On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2017-04

AUTHORS

Marco Tiloca, Christian Gehrmann, Ludwig Seitz

ABSTRACT

DTLS is a transport layer security protocol designed to provide secure communication over unreliable datagram protocols. Before starting to communicate, a DTLS client and server perform a specific handshake in order to establish a secure session and agree on a common security context. However, the DTLS handshake is affected by two relevant issues. First, the DTLS server is vulnerable to a specific Denial of Service (DoS) attack aimed at forcing the establishment of several half-open sessions. This may exhaust memory and network resources on the server, so making it less responsive or even unavailable to legitimate clients. Second, although it is one of the most efficient key provisioning approaches adopted in DTLS, the pre-shared key provisioning mode does not scale well with the number of clients, it may result in scalability issues on the server side, and it complicates key re-provisioning in dynamic scenarios. This paper presents a single and efficient security architecture which addresses both issues, by substantially limiting the impact of DoS, and reducing the number of keys stored on the server side to one unit only. Our approach does not break the existing standard and does not require any additional message exchange between DTLS client and server. Our experimental results show that our approach requires a shorter amount of time to complete a handshake execution and consistently reduces the time a DTLS server is exposed to a DoS instance. We also show that it considerably improves a DTLS server in terms of service availability and robustness against DoS attack. More... »

PAGES

173-193

References to SciGraph publications

  • 1987. Finite Fields for Computer Scientists and Engineers in NONE
  • 2001. DOS-Resistant Authentication with Client Puzzles in SECURITY PROTOCOLS
  • 2002. Improving the Functionality of SYN Cookies in ADVANCED COMMUNICATIONS AND MULTIMEDIA SECURITY
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s10207-016-0326-0

    DOI

    http://dx.doi.org/10.1007/s10207-016-0326-0

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1036610097


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Swedish Institute of Computer Science", 
              "id": "https://www.grid.ac/institutes/grid.6383.e", 
              "name": [
                "SICS Swedish ICT AB, Security Lab, Isafjordsgatan 22, 16440, Kista, Sweden"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Tiloca", 
            "givenName": "Marco", 
            "id": "sg:person.013022720720.68", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013022720720.68"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Swedish Institute of Computer Science", 
              "id": "https://www.grid.ac/institutes/grid.6383.e", 
              "name": [
                "SICS Swedish ICT AB, Security Lab, Scheelev\u00e4gen 17, 22370, Lund, Sweden"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Gehrmann", 
            "givenName": "Christian", 
            "id": "sg:person.07667010217.52", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07667010217.52"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Swedish Institute of Computer Science", 
              "id": "https://www.grid.ac/institutes/grid.6383.e", 
              "name": [
                "SICS Swedish ICT AB, Security Lab, Scheelev\u00e4gen 17, 22370, Lund, Sweden"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Seitz", 
            "givenName": "Ludwig", 
            "id": "sg:person.012475705127.93", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012475705127.93"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1145/505586.505588", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1001462223"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/844128.844134", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007025080"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/383059.383060", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1012191316"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/586110.586128", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017527172"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44810-1_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1019869786", 
              "https://doi.org/10.1007/3-540-44810-1_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-0-387-35612-9_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022368070", 
              "https://doi.org/10.1007/978-0-387-35612-9_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/571697.571724", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041704287"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://app.dimensions.ai/details/publication/pub.1048324810", 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://app.dimensions.ai/details/publication/pub.1048324810", 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-1-4613-1983-2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1051192060", 
              "https://doi.org/10.1007/978-1-4613-1983-2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-1-4613-1983-2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1051192060", 
              "https://doi.org/10.1007/978-1-4613-1983-2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/65.793694", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061205720"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tdsc.2005.35", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061585080"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tnet.2004.842221", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061714510"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tnet.2006.890133", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061714744"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/347057.347560", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1063168717"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/wict.2011.6141240", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093549412"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/infocom.2006.127", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094040068"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/glocom.2004.1378371", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094286103"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/trustcom.2011.6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094337232"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/infcom.2002.1019404", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094874889"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/wowmom.2013.6583465", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095275468"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2017-04", 
        "datePublishedReg": "2017-04-01", 
        "description": "DTLS is a transport layer security protocol designed to provide secure communication over unreliable datagram protocols. Before starting to communicate, a DTLS client and server perform a specific handshake in order to establish a secure session and agree on a common security context. However, the DTLS handshake is affected by two relevant issues. First, the DTLS server is vulnerable to a specific Denial of Service (DoS) attack aimed at forcing the establishment of several half-open sessions. This may exhaust memory and network resources on the server, so making it less responsive or even unavailable to legitimate clients. Second, although it is one of the most efficient key provisioning approaches adopted in DTLS, the pre-shared key provisioning mode does not scale well with the number of clients, it may result in scalability issues on the server side, and it complicates key re-provisioning in dynamic scenarios. This paper presents a single and efficient security architecture which addresses both issues, by substantially limiting the impact of DoS, and reducing the number of keys stored on the server side to one unit only. Our approach does not break the existing standard and does not require any additional message exchange between DTLS client and server. Our experimental results show that our approach requires a shorter amount of time to complete a handshake execution and consistently reduces the time a DTLS server is exposed to a DoS instance. We also show that it considerably improves a DTLS server in terms of service availability and robustness against DoS attack.", 
        "genre": "research_article", 
        "id": "sg:pub.10.1007/s10207-016-0326-0", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isFundedItemOf": [
          {
            "id": "sg:grant.3852852", 
            "type": "MonetaryGrant"
          }
        ], 
        "isPartOf": [
          {
            "id": "sg:journal.1136826", 
            "issn": [
              "1615-5262", 
              "1615-5270"
            ], 
            "name": "International Journal of Information Security", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "2", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "16"
          }
        ], 
        "name": "On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake", 
        "pagination": "173-193", 
        "productId": [
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "ae65df51ec2e118ecc52afae5571281cf041fdbddf3e3a3b91fc2acac4db00b3"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s10207-016-0326-0"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1036610097"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s10207-016-0326-0", 
          "https://app.dimensions.ai/details/publication/pub.1036610097"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2019-04-10T23:19", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8693_00000490.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "http://link.springer.com/10.1007/s10207-016-0326-0"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s10207-016-0326-0'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s10207-016-0326-0'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s10207-016-0326-0'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s10207-016-0326-0'


     

    This table displays all metadata directly associated to this object as RDF triples.

    140 TRIPLES      21 PREDICATES      47 URIs      19 LITERALS      7 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s10207-016-0326-0 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author Nc6e223b9d6ce467fa3de4125a504b175
    4 schema:citation sg:pub.10.1007/3-540-44810-1_22
    5 sg:pub.10.1007/978-0-387-35612-9_6
    6 sg:pub.10.1007/978-1-4613-1983-2
    7 https://app.dimensions.ai/details/publication/pub.1048324810
    8 https://doi.org/10.1109/65.793694
    9 https://doi.org/10.1109/glocom.2004.1378371
    10 https://doi.org/10.1109/infcom.2002.1019404
    11 https://doi.org/10.1109/infocom.2006.127
    12 https://doi.org/10.1109/tdsc.2005.35
    13 https://doi.org/10.1109/tnet.2004.842221
    14 https://doi.org/10.1109/tnet.2006.890133
    15 https://doi.org/10.1109/trustcom.2011.6
    16 https://doi.org/10.1109/wict.2011.6141240
    17 https://doi.org/10.1109/wowmom.2013.6583465
    18 https://doi.org/10.1145/347057.347560
    19 https://doi.org/10.1145/383059.383060
    20 https://doi.org/10.1145/505586.505588
    21 https://doi.org/10.1145/571697.571724
    22 https://doi.org/10.1145/586110.586128
    23 https://doi.org/10.1145/844128.844134
    24 schema:datePublished 2017-04
    25 schema:datePublishedReg 2017-04-01
    26 schema:description DTLS is a transport layer security protocol designed to provide secure communication over unreliable datagram protocols. Before starting to communicate, a DTLS client and server perform a specific handshake in order to establish a secure session and agree on a common security context. However, the DTLS handshake is affected by two relevant issues. First, the DTLS server is vulnerable to a specific Denial of Service (DoS) attack aimed at forcing the establishment of several half-open sessions. This may exhaust memory and network resources on the server, so making it less responsive or even unavailable to legitimate clients. Second, although it is one of the most efficient key provisioning approaches adopted in DTLS, the pre-shared key provisioning mode does not scale well with the number of clients, it may result in scalability issues on the server side, and it complicates key re-provisioning in dynamic scenarios. This paper presents a single and efficient security architecture which addresses both issues, by substantially limiting the impact of DoS, and reducing the number of keys stored on the server side to one unit only. Our approach does not break the existing standard and does not require any additional message exchange between DTLS client and server. Our experimental results show that our approach requires a shorter amount of time to complete a handshake execution and consistently reduces the time a DTLS server is exposed to a DoS instance. We also show that it considerably improves a DTLS server in terms of service availability and robustness against DoS attack.
    27 schema:genre research_article
    28 schema:inLanguage en
    29 schema:isAccessibleForFree false
    30 schema:isPartOf Na3dbc284fc404d0da80618c38ac23a22
    31 Nb08aef226f74423582ef9cae33c5a567
    32 sg:journal.1136826
    33 schema:name On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake
    34 schema:pagination 173-193
    35 schema:productId N5959bbe51c1f4b5396b486227da33d2f
    36 N5e28ae7bdfed49649fa9a0b833e6cfee
    37 N981b2ea483bc4a50bf826824c6096607
    38 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036610097
    39 https://doi.org/10.1007/s10207-016-0326-0
    40 schema:sdDatePublished 2019-04-10T23:19
    41 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    42 schema:sdPublisher Nbd39014a2ce34b27b9b5c7ea74b65188
    43 schema:url http://link.springer.com/10.1007/s10207-016-0326-0
    44 sgo:license sg:explorer/license/
    45 sgo:sdDataset articles
    46 rdf:type schema:ScholarlyArticle
    47 N0996e5b34824475685ddd7b5127b4b1d rdf:first sg:person.012475705127.93
    48 rdf:rest rdf:nil
    49 N5959bbe51c1f4b5396b486227da33d2f schema:name dimensions_id
    50 schema:value pub.1036610097
    51 rdf:type schema:PropertyValue
    52 N5e28ae7bdfed49649fa9a0b833e6cfee schema:name readcube_id
    53 schema:value ae65df51ec2e118ecc52afae5571281cf041fdbddf3e3a3b91fc2acac4db00b3
    54 rdf:type schema:PropertyValue
    55 N981b2ea483bc4a50bf826824c6096607 schema:name doi
    56 schema:value 10.1007/s10207-016-0326-0
    57 rdf:type schema:PropertyValue
    58 N9b0a428db3684e40a7844c6faec8689a rdf:first sg:person.07667010217.52
    59 rdf:rest N0996e5b34824475685ddd7b5127b4b1d
    60 Na3dbc284fc404d0da80618c38ac23a22 schema:issueNumber 2
    61 rdf:type schema:PublicationIssue
    62 Nb08aef226f74423582ef9cae33c5a567 schema:volumeNumber 16
    63 rdf:type schema:PublicationVolume
    64 Nbd39014a2ce34b27b9b5c7ea74b65188 schema:name Springer Nature - SN SciGraph project
    65 rdf:type schema:Organization
    66 Nc6e223b9d6ce467fa3de4125a504b175 rdf:first sg:person.013022720720.68
    67 rdf:rest N9b0a428db3684e40a7844c6faec8689a
    68 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    69 schema:name Information and Computing Sciences
    70 rdf:type schema:DefinedTerm
    71 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    72 schema:name Data Format
    73 rdf:type schema:DefinedTerm
    74 sg:grant.3852852 http://pending.schema.org/fundedItem sg:pub.10.1007/s10207-016-0326-0
    75 rdf:type schema:MonetaryGrant
    76 sg:journal.1136826 schema:issn 1615-5262
    77 1615-5270
    78 schema:name International Journal of Information Security
    79 rdf:type schema:Periodical
    80 sg:person.012475705127.93 schema:affiliation https://www.grid.ac/institutes/grid.6383.e
    81 schema:familyName Seitz
    82 schema:givenName Ludwig
    83 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012475705127.93
    84 rdf:type schema:Person
    85 sg:person.013022720720.68 schema:affiliation https://www.grid.ac/institutes/grid.6383.e
    86 schema:familyName Tiloca
    87 schema:givenName Marco
    88 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013022720720.68
    89 rdf:type schema:Person
    90 sg:person.07667010217.52 schema:affiliation https://www.grid.ac/institutes/grid.6383.e
    91 schema:familyName Gehrmann
    92 schema:givenName Christian
    93 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07667010217.52
    94 rdf:type schema:Person
    95 sg:pub.10.1007/3-540-44810-1_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1019869786
    96 https://doi.org/10.1007/3-540-44810-1_22
    97 rdf:type schema:CreativeWork
    98 sg:pub.10.1007/978-0-387-35612-9_6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022368070
    99 https://doi.org/10.1007/978-0-387-35612-9_6
    100 rdf:type schema:CreativeWork
    101 sg:pub.10.1007/978-1-4613-1983-2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1051192060
    102 https://doi.org/10.1007/978-1-4613-1983-2
    103 rdf:type schema:CreativeWork
    104 https://app.dimensions.ai/details/publication/pub.1048324810 schema:CreativeWork
    105 https://doi.org/10.1109/65.793694 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061205720
    106 rdf:type schema:CreativeWork
    107 https://doi.org/10.1109/glocom.2004.1378371 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094286103
    108 rdf:type schema:CreativeWork
    109 https://doi.org/10.1109/infcom.2002.1019404 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094874889
    110 rdf:type schema:CreativeWork
    111 https://doi.org/10.1109/infocom.2006.127 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094040068
    112 rdf:type schema:CreativeWork
    113 https://doi.org/10.1109/tdsc.2005.35 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061585080
    114 rdf:type schema:CreativeWork
    115 https://doi.org/10.1109/tnet.2004.842221 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061714510
    116 rdf:type schema:CreativeWork
    117 https://doi.org/10.1109/tnet.2006.890133 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061714744
    118 rdf:type schema:CreativeWork
    119 https://doi.org/10.1109/trustcom.2011.6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094337232
    120 rdf:type schema:CreativeWork
    121 https://doi.org/10.1109/wict.2011.6141240 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093549412
    122 rdf:type schema:CreativeWork
    123 https://doi.org/10.1109/wowmom.2013.6583465 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095275468
    124 rdf:type schema:CreativeWork
    125 https://doi.org/10.1145/347057.347560 schema:sameAs https://app.dimensions.ai/details/publication/pub.1063168717
    126 rdf:type schema:CreativeWork
    127 https://doi.org/10.1145/383059.383060 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012191316
    128 rdf:type schema:CreativeWork
    129 https://doi.org/10.1145/505586.505588 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001462223
    130 rdf:type schema:CreativeWork
    131 https://doi.org/10.1145/571697.571724 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041704287
    132 rdf:type schema:CreativeWork
    133 https://doi.org/10.1145/586110.586128 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017527172
    134 rdf:type schema:CreativeWork
    135 https://doi.org/10.1145/844128.844134 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007025080
    136 rdf:type schema:CreativeWork
    137 https://www.grid.ac/institutes/grid.6383.e schema:alternateName Swedish Institute of Computer Science
    138 schema:name SICS Swedish ICT AB, Security Lab, Isafjordsgatan 22, 16440, Kista, Sweden
    139 SICS Swedish ICT AB, Security Lab, Scheelevägen 17, 22370, Lund, Sweden
    140 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...