{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:06:04Z","timestamp":1775228764093,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["INESC-ID grant UIDB\/50021\/2020"],"award-info":[{"award-number":["INESC-ID grant UIDB\/50021\/2020"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["Scholarship 2020.05270.BD"],"award-info":[{"award-number":["Scholarship 2020.05270.BD"]}]},{"name":"IAPMEI","award":["SmartRetail C6632206063-00466847"],"award-info":[{"award-number":["SmartRetail C6632206063-00466847"]}]},{"name":"European Union","award":["ACES 101093126"],"award-info":[{"award-number":["ACES 101093126"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3623111","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"3018-3032","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3082-1179","authenticated-orcid":false,"given":"Cl\u00e1udio","family":"Correia","sequence":"first","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7873-5531","authenticated-orcid":false,"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0313-6590","authenticated-orcid":false,"given":"Lu\u00eds","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Lisboa, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"American Association of State Highway and Transportation Officials. 2014. National Connected Vehicle Field Infrastructure Footprint Analysis Final Report. https:\/\/ntlrepository.blob.core.windows.net\/lib\/52000\/52600\/52602\/Cnct_Veh_Footprint_20181017.pdf Retrieved 2022-11-28 from"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the International Conference on Financial Cryptography. Southampton, Bermuda.","author":"Ateniese Giuseppe","year":"2002","unstructured":"Giuseppe Ateniese, Dawn Song, and Gene Tsudik. 2002. Quasi-Efficient Revocation of Group Signatures. In Proceedings of the International Conference on Financial Cryptography. Southampton, Bermuda."},{"key":"e_1_3_2_1_3_1","first-page":"11","volume":"202","author":"Cybersecurity Insights T.","unstructured":"AT&T. 2022. Cybersecurity Insights Report: Securing the Edge. https:\/\/cdn-cybersecurity.att.com\/docs\/industry-reports\/cybersecurity-insights-report-eleventh-edition.pdf Retrieved 2022-11-28 from","journal-title":"Retrieved"},{"key":"e_1_3_2_1_4_1","volume-title":"PEREA: Practical TTP-Free Revocation of Repeatedly Misbehaving Anonymous Users. ACM Transactions on Information and System Security","author":"Au Man","year":"2008","unstructured":"Man Au, Patrick Tsang, and Apu Kapadia. 2008. PEREA: Practical TTP-Free Revocation of Repeatedly Misbehaving Anonymous Users. ACM Transactions on Information and System Security (2008), 1--34."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103403"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276918"},{"key":"e_1_3_2_1_7_1","volume-title":"High-speed high-security signatures. Journal of cryptographic engineering","author":"Bernstein Daniel","year":"2012","unstructured":"Daniel Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang. 2012. High-speed high-security signatures. Journal of cryptographic engineering (2012), 77--89."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030106"},{"key":"e_1_3_2_1_10_1","volume-title":"An efficient protocol for anonymously providing assurance of the container of a private key. Submitted to the Trusted Computing Group","author":"Brickell Ernie","year":"2003","unstructured":"Ernie Brickell. 2003. An efficient protocol for anonymously providing assurance of the container of a private key. Submitted to the Trusted Computing Group (2003)."},{"key":"e_1_3_2_1_11_1","volume-title":"Backward Unlinkability for a VLR Group Signature Scheme with Efficient Revocation Check. Cryptology ePrint Archive","author":"Bringer Julien","year":"2011","unstructured":"Julien Bringer and Alain Patey. 2011. Backward Unlinkability for a VLR Group Signature Scheme with Efficient Revocation Check. Cryptology ePrint Archive (2011)."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"Bulck Jo","year":"2020","unstructured":"Jo Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lippi, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss, and Frank Piessens. 2020. LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. In Proceedings of the IEEE Symposium on Security and Privacy. San Francisco, California."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_5"},{"key":"e_1_3_2_1_14_1","unstructured":"Camp LLC. 2016. Security Credential Management System Proof-of-Concept Implementation-EE Requirements and Specifications Supporting SCMS Software Release 1.1. Technical Report. Vehicle Safety Communications Consortium."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414470"},{"key":"e_1_3_2_1_16_1","volume-title":"An improved data stream summary: the count-min sketch and its applications. Journal of Algorithms","author":"Cormode Graham","year":"2005","unstructured":"Graham Cormode and Shan Muthukrishnan. 2005. An improved data stream summary: the count-min sketch and its applications. Journal of Algorithms (2005), 58--75."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00062"},{"key":"e_1_3_2_1_18_1","volume-title":"Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge (Extended Version). arXiv preprint hrefhttps:\/\/arxiv.org\/abs\/2308.03402arXiv:2308.03402","author":"Correia Cl\u00e1udio","year":"2023","unstructured":"Cl\u00e1udio Correia, Miguel Correia, and Lu\u00eds Rodrigues. 2023. Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge (Extended Version). arXiv preprint hrefhttps:\/\/arxiv.org\/abs\/2308.03402arXiv:2308.03402 (2023)."},{"key":"e_1_3_2_1_19_1","volume-title":"Paulo Bartolomeu, Jos\u00e9 Fonseca, and Joaquim Ferreira.","author":"Correia Marco","year":"2022","unstructured":"Marco Correia, Jo ao Almeida, Paulo Bartolomeu, Jos\u00e9 Fonseca, and Joaquim Ferreira. 2022. Performance Assessment of Collective Perception Service Supported by the Roadside Infrastructure. Electronics (2022), 347."},{"key":"e_1_3_2_1_20_1","first-page":"11","volume":"202","author":"Metrics Crash Avoidance","unstructured":"Crash Avoidance Metrics Partners LLC (CAMP). 2021. Technical Publications. https:\/\/www.campllc.org\/ Retrieved 2022-11-28 from","journal-title":"Retrieved"},{"key":"e_1_3_2_1_21_1","unstructured":"Dark Reading. 2021. Cybercriminals Take Aim at Connected Car Infrastructure. https:\/\/www.darkreading.com\/attacks-breaches\/cybercriminals-take-aim-at-connected-car-infrastructure Retrieved 2022-11-28 from"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"C. Dwork N. Lynch and L. Stockmeyer. 1988. Consensus in the Presence of Partial Synchrony. J. ACM (1988) 288--323.","DOI":"10.1145\/42282.42283"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2016.27"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052979"},{"key":"e_1_3_2_1_25_1","volume-title":"ETSI TS 103 097 V1.2.1:Intelligent Transport Systems (ITS)","author":"European Telecommunications Standards Institute","unstructured":"European Telecommunications Standards Institute. 2015. ETSI TS 103 097 V1.2.1:Intelligent Transport Systems (ITS); Security; Security header and certificate formats. https:\/\/www.etsi.org\/deliver\/etsi_ts\/103000_103099\/103097\/01.02.01_60\/ts_103097v010201p.pdf Retrieved 2022-11-28 from"},{"key":"e_1_3_2_1_26_1","volume-title":"ETSI TR 103 415 V1.1.1: Intelligent Transport Systems (ITS)","author":"European Telecommunications Standards Institute","unstructured":"European Telecommunications Standards Institute. 2018. ETSI TR 103 415 V1.1.1: Intelligent Transport Systems (ITS); Security; Pre-standardization study on pseudonym change management. https:\/\/www.etsi.org\/deliver\/etsi_tr\/103400_103499\/103415\/01.01.01_60\/tr_103415v010101p.pdf Retrieved 2022-11-28 from"},{"key":"e_1_3_2_1_27_1","volume-title":"ETSI TS 102 941 V1.4.1: Intelligent Transport Systems (ITS)","author":"European Telecommunications Standards Institute","unstructured":"European Telecommunications Standards Institute. 2021. ETSI TS 102 941 V1.4.1: Intelligent Transport Systems (ITS); Security; Trust and Privacy Management. https:\/\/www.etsi.org\/deliver\/etsi_ts\/102900_102999\/102941\/01.04.01_60\/ts_102941v010401p.pdf Retrieved 2022-11-28 from"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674994"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2014.7013305"},{"key":"e_1_3_2_1_30_1","first-page":"11","volume":"202","author":"Freedom of Information and Privacy Association (FIPA). 2019. The Connected Car: who is in the driver's seat? https:\/\/fipa.bc.ca\/wp-content\/uploads\/2018\/01\/CC_report_lite.pdf","unstructured":"Freedom of Information and Privacy Association (FIPA). 2019. The Connected Car: who is in the driver's seat? https:\/\/fipa.bc.ca\/wp-content\/uploads\/2018\/01\/CC_report_lite.pdf Retrieved 2022-11-28 from","journal-title":"Retrieved"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the ACM Workshop on Wireless Networking for Intelligent Transportation Systems","author":"Freudiger Julien","year":"2007","unstructured":"Julien Freudiger, Maxim Raya, M\u00e1rk F\u00e9legyh\u00e1zi, Panos Papadimitratos, and Jean-Pierre Hubaux. 2007. Mix-Zones for Location Privacy in Vehicular Networks. In Proceedings of the ACM Workshop on Wireless Networking for Intelligent Transportation Systems. Vancouver, Canada."},{"key":"e_1_3_2_1_32_1","volume-title":"EPA: An efficient and privacy-aware revocation mechanism for vehicular ad hoc networks. Pervasive and Mobile Computing","author":"Gan\u00e1n Carlos","year":"2015","unstructured":"Carlos Gan\u00e1n, Jose Munoz, Oscar Esparza, Jorge Mata-D\u00edaz, and Juanjo Alins. 2015. EPA: An efficient and privacy-aware revocation mechanism for vehicular ad hoc networks. Pervasive and Mobile Computing (2015), 75--91."},{"key":"e_1_3_2_1_33_1","volume-title":"Mobile Crowdsensing: Current State and Future Challenges","author":"Ganti Raghu","year":"2011","unstructured":"Raghu Ganti, Fan Ye, and Hui Lei. 2011. Mobile Crowdsensing: Current State and Future Challenges. IEEE communications Magazine (2011), 32--39."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110309"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.13"},{"key":"e_1_3_2_1_36_1","volume-title":"Mobile Edge Computing - A key technology towards 5G. ETSI white paper","author":"Hu Yun","year":"2015","unstructured":"Yun Hu, Milan Patel, Dario Sabella, Nurit Sprecher, and Valerie Young. 2015. Mobile Edge Computing - A key technology towards 5G. ETSI white paper, Vol. 11, 11 (2015)."},{"key":"e_1_3_2_1_37_1","volume-title":"Octopus: An Edge-Fog Mutual Authentication Scheme. International Journal of Network Security","author":"Ibrahim Maged","year":"2016","unstructured":"Maged Ibrahim. 2016. Octopus: An Edge-Fog Mutual Authentication Scheme. International Journal of Network Security (2016), 1089--1101."},{"key":"e_1_3_2_1_38_1","unstructured":"Intel Corporation. 2017. Intel Software Guard Extensions SSL. https:\/\/github.com\/intel\/intel-sgx-ssl Retrieved 2022-11-28 from"},{"key":"e_1_3_2_1_39_1","unstructured":"Intelligent Transportation Systems Joint Program Office. 2021. Connected Vehicle Pilot Deployment Program. https:\/\/www.its.dot.gov\/pilots\/overview.htm Retrieved 2022-11-28 from"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98113-0_2"},{"key":"e_1_3_2_1_41_1","unstructured":"Kaggle. 2015. Data Set ECML\/PKDD 15: Taxi Trajectory Prediction. https:\/\/www.kaggle.com\/c\/pkdd-15-predict-taxi-service-trajectory-i\/ Retrieved 2022-11-28 from"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212481"},{"key":"e_1_3_2_1_43_1","volume-title":"The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems","author":"Lamport Leslie","year":"1982","unstructured":"Leslie Lamport, Robert Shostak, and Marshall Pease. 1982. The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems (1982), 203--226."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.17"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2448096.2448106"},{"key":"e_1_3_2_1_46_1","volume-title":"D4: Fast Concurrency Debugging with Parallel Differential Analysis. ACM SIGPLAN Notices","author":"Liu Bozhen","year":"2018","unstructured":"Bozhen Liu and Jeff Huang. 2018. D4: Fast Concurrency Debugging with Parallel Differential Analysis. ACM SIGPLAN Notices (2018), 359--373."},{"key":"e_1_3_2_1_47_1","volume-title":"Optimizing Bloom Filter: Challenges, Solutions, and Comparisons","author":"Luo Lailong","year":"2018","unstructured":"Lailong Luo, Deke Guo, Richard Ma, Ori Rottenstreich, and Xueshan Luo. 2018. Optimizing Bloom Filter: Challenges, Solutions, and Comparisons. IEEE Communications Surveys & Tutorials (2018), 1912--1949."},{"key":"e_1_3_2_1_48_1","volume-title":"Pseudonym Systems. In Proceedings of the International Workshop on Selected Areas in Cryptography","author":"Lysyanskaya Anna","year":"1999","unstructured":"Anna Lysyanskaya, Ronald Rivest, Amit Sahai, and Stefan Wolf. 1999. Pseudonym Systems. In Proceedings of the International Workshop on Selected Areas in Cryptography. Ontario, Canada."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097895.3097901"},{"key":"e_1_3_2_1_50_1","volume-title":"Congressional Report","author":"Markey Ed","year":"2015","unstructured":"Ed Markey. 2015. Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk. Congressional Report (2015)."},{"key":"e_1_3_2_1_51_1","unstructured":"David Meyer. 2018. What the GDPR will mean for companies tracking location. https:\/\/iapp.org\/news\/a\/what-the-gdpr-will-mean-for-companies-tracking-location\/ Retrieved 2022-11-28 from"},{"key":"e_1_3_2_1_52_1","unstructured":"Mounira Msahli Nancy Cam-Winget William Whyte Ahmed Serhrouchni and Houda Labiod. 2020. RFC 8902 TLS Authentication Using Intelligent Transport System (ITS) Certificates. https:\/\/www.hjp.at\/doc\/rfc\/rfc8902.pdf Retrieved 2022-11-28 from"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_29"},{"key":"e_1_3_2_1_54_1","volume-title":"Federal Motor Vehicle Safety Standards","author":"National Highway Traffic Safety Administration. 2017.","year":"2017","unstructured":"National Highway Traffic Safety Administration. 2017. Department of Transportation (DOT), Federal Motor Vehicle Safety Standards; V2V Communications. https:\/\/www.federalregister.gov\/documents\/2017\/01\/12\/2016-31059\/federal-motor-vehicle-safety-standards-v2v-communications Retrieved 2022-11-28 from"},{"key":"e_1_3_2_1_55_1","volume-title":"Shortening the Libert--Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","author":"Ohara Kazuma","year":"2019","unstructured":"Kazuma Ohara, Keita Emura, Goichiro Hanaoka, Ai Ishida, Kazuo Ohta, and Yusuke Sakai. 2019. Shortening the Libert--Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (2019), 1101--1117."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2525314.2525343"},{"key":"e_1_3_2_1_57_1","unstructured":"Orson Peters and Viktor Szakats. 2013. Portable C implementation of Ed25519. https:\/\/github.com\/orlp\/ed25519 Retrieved 2022-11-28 from"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046781"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0055"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2019.8917354"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2017.8288287"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2010.5506126"},{"key":"e_1_3_2_1_63_1","volume-title":"Proceedings of the International Conference on Cryptology in Malaysia","author":"Slamanig Daniel","year":"2016","unstructured":"Daniel Slamanig, Raphael Spreitzer, and Thomas Unterluggauer. 2016. Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks. In Proceedings of the International Conference on Cryptology in Malaysia. Kuala Lumpur, Malaysia."},{"key":"e_1_3_2_1_64_1","volume-title":"A Signature Scheme with Unlinkable-yet-Acountable Pseudonymity for Privacy-Preserving Crowdsensing","author":"Sucasas Victor","year":"2020","unstructured":"Victor Sucasas, Georgios Mantas, Joaquim Bastos, Francisco Dami\u00e3o, and Jonathan Rodriguez. 2020. A Signature Scheme with Unlinkable-yet-Acountable Pseudonymity for Privacy-Preserving Crowdsensing. IEEE Transactions on Mobile Computing (2020), 752--768."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2051468"},{"key":"e_1_3_2_1_66_1","unstructured":"Tech Monitor. 2021. Data from your connected car could be sold to the highest bidder. https:\/\/techmonitor.ai\/policy\/privacy-and-data-protection\/connected-vehicle-data-apply-carplay Retrieved 2022-11-28 from"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315256"},{"key":"e_1_3_2_1_68_1","volume-title":"Nymble: Blocking Misbehaving Users in Anonymizing Networks","author":"Tsang Patrick P","year":"2009","unstructured":"Patrick P Tsang, Apu Kapadia, Cory Cornelius, and Sean W Smith. 2009. Nymble: Blocking Misbehaving Users in Anonymizing Networks. IEEE Transactions on Dependable and Secure Computing, Vol. 8, 2 (2009)."},{"key":"e_1_3_2_1_69_1","unstructured":"United States Government Accountability Office. 2017. Vehicle Data Privacy. https:\/\/www.gao.gov\/assets\/gao-17-656.pdf Retrieved 2022-11-28 from"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677052"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00029"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_22"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737583"},{"key":"e_1_3_2_1_74_1","volume-title":"Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues","author":"Zhang Jiale","year":"2018","unstructured":"Jiale Zhang, Bing Chen, Yanchao Zhao, Xiang Cheng, and Feng Hu. 2018. Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues. IEEE Access (2018), 18209--18237."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623111","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623111","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:42:13Z","timestamp":1755740533000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623111"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":74,"alternative-id":["10.1145\/3576915.3623111","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3623111","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}