Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2016

AUTHORS

Ian Goldberg , Graeme Jenkinson , Frank Stajano

ABSTRACT

Hardware tokens for user authentication need a secure and usable mechanism to lock them when not in use. The Pico academic project proposes an authentication token unlocked by the proximity of simpler wearable devices that provide shares of the token’s master key. This method, however, is vulnerable to a cold boot attack: an adversary who captures a running Pico could extract the master key from its RAM and steal all of the user’s credentials. We present a cryptographic countermeasure—bivariate secret sharing—that protects all the credentials except the one in use at that time, even if the token is captured while it is on. Remarkably, our key storage costs for the wearables that supply the cryptographic shares are very modest (256 bits) and remain constant even if the token holds thousands of credentials. Although bivariate secret sharing has been used before in slightly different ways, our scheme is leaner and more efficient and achieves a new property—cold boot protection. We validated the efficacy of our design by implementing it on a commercial Bluetooth Low Energy development board and measuring its latency and energy consumption. For reasonable choices of latency and security parameters, a standard CR2032 button-cell battery can power our prototype for 5–7 months, and we demonstrate a simple enhancement that could make the same battery last for over 9 months. More... »

PAGES

36-57

References to SciGraph publications

Book

TITLE

Applied Cryptography and Network Security

ISBN

978-3-319-39554-8
978-3-319-39555-5

From Grant

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-39555-5_3

DOI

http://dx.doi.org/10.1007/978-3-319-39555-5_3

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1042019353


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of Waterloo", 
          "id": "https://www.grid.ac/institutes/grid.46078.3d", 
          "name": [
            "University of Waterloo"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Goldberg", 
        "givenName": "Ian", 
        "id": "sg:person.012057510223.72", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012057510223.72"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Cambridge", 
          "id": "https://www.grid.ac/institutes/grid.5335.0", 
          "name": [
            "University of Cambridge"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Jenkinson", 
        "givenName": "Graeme", 
        "id": "sg:person.015752742217.50", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015752742217.50"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Cambridge", 
          "id": "https://www.grid.ac/institutes/grid.5335.0", 
          "name": [
            "University of Cambridge"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Stajano", 
        "givenName": "Frank", 
        "id": "sg:person.015754042145.63", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015754042145.63"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/128756.128759", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1001657596"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.3390/s120911734", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1002251409"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-17455-1_8", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1007244359", 
          "https://doi.org/10.1007/978-3-642-17455-1_8"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-17455-1_8", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1007244359", 
          "https://doi.org/10.1007/978-3-642-17455-1_8"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1880022.1880028", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1016591978"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1595676.1595695", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1018031428"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-07308-8_23", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1021624931", 
          "https://doi.org/10.1007/978-3-319-07308-8_23"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11787006_25", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1021714446", 
          "https://doi.org/10.1007/11787006_25"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11787006_25", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1021714446", 
          "https://doi.org/10.1007/11787006_25"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1506409.1506429", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1023168747"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/358886.358895", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1031605248"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/586110.586124", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1033430214"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-35694-0_24", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1035475718", 
          "https://doi.org/10.1007/978-3-642-35694-0_24"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/359168.359176", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1036015253"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2638728.2641705", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1037294457"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-25867-1_6", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1037644204", 
          "https://doi.org/10.1007/978-3-642-25867-1_6"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/570645.570647", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1042893678"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-12400-1_17", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1045233924", 
          "https://doi.org/10.1007/978-3-319-12400-1_17"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-26096-9_21", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1046223030", 
          "https://doi.org/10.1007/978-3-319-26096-9_21"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-44750-4_27", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1047548397", 
          "https://doi.org/10.1007/3-540-44750-4_27"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-44750-4_27", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1047548397", 
          "https://doi.org/10.1007/3-540-44750-4_27"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/csac.1997.646200", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093381830"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/securecomm.2005.56", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094057724"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/sp.2012.44", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094471070"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2016", 
    "datePublishedReg": "2016-01-01", 
    "description": "Hardware tokens for user authentication need a secure and usable mechanism to lock them when not in use. The Pico academic project proposes an authentication token unlocked by the proximity of simpler wearable devices that provide shares of the token\u2019s master key. This method, however, is vulnerable to a cold boot attack: an adversary who captures a running Pico could extract the master key from its RAM and steal all of the user\u2019s credentials. We present a cryptographic countermeasure\u2014bivariate secret sharing\u2014that protects all the credentials except the one in use at that time, even if the token is captured while it is on. Remarkably, our key storage costs for the wearables that supply the cryptographic shares are very modest (256\u00a0bits) and remain constant even if the token holds thousands of credentials. Although bivariate secret sharing has been used before in slightly different ways, our scheme is leaner and more efficient and achieves a new property\u2014cold boot protection. We validated the efficacy of our design by implementing it on a commercial Bluetooth Low Energy development board and measuring its latency and energy consumption. For reasonable choices of latency and security parameters, a standard CR2032 button-cell battery can power our prototype for 5\u20137\u00a0months, and we demonstrate a simple enhancement that could make the same battery last for over 9\u00a0months.", 
    "editor": [
      {
        "familyName": "Manulis", 
        "givenName": "Mark", 
        "type": "Person"
      }, 
      {
        "familyName": "Sadeghi", 
        "givenName": "Ahmad-Reza", 
        "type": "Person"
      }, 
      {
        "familyName": "Schneider", 
        "givenName": "Steve", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-39555-5_3", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isFundedItemOf": [
      {
        "id": "sg:grant.3798313", 
        "type": "MonetaryGrant"
      }
    ], 
    "isPartOf": {
      "isbn": [
        "978-3-319-39554-8", 
        "978-3-319-39555-5"
      ], 
      "name": "Applied Cryptography and Network Security", 
      "type": "Book"
    }, 
    "name": "Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token", 
    "pagination": "36-57", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-39555-5_3"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "c82906267a86f260203a2685d31479d475b2ba167f2b6999e540c51884bcc208"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1042019353"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-39555-5_3", 
      "https://app.dimensions.ai/details/publication/pub.1042019353"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T10:37", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8659_00000269.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-319-39555-5_3"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-39555-5_3'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-39555-5_3'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-39555-5_3'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-39555-5_3'


 

This table displays all metadata directly associated to this object as RDF triples.

165 TRIPLES      23 PREDICATES      48 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-39555-5_3 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Ne28af08170e9408eb6e77a274915476f
4 schema:citation sg:pub.10.1007/11787006_25
5 sg:pub.10.1007/3-540-44750-4_27
6 sg:pub.10.1007/978-3-319-07308-8_23
7 sg:pub.10.1007/978-3-319-12400-1_17
8 sg:pub.10.1007/978-3-319-26096-9_21
9 sg:pub.10.1007/978-3-642-17455-1_8
10 sg:pub.10.1007/978-3-642-25867-1_6
11 sg:pub.10.1007/978-3-642-35694-0_24
12 https://doi.org/10.1109/csac.1997.646200
13 https://doi.org/10.1109/securecomm.2005.56
14 https://doi.org/10.1109/sp.2012.44
15 https://doi.org/10.1145/128756.128759
16 https://doi.org/10.1145/1506409.1506429
17 https://doi.org/10.1145/1595676.1595695
18 https://doi.org/10.1145/1880022.1880028
19 https://doi.org/10.1145/2638728.2641705
20 https://doi.org/10.1145/358886.358895
21 https://doi.org/10.1145/359168.359176
22 https://doi.org/10.1145/570645.570647
23 https://doi.org/10.1145/586110.586124
24 https://doi.org/10.3390/s120911734
25 schema:datePublished 2016
26 schema:datePublishedReg 2016-01-01
27 schema:description Hardware tokens for user authentication need a secure and usable mechanism to lock them when not in use. The Pico academic project proposes an authentication token unlocked by the proximity of simpler wearable devices that provide shares of the token’s master key. This method, however, is vulnerable to a cold boot attack: an adversary who captures a running Pico could extract the master key from its RAM and steal all of the user’s credentials. We present a cryptographic countermeasure—bivariate secret sharing—that protects all the credentials except the one in use at that time, even if the token is captured while it is on. Remarkably, our key storage costs for the wearables that supply the cryptographic shares are very modest (256 bits) and remain constant even if the token holds thousands of credentials. Although bivariate secret sharing has been used before in slightly different ways, our scheme is leaner and more efficient and achieves a new property—cold boot protection. We validated the efficacy of our design by implementing it on a commercial Bluetooth Low Energy development board and measuring its latency and energy consumption. For reasonable choices of latency and security parameters, a standard CR2032 button-cell battery can power our prototype for 5–7 months, and we demonstrate a simple enhancement that could make the same battery last for over 9 months.
28 schema:editor N3a3b34dc502345299fc7a5ea522d5c22
29 schema:genre chapter
30 schema:inLanguage en
31 schema:isAccessibleForFree true
32 schema:isPartOf N99a33bbe3d19418089ea643a3d53a74c
33 schema:name Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token
34 schema:pagination 36-57
35 schema:productId N03f152145576422dbb479a44a7ffda23
36 N37503200637f44cea8ee621913ee996b
37 N4f8340441c15432ba0ad9ff36c39ab90
38 schema:publisher Nc43c1c2d2dd24a0689d2c62de2a03d8d
39 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042019353
40 https://doi.org/10.1007/978-3-319-39555-5_3
41 schema:sdDatePublished 2019-04-15T10:37
42 schema:sdLicense https://scigraph.springernature.com/explorer/license/
43 schema:sdPublisher N86cbd15643674bddaa8effb3512c626f
44 schema:url http://link.springer.com/10.1007/978-3-319-39555-5_3
45 sgo:license sg:explorer/license/
46 sgo:sdDataset chapters
47 rdf:type schema:Chapter
48 N03f152145576422dbb479a44a7ffda23 schema:name doi
49 schema:value 10.1007/978-3-319-39555-5_3
50 rdf:type schema:PropertyValue
51 N25c09c1cf4ce41f1a4c43de5db343fb0 schema:familyName Sadeghi
52 schema:givenName Ahmad-Reza
53 rdf:type schema:Person
54 N2be506ffa042461c8c67168497c05a4f rdf:first sg:person.015754042145.63
55 rdf:rest rdf:nil
56 N30c1332ad9ca4ffbaa9f7f92675e6f92 rdf:first N25c09c1cf4ce41f1a4c43de5db343fb0
57 rdf:rest N947a838d838746fc862da9278dd6091e
58 N37503200637f44cea8ee621913ee996b schema:name dimensions_id
59 schema:value pub.1042019353
60 rdf:type schema:PropertyValue
61 N3a3b34dc502345299fc7a5ea522d5c22 rdf:first Nde8d5e4a545b447f9c21e1294228647c
62 rdf:rest N30c1332ad9ca4ffbaa9f7f92675e6f92
63 N4f8340441c15432ba0ad9ff36c39ab90 schema:name readcube_id
64 schema:value c82906267a86f260203a2685d31479d475b2ba167f2b6999e540c51884bcc208
65 rdf:type schema:PropertyValue
66 N77e3f8ac0e794b5f9ac59dcc6cdf7041 schema:familyName Schneider
67 schema:givenName Steve
68 rdf:type schema:Person
69 N86cbd15643674bddaa8effb3512c626f schema:name Springer Nature - SN SciGraph project
70 rdf:type schema:Organization
71 N8afb33427efe423e9c258966c8a49405 rdf:first sg:person.015752742217.50
72 rdf:rest N2be506ffa042461c8c67168497c05a4f
73 N947a838d838746fc862da9278dd6091e rdf:first N77e3f8ac0e794b5f9ac59dcc6cdf7041
74 rdf:rest rdf:nil
75 N99a33bbe3d19418089ea643a3d53a74c schema:isbn 978-3-319-39554-8
76 978-3-319-39555-5
77 schema:name Applied Cryptography and Network Security
78 rdf:type schema:Book
79 Nc43c1c2d2dd24a0689d2c62de2a03d8d schema:location Cham
80 schema:name Springer International Publishing
81 rdf:type schema:Organisation
82 Nde8d5e4a545b447f9c21e1294228647c schema:familyName Manulis
83 schema:givenName Mark
84 rdf:type schema:Person
85 Ne28af08170e9408eb6e77a274915476f rdf:first sg:person.012057510223.72
86 rdf:rest N8afb33427efe423e9c258966c8a49405
87 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
88 schema:name Information and Computing Sciences
89 rdf:type schema:DefinedTerm
90 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
91 schema:name Data Format
92 rdf:type schema:DefinedTerm
93 sg:grant.3798313 http://pending.schema.org/fundedItem sg:pub.10.1007/978-3-319-39555-5_3
94 rdf:type schema:MonetaryGrant
95 sg:person.012057510223.72 schema:affiliation https://www.grid.ac/institutes/grid.46078.3d
96 schema:familyName Goldberg
97 schema:givenName Ian
98 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012057510223.72
99 rdf:type schema:Person
100 sg:person.015752742217.50 schema:affiliation https://www.grid.ac/institutes/grid.5335.0
101 schema:familyName Jenkinson
102 schema:givenName Graeme
103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015752742217.50
104 rdf:type schema:Person
105 sg:person.015754042145.63 schema:affiliation https://www.grid.ac/institutes/grid.5335.0
106 schema:familyName Stajano
107 schema:givenName Frank
108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015754042145.63
109 rdf:type schema:Person
110 sg:pub.10.1007/11787006_25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021714446
111 https://doi.org/10.1007/11787006_25
112 rdf:type schema:CreativeWork
113 sg:pub.10.1007/3-540-44750-4_27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047548397
114 https://doi.org/10.1007/3-540-44750-4_27
115 rdf:type schema:CreativeWork
116 sg:pub.10.1007/978-3-319-07308-8_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021624931
117 https://doi.org/10.1007/978-3-319-07308-8_23
118 rdf:type schema:CreativeWork
119 sg:pub.10.1007/978-3-319-12400-1_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045233924
120 https://doi.org/10.1007/978-3-319-12400-1_17
121 rdf:type schema:CreativeWork
122 sg:pub.10.1007/978-3-319-26096-9_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046223030
123 https://doi.org/10.1007/978-3-319-26096-9_21
124 rdf:type schema:CreativeWork
125 sg:pub.10.1007/978-3-642-17455-1_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007244359
126 https://doi.org/10.1007/978-3-642-17455-1_8
127 rdf:type schema:CreativeWork
128 sg:pub.10.1007/978-3-642-25867-1_6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037644204
129 https://doi.org/10.1007/978-3-642-25867-1_6
130 rdf:type schema:CreativeWork
131 sg:pub.10.1007/978-3-642-35694-0_24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035475718
132 https://doi.org/10.1007/978-3-642-35694-0_24
133 rdf:type schema:CreativeWork
134 https://doi.org/10.1109/csac.1997.646200 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093381830
135 rdf:type schema:CreativeWork
136 https://doi.org/10.1109/securecomm.2005.56 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094057724
137 rdf:type schema:CreativeWork
138 https://doi.org/10.1109/sp.2012.44 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094471070
139 rdf:type schema:CreativeWork
140 https://doi.org/10.1145/128756.128759 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001657596
141 rdf:type schema:CreativeWork
142 https://doi.org/10.1145/1506409.1506429 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023168747
143 rdf:type schema:CreativeWork
144 https://doi.org/10.1145/1595676.1595695 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018031428
145 rdf:type schema:CreativeWork
146 https://doi.org/10.1145/1880022.1880028 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016591978
147 rdf:type schema:CreativeWork
148 https://doi.org/10.1145/2638728.2641705 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037294457
149 rdf:type schema:CreativeWork
150 https://doi.org/10.1145/358886.358895 schema:sameAs https://app.dimensions.ai/details/publication/pub.1031605248
151 rdf:type schema:CreativeWork
152 https://doi.org/10.1145/359168.359176 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036015253
153 rdf:type schema:CreativeWork
154 https://doi.org/10.1145/570645.570647 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042893678
155 rdf:type schema:CreativeWork
156 https://doi.org/10.1145/586110.586124 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033430214
157 rdf:type schema:CreativeWork
158 https://doi.org/10.3390/s120911734 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002251409
159 rdf:type schema:CreativeWork
160 https://www.grid.ac/institutes/grid.46078.3d schema:alternateName University of Waterloo
161 schema:name University of Waterloo
162 rdf:type schema:Organization
163 https://www.grid.ac/institutes/grid.5335.0 schema:alternateName University of Cambridge
164 schema:name University of Cambridge
165 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...