{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T23:21:11Z","timestamp":1763767271335,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"SecureAmerica Institute, Texas A&M Engineering"},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1849085"],"award-info":[{"award-number":["1849085"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Rockwell Professorship"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,19]]},"DOI":"10.1145\/3462223.3485620","type":"proceedings-article","created":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T16:15:37Z","timestamp":1635437737000},"page":"11-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Protection against Counterfeiting Attacks in 3D Printing by Streaming Signature-embedded Manufacturing Process Instructions"],"prefix":"10.1145","author":[{"given":"Akash","family":"Tiwari","sequence":"first","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Eduardo Jose","family":"Villasenor","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Nikhil","family":"Gupta","sequence":"additional","affiliation":[{"name":"New York University, New York City, NY, USA"}]},{"given":"Narasimha","family":"Reddy","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[{"name":"New York University, New York City, NY, USA"}]},{"given":"Satish T. S.","family":"Bukkapatnam","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Retrieved","author":"Alex Wilhelm Ron Miller","year":"2021","unstructured":"Ron Miller Alex Wilhelm . 2021 . Xometry is taking its excess manufacturing capac- ity business public . Retrieved June 22, 2021 from https:\/\/techcrunch.com\/2021\/ 06\/04\/xometry-is-taking-its-excess-manufacturing-capacity-business-public\/ Ron Miller Alex Wilhelm. 2021. Xometry is taking its excess manufacturing capac- ity business public. Retrieved June 22, 2021 from https:\/\/techcrunch.com\/2021\/ 06\/04\/xometry-is-taking-its-excess-manufacturing-capacity-business-public\/"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2020.05.014"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/adem.201800495"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matdes.2017.04.078"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/adem.201900146"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.addma.2020.101319"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978815"},{"key":"e_1_3_2_2_8_1","volume-title":"Retrieved","author":"Heater Brian","year":"2021","unstructured":"Brian Heater . 2021 . 3D-printing marketplace Shapeways set for SPAC . Retrieved June 24, 2021 from https:\/\/techcrunch.com\/2021\/04\/28\/3d-printing-marketplace-shapeways-set-for-spac\/ Brian Heater. 2021. 3D-printing marketplace Shapeways set for SPAC. Retrieved June 24, 2021 from https:\/\/techcrunch.com\/2021\/04\/28\/3d-printing-marketplace-shapeways-set-for-spac\/"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2018.07.137"},{"key":"e_1_3_2_2_10_1","volume-title":"A Survey of Cybersecurity and Resilience of Digital Manufacturing. Proc","author":"Mahesh Priyanka","year":"2020","unstructured":"Priyanka Mahesh , Akash Tiwari , Chenglu Jin , Panganamala R. Kumar , A. L. Narasimha Reddy , Satish T.S. Bukkapatanam , Nikhil Gupta , and Ramesh Karri . 2020. A Survey of Cybersecurity and Resilience of Digital Manufacturing. Proc . IEEE ( 2020 ). Priyanka Mahesh, Akash Tiwari, Chenglu Jin, Panganamala R. Kumar, A. L. Narasimha Reddy, Satish T.S. Bukkapatanam, Nikhil Gupta, and Ramesh Karri. 2020. A Survey of Cybersecurity and Resilience of Digital Manufacturing. Proc. IEEE (2020)."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.015"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2869303"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.01450"},{"key":"e_1_3_2_2_14_1","volume-title":"Bukkapatanam","author":"Tiwari Akash","year":"2020","unstructured":"Akash Tiwari , A. L. Narasimha Reddy , and Satish T.S . Bukkapatanam . 2020 . Cybersecurity Assurance in the Emerging Manufacturing-as-a-Service (MaaS) Paradigm: A Lesson from the Video Streaming Industry. Smart and Sustainable Manufacturing Systems ( 2020). Akash Tiwari, A. L. Narasimha Reddy, and Satish T.S. Bukkapatanam. 2020. Cybersecurity Assurance in the Emerging Manufacturing-as-a-Service (MaaS) Paradigm: A Lesson from the Video Streaming Industry. Smart and Sustainable Manufacturing Systems (2020)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.addma.2018.09.003"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-020-0372-5"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3462223.3485620","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3462223.3485620","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3462223.3485620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:54Z","timestamp":1750193334000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3462223.3485620"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":16,"alternative-id":["10.1145\/3462223.3485620","10.1145\/3462223"],"URL":"https:\/\/doi.org\/10.1145\/3462223.3485620","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}