinwen","unstructured":"Qinwen Hu, Muhammad Rizwan Asghar, and Nevil Brownlee. [n.d.]. Certificate Revocation Guard (CRG): An Efficient Mechanism for Checking Certificate Revocation. In 2016 IEEE 41st Conference on Local Computer Networks (LCN)."},{"key":"e_1_3_2_2_17_1","volume-title":"In Proceedings of the IEEE Symposium on Security and Privacy (SP).","author":"Kumar D.","unstructured":"D. Kumar, M. Bailey, Z. Wang, M. Hyder, J. Dickinson, G. Beck, D. Adrian, J. Mason, Z. Durumeric, and J. A. Halderman. 2018. Tracking certificate misissuance in the wild. In In Proceedings of the IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_2_18_1","volume-title":"Revocation Checking and Chrome's CRL. ImperialViolet (blog)","author":"Langley Adam","year":"2012","unstructured":"Adam Langley. 2012. Revocation Checking and Chrome's CRL. ImperialViolet (blog) (2012)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.17"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2893249"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815685"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Michael Myers Rich Ankney Ambarish Malpani Slava Galperin and Carlisle Adams. 1999. X. 509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP. Technical Report. RFC 2560.","DOI":"10.17487\/rfc2560"},{"key":"e_1_3_2_2_23_1","volume-title":"Security in Internet of Things: A Survey. In In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 1--6.","author":"Oracevic Alma","year":"2017","unstructured":"Alma Oracevic, Selma Dilek, and Suat Ozdemir. 2017. Security in Internet of Things: A Survey. In In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 1--6."},{"key":"e_1_3_2_2_24_1","volume-title":"Cuckoo Hashing. In In Proceedings of the European Symposium on Algorithms (ESA). Springer, 121--133","author":"Pagh Rasmus","year":"2001","unstructured":"Rasmus Pagh and Flemming Friche Rodler. 2001. Cuckoo Hashing. In In Proceedings of the European Symposium on Algorithms (ESA). Springer, 121--133."},{"key":"e_1_3_2_2_25_1","volume-title":"URL: http:\/\/www. daemonology. net\/bsdiff","author":"Percival Colin","year":"2003","unstructured":"Colin Percival. 2003. Binary Diff\/Patch Utility. URL: http:\/\/www. daemonology. net\/bsdiff (2003)."},{"key":"e_1_3_2_2_26_1","volume-title":"Amir-Mohammad Rahmani, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho, and Hannu Tenhunen.","author":"Moosavi Sanaz Rahimi","year":"2015","unstructured":"Sanaz Rahimi Moosavi, Tuan Nguyen Gia, Amir-Mohammad Rahmani, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho, and Hannu Tenhunen. 2015. SEA: A Secure And Efficient Authentication And Authorization Architecture for IoT-based Healthcare Using Smart Gateways. In Procedia Computer Science, Vol. 52. Elsevier, 452--459."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla and Nagendra Modadugu. 2012. Datagram Transport Layer Security Version 1.2. (2012).","DOI":"10.17487\/rfc6347"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3393691.3394198"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24084"},{"key":"e_1_3_2_2_30_1","volume-title":"Simple and Flexible Revocation Checking with Privacy. In International Workshop on Privacy Enhancing Technologies. Springer, 351--367","author":"Solis John","year":"2006","unstructured":"John Solis and Gene Tsudik. 2006. Simple and Flexible Revocation Checking with Privacy. In International Workshop on Privacy Enhancing Technologies. Springer, 351--367."},{"key":"e_1_3_2_2_31_1","volume-title":"RITM: Revocation in the Middle. In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).","author":"Szalachowski Pawel","year":"2016","unstructured":"Pawel Szalachowski, Laurent Chuat, Taeho Lee, and Adrian Perrig. 2016. RITM: Revocation in the Middle. In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS)."},{"key":"e_1_3_2_2_32_1","volume-title":"Digital Certificate Revocation for the Internet of Things. Master's thesis","author":"Lindemer Samuel Tanner","unstructured":"Samuel Tanner Lindemer. 2019. Digital Certificate Revocation for the Internet of Things. Master's thesis. KTH Royal Institute of Technology."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00105"},{"key":"e_1_3_2_2_34_1","volume-title":"Empirical Analysis of Certificate Revocation Lists. In In Proceedings of the IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 159--174","author":"Walleck Daryl","year":"2008","unstructured":"Daryl Walleck, Yingjiu Li, and Shouhuai Xu. 2008. Empirical Analysis of Certificate Revocation Lists. In In Proceedings of the IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 159--174."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737423"},{"key":"e_1_3_2_2_36_1","volume-title":"Vacuum Filters: More Space-Efficient and Faster Replacement for Bloom and Cuckoo Filters. In In Proceedings of International Conference on Very Large Databases (PVLDB).","author":"Wang Minmei","year":"2020","unstructured":"Minmei Wang, Mingxun Zhou, Shouqian Shi, and Qian Chen. 2020. Vacuum Filters: More Space-Efficient and Faster Replacement for Bloom and Cuckoo Filters. In In Proceedings of International Conference on Very Large Databases (PVLDB)."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2820067"},{"key":"e_1_3_2_2_38_1","volume-title":"Analysis of SSL Certificate Reissues and Revocations in The Wake of Heartbleed. In In Proceedings of the Conference on Internet Measurement Conference (IMC). 489--502","author":"Zhang Liang","year":"2014","unstructured":"Liang Zhang, David Choffnes, Dave Levin, Tudor Dumitracs, Alan Mislove, Aaron Schulman, and Christo Wilson. 2014. Analysis of SSL Certificate Reissues and Revocations in The Wake of Heartbleed. In In Proceedings of the Conference on Internet Measurement Conference (IMC). 489--502."},{"key":"e_1_3_2_2_39_1","volume-title":"Tradeoffs in Certificate Revocation Schemes. ACM SIGCOMM Computer Communication Review","author":"Zheng Peifang","year":"2003","unstructured":"Peifang Zheng. 2003. Tradeoffs in Certificate Revocation Schemes. ACM SIGCOMM Computer Communication Review (2003)."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787503"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484580","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484580","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:45:05Z","timestamp":1763498705000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484580"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":40,"alternative-id":["10.1145\/3460120.3484580","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484580","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}