researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
1993
1994
1996
1997
1998
1999
2000
2001
2003
2005
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
access control
analysis
architecture
data-flow
e-science
empirical
mobile
open-source
protocol
routing
rule-based
security
social
source-to-source
systematic-approach
testing
web applications
wireless sensor networks
Filter by Author
[+]
OR
AND
NOT
1
Adrian Perrig
Ahmad-Reza Sadeghi
Ari Juels
Christopher Kruegel
Dawn Song
Elisa Bertino
Florian Kerschbaum
Frank Piessens
Gilles Barthe
Giovanni Vigna
Michael Backes 0001
Nils Ole Tippenhauer
Prateek Mittal
Reihaneh Safavi-Naini
Robert H. Deng
Wenke Lee
Xiaofeng Wang
Yinqian Zhang
Yuval Elovici
Zhiqiang Lin
Filter by Top terms
[+]
OR
AND
NOT
1
acm
analysis
android
attacks
cloud
data
detection
efficient
encryption
learning
networks
poster
privacy
proceedings
secure
security
system
systems
using
workshop
ACM Conference on Computer and Communications Security (ccs)
Editions
Publications
Viewing Publication 1 - 100 from 4899
2023
Efficient Set Membership Encryption and Applications
Matthew Green 0001
,
Abhishek Jain 0002
,
Gijs Van Laer
.
ccs 2023
:
1080-1092
[doi]
The Effectiveness of Security Interventions on GitHub
Felix Fischer 0001
,
Jonas Höbenreich
,
Jens Grossklags
.
ccs 2023
:
2426-2440
[doi]
iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices
Jason Kim 0007
,
Stephan van Schaik
,
Daniel Genkin
,
Yuval Yarom
.
ccs 2023
:
2038-2052
[doi]
Poster: Efficient AES-GCM Decryption Under Homomorphic Encryption
Ehud Aharoni
,
Nir Drucker
,
Gilad Ezov
,
Eyal Kushnir
,
Hayim Shaul
,
Omri Soceanu
.
ccs 2023
:
3567-3569
[doi]
Tutorial-HEPack4ML '23: Advanced HE Packing Methods with Applications to ML
Ehud Aharoni
,
Nir Drucker
,
Hayim Shaul
.
ccs 2023
:
3669-3670
[doi]
Poster: Data Minimization by Construction for Trigger-Action Applications
Mohammad M. Ahmadpanah
,
Daniel Hedin
,
Andrei Sabelfeld
.
ccs 2023
:
3522-3524
[doi]
Formal Analysis of Access Control Mechanism of 5G Core Network
Mujtahid Akon
,
Tianchang Yang
,
Yilu Dong
,
Syed Rafiul Hussain
.
ccs 2023
:
666-680
[doi]
CPSIoTSec'23: Fifth Workshop on CPS & IoT Security and Privacy
Magnus Almgren
,
Earlence Fernandes
.
ccs 2023
:
3648-3650
[doi]
ProvG-Searcher: A Graph Representation Learning Approach for Efficient Provenance Graph Search
Enes Altinisik
,
Fatih Deniz
,
Hüsrev Taha Sencar
.
ccs 2023
:
2247-2261
[doi]
A Novel Analysis of Utility in Privacy Pipelines, Using Kronecker Products and Quantitative Information Flow
Mário S. Alvim
,
Natasha Fernandes
,
Annabelle McIver
,
Carroll Morgan
,
Gabriel Henrique Nunes
.
ccs 2023
:
1718-1731
[doi]
Demo: Data Minimization and Informed Consent in Administrative Forms
Nicolas Anciaux
,
Sabine Frittella
,
Baptiste Joffroy
,
Benjamin Nguyen
.
ccs 2023
:
3676-3678
[doi]
BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
Daniele Antonioli
.
ccs 2023
:
636-650
[doi]
Shufflecake: Plausible Deniability for Multiple Hidden Filesystems on Linux
Elia Anzuoni
,
Tommaso Gagliardoni
.
ccs 2023
:
3033-3047
[doi]
Poster: Longitudinal Measurement of the Adoption Dynamics in Apple's Privacy Label Ecosystem
David G. Balash
,
Mir Masood Ali
,
Monica Kodwani
,
Xiaoyuan Wu
,
Chris Kanich
,
Adam J. Aviv
.
ccs 2023
:
3600-3602
[doi]
Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing
David Balbás
,
Dario Fiore 0001
,
María Isabel González Vasco
,
Damien Robissout
,
Claudio Soriente
.
ccs 2023
:
1437-1451
[doi]
Amplification by Shuffling without Shuffling
Borja Balle
,
James Bell 0001
,
Adrià Gascón
.
ccs 2023
:
2292-2305
[doi]
Unforgeability in Stochastic Gradient Descent
Teodora Baluta
,
Ivica Nikolic
,
Racchit Jain
,
Divesh Aggarwal
,
Prateek Saxena
.
ccs 2023
:
1138-1152
[doi]
Is Modeling Access Control Worth It?
David A. Basin
,
Juan Guarnizo
,
Srdan Krstic
,
Hoang Nguyen
,
Martín Ochoa
.
ccs 2023
:
2830-2844
[doi]
Reward Shaping for Happier Autonomous Cyber Security Agents
Elizabeth Bates
,
Vasilios Mavroudis
,
Chris Hicks
.
ccs 2023
:
221-232
[doi]
Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification
Alexandre Belling
,
Azam Soleimanian
,
Olivier Bégassat
.
ccs 2023
:
1422-1436
[doi]
The Adversarial Implications of Variable-Time Inference
Dudi Biton
,
Aditi Misra
,
Efrat Levy
,
Jaidip Kotak
,
Ron Bitton
,
Roei Schuster
,
Nicolas Papernot
,
Yuval Elovici
,
Ben Nassi
.
ccs 2023
:
103-114
[doi]
ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks
Gregory Blanc
,
Takeshi Takahashi 0001
,
Zonghua Zhang
.
ccs 2023
:
3662-3663
[doi]
Verifiable Learning for Robust Tree Ensembles
Stefano Calzavara
,
Lorenzo Cazzaro
,
Giulio Ermanno Pibiri
,
Nicola Prezza
.
ccs 2023
:
1850-1864
[doi]
Jailbreaker in Jail: Moving Target Defense for Large Language Models
Bocheng Chen
,
Advait Paliwal
,
Qiben Yan
.
ccs 2023
:
29-32
[doi]
BlueShift: Probing Adaptive Frequency Hopping in Bluetooth
Tommy Chin
,
Noah Korzak
,
Kun Sun 0001
.
ccs 2023
:
13-16
[doi]
Membership Inference Attacks Against Semantic Segmentation Models
Tomás Chobola
,
Dmitrii Usynin
,
Georgios Kaissis
.
ccs 2023
:
43-53
[doi]
Drift Forensics of Malware Classifiers
Theo Chow
,
Zeliang Kan
,
Lorenz Linhardt
,
Lorenzo Cavallaro
,
Daniel Arp
,
Fabio Pierazzi
.
ccs 2023
:
197-207
[doi]
On the Security of Rate-limited Privacy Pass
Hien Chu
,
Khue Do
,
Lucjan Hanzlik
.
ccs 2023
:
2871-2885
[doi]
When Side-Channel Attacks Break the Black-Box Property of Embedded Artificial Intelligence
Benoît Coqueret
,
Mathieu Carbone
,
Olivier Sentieys
,
Gabriel Zaid
.
ccs 2023
:
127-138
[doi]
Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level
Yufei Du
,
Omar Alrawi
,
Kevin Z. Snow
,
Manos Antonakakis
,
Fabian Monrose
.
ccs 2023
:
2695-2709
[doi]
Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures
Kha Dinh Duy
,
Kyuwon Cho
,
Taehyun Noh
,
Hojoon Lee 0001
.
ccs 2023
:
874-888
[doi]
Black Ostrich: Web Application Scanning with String Solvers
Benjamin Eriksson
,
Amanda Stjerna
,
Riccardo De Masellis
,
Philipp Rümmer
,
Andrei Sabelfeld
.
ccs 2023
:
549-563
[doi]
Poster: Towards Practical Brainwave-based User Authentication
Matin Fallahi
,
Patricia Arias Cabarcos
,
Thorsten Strufe
.
ccs 2023
:
3627-3629
[doi]
Poster: WIP: Account ZK-Rollups from Sumcheck Arguments
Rex Fernando
,
Arnab Roy
.
ccs 2023
:
3594-3596
[doi]
SysXCHG: Refining Privilege with Adaptive System Call Filters
Alexander J. Gaidis
,
Vaggelis Atlidakis
,
Vasileios P. Kemerlis
.
ccs 2023
:
1964-1978
[doi]
Read Between the Lines: Detecting Tracking JavaScript with Bytecode Classification
Mohammad Ghasemisharif
,
Jason Polakis
.
ccs 2023
:
3475-3489
[doi]
Poster: Using CodeQL to Detect Malware in npm
Matías F. Gobbi
,
Johannes Kinder
.
ccs 2023
:
3519-3521
[doi]
Linear Communication in Malicious Majority MPC
S. Dov Gordon
,
Phi-Hung Le
,
Daniel McVicker
.
ccs 2023
:
2173-2187
[doi]
Demo: Image Disguising for Scalable GPU-accelerated Confidential Deep Learning
Yuechun Gu
,
Sagar Sharma
,
Keke Chen
.
ccs 2023
:
3679-3681
[doi]
Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and Coverage
Gibran Gómez
,
Kevin van Liebergen
,
Juan Caballero
.
ccs 2023
:
3183-3197
[doi]
Concurrent Composition for Interactive Differential Privacy with Adaptive Privacy-Loss Parameters
Samuel Haney
,
Michael Shoemate
,
Grace Tian
,
Salil P. Vadhan
,
Andrew Vyrros
,
Vicki Xu
,
Wanrong Zhang 0001
.
ccs 2023
:
1949-1963
[doi]
You Call This Archaeology? Evaluating Web Archives for Reproducible Web Security Measurements
Florian Hantke
,
Stefano Calzavara
,
Moritz Wilhelm
,
Alvise Rabitti
,
Ben Stock
.
ccs 2023
:
3168-3182
[doi]
Information Leakage from Data Updates in Machine Learning Models
Tian Hui
,
Farhad Farokhi
,
Olga Ohrimenko
.
ccs 2023
:
35-41
[doi]
Formalizing, Verifying and Applying ISA Security Guarantees as Universal Contracts
Sander Huyghebaert
,
Steven Keuchel
,
Coen De Roover
,
Dominique Devriese
.
ccs 2023
:
2083-2097
[doi]
Broken Promises: Measuring Confounding Effects in Learning-based Vulnerability Discovery
Erik Imgrund
,
Tom Ganz
,
Martin Härterich
,
Lukas Pirch
,
Niklas Risse
,
Konrad Rieck
.
ccs 2023
:
149-160
[doi]
Protecting HRP UWB Ranging System Against Distance Reduction Attacks
Kyungho Joo
,
Dong Hoon Lee 0001
,
Yeonseon Jeong
,
Wonsuk Choi
.
ccs 2023
:
622-635
[doi]
Privacy in the Age of Neurotechnology: Investigating Public Attitudes towards Brain Data Collection and Use
Emiram Kablo
,
Patricia Arias Cabarcos
.
ccs 2023
:
225-238
[doi]
Comprehension from Chaos: Towards Informed Consent for Private Computation
Bailey Kacsmar
,
Vasisht Duddu
,
Kyle Tilbury
,
Blase Ur
,
Florian Kerschbaum
.
ccs 2023
:
210-224
[doi]
FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains
Aniket Kate
,
Easwar Vivek Mangipudi
,
Siva Maradana
,
Pratyay Mukherjee
.
ccs 2023
:
1776-1790
[doi]
General Data Protection Runtime: Enforcing Transparent GDPR Compliance for Existing Applications
David Klein
,
Benny Rolle
,
Thomas Barber
,
Manuel Karl
,
Martin Johns
.
ccs 2023
:
3343-3357
[doi]
Poster: The Risk of Insufficient Isolation of Database Transactions in Web Applications
Simon Koch
,
Malte Wessels
,
David Klein
,
Martin Johns
.
ccs 2023
:
3576-3578
[doi]
MESAS: Poisoning Defense for Federated Learning Resilient against Adaptive Attackers
Torsten Krauß
,
Alexandra Dmitrienko
.
ccs 2023
:
1526-1540
[doi]
Simplifying Mixed Boolean-Arithmetic Obfuscation by Program Synthesis and Term Rewriting
Jaehyung Lee
,
Woosuk Lee
.
ccs 2023
:
2351-2365
[doi]
ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency
Julia Len
,
Melissa Chase
,
Esha Ghosh
,
Daniel Jost 0001
,
Balachandar Kesavan
,
Antonio Marcedone
.
ccs 2023
:
2915-2929
[doi]
Poster: Privacy Risks from Misconfigured Android Content Providers
Christopher Lenk
,
Johannes Kinder
.
ccs 2023
:
3579-3581
[doi]
COMBINE: COMpilation and Backend-INdependent vEctorization for Multi-Party Computation
Benjamin Levy
,
Muhammad Ishaq
,
Benjamin Sherman
,
Lindsey Kennard
,
Ana L. Milanova
,
Vassilis Zikas
.
ccs 2023
:
2531-2545
[doi]
SaTS'23: The 1st ACM Workshop on Secure and Trustworthy Superapps
Zhiqiang Lin
,
Xiaojing Liao
.
ccs 2023
:
3655-3656
[doi]
ADEM: An Authentic Digital EMblem
Felix Linker
,
David Basin
.
ccs 2023
:
2815-2829
[doi]
Phoenix: Detect and Locate Resilience Issues in Blockchain via Context-Sensitive Chaos
Fuchen Ma
,
Yuanliang Chen
,
Yuanhang Zhou
,
Jingxuan Sun
,
Zhuo Su 0005
,
Yu Jiang 0001
,
Jiaguang Sun
,
Huizhong Li
.
ccs 2023
:
1182-1196
[doi]
Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic Encryption
Rasoul Akhavan Mahdavi
,
Haoyan Ni
,
Dimitry Linkov
,
Florian Kerschbaum
.
ccs 2023
:
2945-2958
[doi]
Compact Frequency Estimators in Adversarial Environments
Sam A. Markelon
,
Mia Filic
,
Thomas Shrimpton
.
ccs 2023
:
3254-3268
[doi]
Tainted Secure Multi-Execution to Restrict Attacker Influence
McKenna McCall
,
Abhishek Bichhawat
,
Limin Jia 0001
.
ccs 2023
:
1732-1745
[doi]
Poster: RPAL-Recovering Malware Classifiers from Data Poisoning using Active Learning
Shae McFadden
,
Zeliang Kan
,
Lorenzo Cavallaro
,
Fabio Pierazzi
.
ccs 2023
:
3561-3563
[doi]
Marketing to Children Through Online Targeted Advertising: Targeting Mechanisms and Legal Aspects
Tinhinane Medjkoune
,
Oana Goga
,
Juliette Senechal
.
ccs 2023
:
180-194
[doi]
Greybox Fuzzing of Distributed Systems
Ruijie Meng
,
George Pîrlea
,
Abhik Roychoudhury
,
Ilya Sergey
.
ccs 2023
:
1615-1629
[doi]
Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials
Omid Mir
,
Balthazar Bauer
,
Scott Griffy
,
Anna Lysyanskaya
,
Daniel Slamanig
.
ccs 2023
:
30-44
[doi]
Poster: Generating Experiences for Autonomous Network Defense
Andres Molina-Markham
,
Luis F. Robaina
,
Akash H. Trivedi
,
Derek G. Tsui
,
Ahmad Ridley
.
ccs 2023
:
3531-3533
[doi]
LeakyOhm: Secret Bits Extraction using Impedance Analysis
Saleh Khalaj Monfared
,
Tahoura Mosavirik
,
Shahin Tajik
.
ccs 2023
:
1675-1689
[doi]
"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers
Collins W. Munyendo
,
Peter Mayer 0001
,
Adam J. Aviv
.
ccs 2023
:
3123-3137
[doi]
CryptoBap: A Binary Analysis Platform for Cryptographic Protocols
Faezeh Nasrabadi
,
Robert Künnemann
,
Hamed Nemati
.
ccs 2023
:
1362-1376
[doi]
Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel
Tao Ni
,
Xiaokuan Zhang
,
Qingchuan Zhao
.
ccs 2023
:
253-267
[doi]
Poster: Fooling XAI with Explanation-Aware Backdoors
Maximilian Noppel
,
Christian Wressnegger
.
ccs 2023
:
3612-3614
[doi]
Finding All Cross-Site Needles in the DOM Stack: A Comprehensive Methodology for the Automatic XS-Leak Detection in Web Browsers
Dominik Trevor Noß
,
Lukas Knittel
,
Christian Mainka
,
Marcus Niemietz
,
Jörg Schwenk
.
ccs 2023
:
2456-2470
[doi]
"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
Daniel Olszewski
,
Allison Lu
,
Carson Stillman
,
Kevin Warren
,
Cole Kitroser
,
Alejandro Pascual
,
Divyajyoti Ukirde
,
Kevin R. B. Butler
,
Patrick Traynor
.
ccs 2023
:
3433-3459
[doi]
ACABELLA: Automated (Crypt)analysis of Attribute-Based Encryption Leveraging Linear Algebra
Antonio De La Piedra
,
Marloes Venema
,
Greg Alpár
.
ccs 2023
:
3269-3283
[doi]
AISec '23: 16th ACM Workshop on Artificial Intelligence and Security
Maura Pintor
,
Florian Simon Tramèr
,
Xinyun Chen
.
ccs 2023
:
3666-3668
[doi]
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023
Maura Pintor
,
Xinyun Chen
,
Florian Tramèr
, editors,
ACM,
2023.
[doi]
Vulnerability Intelligence Alignment via Masked Graph Attention Networks
Yue Qin
,
Yue Xiao
,
Xiaojing Liao
.
ccs 2023
:
2202-2216
[doi]
Jack-in-the-box: An Empirical Study of JavaScript Bundling on the Web and its Security Implications
Jeremy Rack
,
Cristian-Alexandru Staicu
.
ccs 2023
:
3198-3212
[doi]
Task-Agnostic Safety for Reinforcement Learning
Md Asifur Rahman
,
Sarra Alqahtani
.
ccs 2023
:
139-148
[doi]
Passive SSH Key Compromise via Lattices
Keegan Ryan
,
Kaiwen He
,
George Arnold Sullivan
,
Nadia Heninger
.
ccs 2023
:
2886-2900
[doi]
Unhelpful Assumptions in Software Security Research
Ita Ryan
,
Utz Roedig
,
Klaas-Jan Stol
.
ccs 2023
:
3460-3474
[doi]
Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks
Sajin Sasy
,
Aaron Johnson 0001
,
Ian Goldberg
.
ccs 2023
:
3328-3342
[doi]
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers
Till Schlüter
,
Amit Choudhari
,
Lorenz Hetterich
,
Leon Trampert
,
Hamed Nemati
,
Ahmad Ibrahim 0002
,
Michael Schwarz 0001
,
Christian Rossow
,
Nils Ole Tippenhauer
.
ccs 2023
:
975-989
[doi]
IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis
David Schmidt
,
Carlotta Tagliaro
,
Kevin Borgolte
,
Martina Lindorfer
.
ccs 2023
:
681-695
[doi]
RanABD: MTD-Based Technique for Detection of Advanced Session-Replay Web Bots
shadi sadeghpour
,
Natalija Vlajic
.
ccs 2023
:
17-23
[doi]
TrustBoost: Boosting Trust among Interoperable Blockchains
Peiyao Sheng
,
Xuechao Wang
,
Sreeram Kannan
,
Kartik Nayak
,
Pramod Viswanath
.
ccs 2023
:
1571-1584
[doi]
Lifting Network Protocol Implementation to Precise Format Specification with Security Applications
Qingkai Shi
,
Junyang Shao
,
Yapeng Ye
,
Mingwei Zheng
,
Xiangyu Zhang 0001
.
ccs 2023
:
1287-1301
[doi]
Poster: From Hashes to Ashes - A Comparison of Transcription Services
Rudolf Siegel
,
Rafael Mrowczynski
,
Maria Hellenthal
,
Michael Schilling 0001
.
ccs 2023
:
3534-3536
[doi]
Grotto: Screaming fast (2+1)-PC or ℤ2n via (2, 2)-DPFs
Kyle Storrier
,
Adithya Vadapalli
,
Allan Lyons
,
Ryan Henry
.
ccs 2023
:
2143-2157
[doi]
LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures
Erkan Tairi
,
Pedro Moreno-Sanchez
,
Clara Schneidewind
.
ccs 2023
:
859-873
[doi]
Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules
Mathew Vermeer
,
Natalia Kadenko
,
Michel van Eeten
,
Carlos Gañán
,
Simon Parkin
.
ccs 2023
:
2770-2784
[doi]
Comparse: Provably Secure Formats for Cryptographic Protocols
Théophile Wallez
,
Jonathan Protzenko
,
Karthikeyan Bhargavan
.
ccs 2023
:
564-578
[doi]
PolicyChecker: Analyzing the GDPR Completeness of Mobile Apps' Privacy Policies
Anhao Xiang
,
Weiping Pei
,
Chuan Yue
.
ccs 2023
:
3373-3387
[doi]
Whole-Program Control-Flow Path Attestation
Nikita Yadav
,
Vinod Ganapathy
.
ccs 2023
:
2680-2694
[doi]
Poster: Signer Discretion is Advised: On the Insecurity of Vitalik's Threshold Hash-based Signatures
Mario Yaksetig
,
Alexander Havlin
.
ccs 2023
:
3597-3599
[doi]
CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation
Jianjia Yu
,
Song Li 0006
,
JunMin Zhu
,
Yinzhi Cao
.
ccs 2023
:
2441-2455
[doi]
Poster: Combining Fuzzing with Concolic Execution for IoT Firmware Testing
Jihyeon Yu
,
Juhwan Kim
,
Yeohoon Yun
,
Joobeom Yun
.
ccs 2023
:
3564-3566
[doi]
Poster: Unveiling the Impact of Patch Placement: Adversarial Patch Attacks on Monocular Depth Estimation
Gyungeun Yun
,
Kyungho Joo
,
Wonsuk Choi
,
Dong-Hoon Lee
.
ccs 2023
:
3639-3641
[doi]
TunneLs for Bootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG
Zhenkai Zhang
,
Tyler Allen
,
Fan Yao
,
Xing Gao 0001
,
Rong Ge
.
ccs 2023
:
960-974
[doi]
Sign in
or
sign up
to see more results.