{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:09:04Z","timestamp":1764842944687,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2145631, 2215017, and 2226447"],"award-info":[{"award-number":["2145631, 2215017, and 2226447"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690331","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"2057-2071","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9156-1679","authenticated-orcid":false,"given":"Rabiah","family":"Alnashwan","sequence":"first","affiliation":[{"name":"The University of Sheffield, Sheffield, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6715-7912","authenticated-orcid":false,"given":"Yang","family":"Yang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5062-9493","authenticated-orcid":false,"given":"Yilu","family":"Dong","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6055-6578","authenticated-orcid":false,"given":"Prosanta","family":"Gope","sequence":"additional","affiliation":[{"name":"The University of Sheffield, Sheffield, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8335-2787","authenticated-orcid":false,"given":"Behzad","family":"Abdolmaleki","sequence":"additional","affiliation":[{"name":"The University of Sheffield, Sheffield, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9222-8544","authenticated-orcid":false,"given":"Syed Rafiul","family":"Hussain","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, Pennsylvania State, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. CVE-2021--45462. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021--45462."},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Full Version of the paper and 5G Prototype Implementation. https: \/\/github.com\/YYangNUS\/CCS_MVNO."},{"volume-title":"d.]. OpenAirInterface. https:\/\/openairinterface.org\/. Accessed","year":"2024","key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. OpenAirInterface. https:\/\/openairinterface.org\/. Accessed: April 16, 2024."},{"volume-title":"d.]. USRP B210. https:\/\/www.ettus.com\/all-products\/UB210-KIT\/. Accessed","year":"2024","key":"e_1_3_2_1_4_1","unstructured":"[n. d.]. USRP B210. https:\/\/www.ettus.com\/all-products\/UB210-KIT\/. Accessed: April 16, 2024."},{"key":"e_1_3_2_1_5_1","unstructured":"ETSI 3rd Generation Partnership Project (3GPP). 2020. Security architecture and procedures for 5G System. Technical Specification version 16.3.0 Release 16. 3GPP. https:\/\/www.etsi.org\/deliver\/etsi_ts\/133500_133599\/133501\/16.03.00_60\/ ts_133501v160300p.pdf"},{"key":"e_1_3_2_1_6_1","unstructured":"Behzad Abdolmaleki et al. 2023. Universally Composable NIZKs: Circuit-Succinct Non-Malleable and CRS-Updatable. Cryptology ePrint Archive (2023)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21568-2_19"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35199-1_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417228"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237838"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3256703"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Rabiah Alnashwan Yang Yang Yilu Dong Prosanta Gope Behzad Abdolmaleki and Syed Rafiul Hussain. 2024. Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator. arXiv:2409.04877 [cs.CR] https:\/\/arxiv.org\/abs\/2409.04877","DOI":"10.1145\/3658644.3690331"},{"volume-title":"Proceedings of the 2017 acm sigsac conference on computer and communications security. 2087--2104","author":"Scott","key":"e_1_3_2_1_13_1","unstructured":"Scott Ames et al. 2017. Ligero: Lightweight sublinear arguments without a trusted setup. In Proceedings of the 2017 acm sigsac conference on computer and communications security. 2087--2104."},{"volume-title":"Computer Security -- ESORICS 2005 (Lecture Notes in Computer Science), Sabrina de Capitani di Vimercati","author":"Ateniese Giuseppe","key":"e_1_3_2_1_14_1","unstructured":"Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, and Gene Tsudik. 2005. Sanitizable Signatures. In Computer Security -- ESORICS 2005 (Lecture Notes in Computer Science), Sabrina de Capitani di Vimercati, Paul Syverson, and Dieter Gollmann (Eds.). Springer, Berlin, Heidelberg, 159--177. https:\/\/doi.org\/10.1007\/ 11555827--10"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243846"},{"volume-title":"International Conference on Security and Cryptography for Networks. Springer, 368--385","author":"Carsten","key":"e_1_3_2_1_16_1","unstructured":"Carsten Baum et al. 2018. More efficient commitments from structured lattice assumptions. In International Conference on Security and Cryptography for Networks. Springer, 368--385."},{"key":"e_1_3_2_1_17_1","volume-title":"Aurora: Transparent succinct arguments for R1CS. In Advances in Cryptology--EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Ben-Sasson Eli","year":"2019","unstructured":"Eli Ben-Sasson et al. 2019. Aurora: Transparent succinct arguments for R1CS. In Advances in Cryptology--EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19--23, 2019, Proceedings, Part I 38. Springer, 103--128."},{"volume-title":"International Conference on the Theory and Application of Cryptology and Information Security. Springer, 551--572","author":"Fabrice","key":"e_1_3_2_1_18_1","unstructured":"Fabrice Benhamouda et al. 2014. Better zero-knowledge proofs for lattice encryption and their application to group signatures. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 551--572."},{"volume-title":"Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 121--132","author":"Evangelos","key":"e_1_3_2_1_19_1","unstructured":"Evangelos Bitsikas et al. 2023. UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework. In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 121--132."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Bruno Blanchet et al. 2016. Modeling and verifying security protocols with the applied pi calculus and ProVerif. Foundations and Trends\u00ae in Privacy and Security 1 1--2 (2016) 1--135.","DOI":"10.1561\/3300000004"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Ravishankar Borgaonkar Lucca Hirschi Shinjo Park and Altaf Shaik. 2018. New Privacy Threat on 3G 4G and Upcoming 5G AKA Protocols. Technical Report 1175. http:\/\/eprint.iacr.org\/2018\/1175","DOI":"10.2478\/popets-2019-0039"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107424"},{"key":"e_1_3_2_1_23_1","volume-title":"Santizable Signatures: How to Partially Delegate Control for Authenticated Data. 117--128.","author":"Brzuska Christina","year":"2009","unstructured":"Christina Brzuska, Marc Fischlin, Anja Lehmann, and Dominique Schr\u00f6der. 2009. Santizable Signatures: How to Partially Delegate Control for Authenticated Data. 117--128."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","unstructured":"Christina Brzuska Marc Fischlin Anja Lehmann and Dominique Schr\u00f6der. 2010. Unlinkability of Sanitizable Signatures. 444--461. https:\/\/doi.org\/10.1007\/978--3--642--13013--7--26","DOI":"10.1007\/978--3--642--13013--7--26"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--40012--4--12"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--53997--8--2"},{"volume-title":"2018 IEEE symposium on security and privacy (SP). IEEE, 315--334","author":"Benedikt","key":"e_1_3_2_1_27_1","unstructured":"Benedikt B\u00fcnz et al. 2018. Bulletproofs: Short proofs for confidential transactions and more. In 2018 IEEE symposium on security and privacy (SP). IEEE, 315--334."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Benedikt B\u00fcnz et al. 2020. Transparent SNARKs from DARK compilers. In Advances in Cryptology--EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques Zagreb Croatia May 10--14 2020 Proceedings Part I 39. Springer 677--706.","DOI":"10.1007\/978-3-030-45721-1_24"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3402457"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Ran Canetti et al. 2015. A simpler variant of universally composable security for standard multiparty computation. In Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference Santa Barbara CA USA August 16--20 2015 Proceedings Part II 35. Springer 3--22.","DOI":"10.1007\/978-3-662-48000-7_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2916593"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3324927"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467826"},{"volume-title":"Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion","author":"Cremers Cas","key":"e_1_3_2_1_35_1","unstructured":"Cas Cremers and Martin Dehnel-Wild. 2019. Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion. San Diego, CA, USA. https:\/\/publications.cispa.saarland\/2758\/"},{"volume-title":"jPBC: Java pairing based cryptography","author":"Caro Angelo De","key":"e_1_3_2_1_36_1","unstructured":"Angelo De Caro and Vincenzo Iovino. 2011. jPBC: Java pairing based cryptography. IEEE. http:\/\/gas.dia.unisa.it\/projects\/jpbc\/"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2931076"},{"volume-title":"Provable Security: Second International Conference, ProvSec 2008, Shanghai, China, October 30-November 1, 2008. Proceedings 2. Springer, 313--327","author":"Sebastian","key":"e_1_3_2_1_39_1","unstructured":"Sebastian Gajek et al. 2008. Universally composable security analysis of TLS. In Provable Security: Second International Conference, ProvSec 2008, Shanghai, China, October 30-November 1, 2008. Proceedings 2. Springer, 313--327."},{"key":"e_1_3_2_1_40_1","volume-title":"Brakedown: Linear-time and post-quantum SNARKs for R1CS. Cryptology ePrint Archive","author":"Alexander Golovnev","year":"2021","unstructured":"Alexander Golovnev et al. 2021. Brakedown: Linear-time and post-quantum SNARKs for R1CS. Cryptology ePrint Archive (2021)."},{"volume-title":"Network and Distributed Systems Security (NDSS) Symposium.","author":"Rafiul Syed","key":"e_1_3_2_1_41_1","unstructured":"Syed Rafiul Hussain et al. 2018. LTEInspector: A systematic approach for adversarial testing of 4G LTE. In Network and Distributed Systems Security (NDSS) Symposium."},{"volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 669--684","author":"Rafiul Syed","key":"e_1_3_2_1_42_1","unstructured":"Syed Rafiul Hussain et al. 2019. 5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 669--684."},{"volume-title":"Proceedings of the 12th conference on security and privacy in wireless and mobile networks. 1--11","author":"Rafiul Syed","key":"e_1_3_2_1_43_1","unstructured":"Syed Rafiul Hussain et al. 2019. Insecure connection bootstrapping in cellular networks: the root of all evil. In Proceedings of the 12th conference on security and privacy in wireless and mobile networks. 1--11."},{"volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security.","author":"Rafiul Syed","key":"e_1_3_2_1_44_1","unstructured":"Syed Rafiul Hussain et al. 2021. Noncompliance as deviant behavior: An automated black-box noncompliance checker for 4g lte cellular devices. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_45_1","volume-title":"Privacy attacks to the 4G and 5G cellular paging protocols using side channel information. Network and distributed systems security (NDSS) symposium2019","author":"Hussain Syed Rafiul","year":"2019","unstructured":"Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li, and Elisa Bertino. 2019. Privacy attacks to the 4G and 5G cellular paging protocols using side channel information. Network and distributed systems security (NDSS) symposium2019 (2019)."},{"volume-title":"International Conference on the Theory and Application of Cryptology and Information Security. Springer, 663--680","author":"Abhishek","key":"e_1_3_2_1_46_1","unstructured":"Abhishek Jain et al. 2012. Commitments and efficient zero-knowledge proofs from learning parity with noise. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 663--680."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Akinori Kawachi et al. 2008. Concurrently secure identification schemes based on the worst-case hardness of lattice problems. In Advances in Cryptology-ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security Melbourne Australia December 7--11 2008. Proceedings 14. Springer 372--389.","DOI":"10.1007\/978-3-540-89255-7_23"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2007.03.002"},{"volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Eunsoo","key":"e_1_3_2_1_49_1","unstructured":"Eunsoo Kim et al. 2023. {BASECOMP}: A Comparative Analysis for Integrity Protection in Cellular Baseband Software. In 32nd USENIX Security Symposium (USENIX Security 23). 3547--3563."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2981514"},{"volume-title":"Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 133--144","author":"Alessandro","key":"e_1_3_2_1_51_1","unstructured":"Alessandro Lotto et al. 2023. BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks. In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 133--144."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535925"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39799-8_48"},{"key":"e_1_3_2_1_54_1","unstructured":"OpenSSL-Management-Committee. [n. d.]. OpenSSL: Cryptography and SSL\/TLS Toolkit. In https:\/\/www.openssl.org\/."},{"volume-title":"DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices. In 31st USENIX Security Symposium (USENIX Security).","key":"e_1_3_2_1_55_1","unstructured":"CheolJun Park et al. 2022. DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices. In 31st USENIX Security Symposium (USENIX Security)."},{"volume-title":"Annual international cryptology conference","author":"Pedersen Torben Pryds","key":"e_1_3_2_1_56_1","unstructured":"Torben Pryds Pedersen. 1991. Non-interactive and information-theoretic secure verifiable secret sharing. In Annual international cryptology conference. Springer, 129--140."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2820728"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9060933"},{"key":"e_1_3_2_1_60_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Schmitt Paul","year":"2021","unstructured":"Paul Schmitt and Barath Raghavan. 2021. Pretty good phone privacy. In 30th USENIX Security Symposium (USENIX Security 21). 1737--1754."},{"key":"e_1_3_2_1_61_1","volume-title":"Quarks: Quadruple-efficient transparent zkSNARKs. Cryptology ePrint Archive","author":"Setty Srinath","year":"2020","unstructured":"Srinath Setty and Jonathan Lee. 2020. Quarks: Quadruple-efficient transparent zkSNARKs. Cryptology ePrint Archive (2020)."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Altaf Shaik et al. 2016. Practical Attacks Against Privacy and Availability in 4G\/LTE Mobile Communication Systems. (2016).","DOI":"10.14722\/ndss.2016.23236"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2005.11.003"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453082"},{"key":"e_1_3_2_1_65_1","unstructured":"Oracle Technology Network. 2022. Java Cryptography Architecture (JCA) Reference Guide. https:\/\/docs.oracle.com\/javase\/8\/docs\/technotes\/guides\/security\/crypto\/CryptoSpec.html"},{"volume-title":"Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services. 375--387","author":"Narseo","key":"e_1_3_2_1_66_1","unstructured":"Narseo Vallina-Rodriguez et al. 2015. Beyond the radio: Illuminating the higher layers of mobile networks. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services. 375--387."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3030745"},{"key":"e_1_3_2_1_68_1","unstructured":"Yuchen Wang Zhenfeng Zhang and Yongquan Xie. 2021. {Privacy-Preserving} and {Standard-Compatible} {AKA} Protocol for 5G. 3595--3612. https:\/\/www. usenix.org\/conference\/usenixsecurity21\/presentation\/wang-yuchen"},{"key":"e_1_3_2_1_69_1","volume-title":"Orion: Zero knowledge proof with linear prover time. In Annual International Cryptology Conference","author":"Tiancheng Xie","year":"2022","unstructured":"Tiancheng Xie et al. 2022. Orion: Zero knowledge proof with linear prover time. In Annual International Cryptology Conference. Springer, 299--328."},{"volume-title":"Cryptology and Network Security: 12th International Conference, CANS 2013, Paraty, Brazil, November 20--22. 2013. Proceedings 12","author":"Xiang","key":"e_1_3_2_1_70_1","unstructured":"Xiang Xie et al. 2013. Zero knowledge proofs from Ring-LWE. In Cryptology and Network Security: 12th International Conference, CANS 2013, Paraty, Brazil, November 20--22. 2013. Proceedings 12. Springer, 57--73."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"crossref","unstructured":"Chuan Yu et al. 2023. SecChecker: Inspecting the Security Implementation of 5G Commercial Off-The-Shelf (COTS) Mobile Devices. Computers & Security (2023) 103361.","DOI":"10.1016\/j.cose.2023.103361"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24617"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2927664"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690331","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:14:36Z","timestamp":1755843276000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690331"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":73,"alternative-id":["10.1145\/3658644.3690331","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690331","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}