Pub Date : 2018-03-09DOI: 10.1109/MOBISECSERV.2018.8311441
Kentaro Tsujishita, Keiichi Iwamurra
Conventional password-protected secret sharing (PPSS) based on Shamir's (k, n) secret sharing scheme requires 2k − 1 shares for reconstructing a search result. However, it can reconstruct the secret by leveraging k shares, because it performs secure multiplication. In this case, it is easier to restore the secret than the search result. In this paper, we propose a novel PPSS with the same distribution threshold for the secret as well as the restoration of the search result. We use the TUS2 method proposed by Aminuddin et al. However, it cannot include 0 as a secret. Therefore, we improve the TUS2 method such that it can include 0 as secret. In addition, we evaluate the security of our scheme, and prove that it is secure. Furthermore, we compare the computational cost of the conventional PPSS and our scheme.
{"title":"Password-protected secret sharing scheme with the same threshold in distribution and restoration","authors":"Kentaro Tsujishita, Keiichi Iwamurra","doi":"10.1109/MOBISECSERV.2018.8311441","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311441","url":null,"abstract":"Conventional password-protected secret sharing (PPSS) based on Shamir's (k, n) secret sharing scheme requires 2k − 1 shares for reconstructing a search result. However, it can reconstruct the secret by leveraging k shares, because it performs secure multiplication. In this case, it is easier to restore the secret than the search result. In this paper, we propose a novel PPSS with the same distribution threshold for the secret as well as the restoration of the search result. We use the TUS2 method proposed by Aminuddin et al. However, it cannot include 0 as a secret. Therefore, we improve the TUS2 method such that it can include 0 as secret. In addition, we evaluate the security of our scheme, and prove that it is secure. Furthermore, we compare the computational cost of the conventional PPSS and our scheme.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122867281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-09DOI: 10.1109/MOBISECSERV.2018.8311438
Keiichi Iwamura, Kyohei Tokita
Secure computation is a major issue that affects the utilization of Big Data. Two main approaches are employed to achieve secure computation: homomorphic encryption (HE). and secret sharing schemes (SSSs), where the computational cost of the latter is generally much less than that of HE. Aminuddin et al. proposed a secure product-sum computation that allows secure multiplication for n < 2k − 1 by using the (scalar value x polynomial) approach. However, this approach requires a polynomial calculation because it uses Shamir's SSS, so it cannot be processed rapidly. In this study, we propose a fast secure computation method based on the XOR scheme, and we evaluate its performance and security.
{"title":"Fast secure computation based on a secret sharing scheme for n < 2k − 1","authors":"Keiichi Iwamura, Kyohei Tokita","doi":"10.1109/MOBISECSERV.2018.8311438","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311438","url":null,"abstract":"Secure computation is a major issue that affects the utilization of Big Data. Two main approaches are employed to achieve secure computation: homomorphic encryption (HE). and secret sharing schemes (SSSs), where the computational cost of the latter is generally much less than that of HE. Aminuddin et al. proposed a secure product-sum computation that allows secure multiplication for n < 2k − 1 by using the (scalar value x polynomial) approach. However, this approach requires a polynomial calculation because it uses Shamir's SSS, so it cannot be processed rapidly. In this study, we propose a fast secure computation method based on the XOR scheme, and we evaluate its performance and security.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127092539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-24DOI: 10.1109/MOBISECSERV.2018.8311440
Martin Andreoni Lopez, A. Lobato, O. Duarte, G. Pujolle
Network Function Virtualization (NFV) provides new opportunities for efficient and low-cost security solutions. Real-time traffic monitoring and fast security threat detection is a challenge to reduce the risk of great damages. In this paper, we propose a virtualized network function in an Open Source Platform for providing a real-time threat detection service. Our function combines cloud computing and distributed stream processing techniques to accurately and quickly detect threats. The proposed virtualized network function shows a good elasticity shrinking and scaling accordingly to the required load. The results show that the proposed function is able to scale dynamically, analyzing more than five million messages per second. In addition, the function easily migrates sensor elements to reduce latency, allowing the sensor to be located as near as possible to the client.
{"title":"An evaluation of a virtual network function for real-time threat detection using stream processing","authors":"Martin Andreoni Lopez, A. Lobato, O. Duarte, G. Pujolle","doi":"10.1109/MOBISECSERV.2018.8311440","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311440","url":null,"abstract":"Network Function Virtualization (NFV) provides new opportunities for efficient and low-cost security solutions. Real-time traffic monitoring and fast security threat detection is a challenge to reduce the risk of great damages. In this paper, we propose a virtualized network function in an Open Source Platform for providing a real-time threat detection service. Our function combines cloud computing and distributed stream processing techniques to accurately and quickly detect threats. The proposed virtualized network function shows a good elasticity shrinking and scaling accordingly to the required load. The results show that the proposed function is able to scale dynamically, analyzing more than five million messages per second. In addition, the function easily migrates sensor elements to reduce latency, allowing the sensor to be located as near as possible to the client.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126891739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/MOBISECSERV.2018.8311439
M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, A. Mammeri
A Mobile ad hoc network (MANET) is a set of nodes that communicate together in a cooperative way using the wireless medium, and without any central administration. Due to its inherent open nature and the lack of infrastructure, security is a complicated issue compared to other networks. That is, these networks are vulnerable to a a wide range of attacks at different network layers. At the network level, malicious nodes can perform several attacks ranging from passive eavesdropping to active interfering. Wormhole is an example of severe attack that has attracted much attention recently. It involves the redirection of traffic between two end-nodes through a Wormhole tunnel, and manipulates the routing algorithm to give illusion that nodes located far from each other are neighbors. To handle with this issue, we propose a novel detection model to allow a node to check whether a presumed shortest path contains a Wormhole tunnel or not. Our approach is based on the fact that the Wormhole tunnel reduces significantly the length of the paths passing through it.
{"title":"Graph-based wormhole attack detection in mobile ad hoc networks (MANETs)","authors":"M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, A. Mammeri","doi":"10.1109/MOBISECSERV.2018.8311439","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311439","url":null,"abstract":"A Mobile ad hoc network (MANET) is a set of nodes that communicate together in a cooperative way using the wireless medium, and without any central administration. Due to its inherent open nature and the lack of infrastructure, security is a complicated issue compared to other networks. That is, these networks are vulnerable to a a wide range of attacks at different network layers. At the network level, malicious nodes can perform several attacks ranging from passive eavesdropping to active interfering. Wormhole is an example of severe attack that has attracted much attention recently. It involves the redirection of traffic between two end-nodes through a Wormhole tunnel, and manipulates the routing algorithm to give illusion that nodes located far from each other are neighbors. To handle with this issue, we propose a novel detection model to allow a node to check whether a presumed shortest path contains a Wormhole tunnel or not. Our approach is based on the fact that the Wormhole tunnel reduces significantly the length of the paths passing through it.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133975698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The progress of the Internet makes enables a consumer to edit contents already exhibited on the Internet and thus create new content as secondary content. However, technology that protects the right of the author of original content in the secondary content is also required. Hence, this study involves proposing a content protection scheme that can control secondary use of content based on the intention of the author by using ID-based signature. The objective of the study involves verifying the practicality of the scheme by mounting it. Therefore, the scheme was applied to contents that were created by using "MikuMikuDance," a content editing tool for 3D CG movies, and a content protection system was mounted. The study illustrated the method, using which this system was mounted and described the evaluation of the processing speed in a simulation environment.
{"title":"Improvement and implementation of digital content protection scheme using identity based signature","authors":"Mutsumi Fujisaki, Keiichi Iwamura, Masaki Inamura, Kitahiro Kaneda","doi":"10.1109/MOBISECSERV.2018.8311449","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311449","url":null,"abstract":"The progress of the Internet makes enables a consumer to edit contents already exhibited on the Internet and thus create new content as secondary content. However, technology that protects the right of the author of original content in the secondary content is also required. Hence, this study involves proposing a content protection scheme that can control secondary use of content based on the intention of the author by using ID-based signature. The objective of the study involves verifying the practicality of the scheme by mounting it. Therefore, the scheme was applied to contents that were created by using \"MikuMikuDance,\" a content editing tool for 3D CG movies, and a content protection system was mounted. The study illustrated the method, using which this system was mounted and described the evaluation of the processing speed in a simulation environment.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132491806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/MOBISECSERV.2018.8311435
Jeremias Eppler, Yong Wang
Mobile devices are used for various activities ranging from entertainment to banking. Bring Your Own Devices (BYODs) and telecommuting allow employees to use their mobile devices in the environment of an organization and at home. The convergence of work and personal life introduces several security and privacy problems. This paper presents a technical approach to balance security and privacy needs of the employees and the organization as well as to reduce the risks associated with the BYODs and the telecommuting. The fundamental building block of the technical approach is virtualization. This paper presents an incremental mobile virtual machine operating system design and implements the first phase of the design by using the Xen hypervisor and a smartphone-like development board.
{"title":"Towards improving the security of mobile systems using virtualization and isolation","authors":"Jeremias Eppler, Yong Wang","doi":"10.1109/MOBISECSERV.2018.8311435","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311435","url":null,"abstract":"Mobile devices are used for various activities ranging from entertainment to banking. Bring Your Own Devices (BYODs) and telecommuting allow employees to use their mobile devices in the environment of an organization and at home. The convergence of work and personal life introduces several security and privacy problems. This paper presents a technical approach to balance security and privacy needs of the employees and the organization as well as to reduce the risks associated with the BYODs and the telecommuting. The fundamental building block of the technical approach is virtualization. This paper presents an incremental mobile virtual machine operating system design and implements the first phase of the design by using the Xen hypervisor and a smartphone-like development board.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129508534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/MOBISECSERV.2018.8311448
Keely Hill, K. Gagneja
NASA is planning to send a satellite with some people on it to Mars in 2019. They are calling it manned mission to Mars. This paper presents a high-level networking design to provide high bandwidth for a young and growing Mars settlement and science station. A physical network topology is described consisting of a high power ground station to communicate with orbiters. Different parts and devices of the station are connected with network infrastructure. Some examples are given for various non-obvious use cases of the network. Additionally, an upper level networking protocol is described to handle reliable communication between planets. This trans-planetary Data Mailing Protocol (TDMP) operates three processes working together: a database of retrievable files and user inbox files; a ‘parcel’ structure for data to be contained; and parcel piece fragmenting for asynchronous pipelined transmission and loss handling. Together, these systems allow ease of connection between people, scientists, and experiments.
{"title":"Concept network design for a young Mars science station and Trans-planetary communication","authors":"Keely Hill, K. Gagneja","doi":"10.1109/MOBISECSERV.2018.8311448","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311448","url":null,"abstract":"NASA is planning to send a satellite with some people on it to Mars in 2019. They are calling it manned mission to Mars. This paper presents a high-level networking design to provide high bandwidth for a young and growing Mars settlement and science station. A physical network topology is described consisting of a high power ground station to communicate with orbiters. Different parts and devices of the station are connected with network infrastructure. Some examples are given for various non-obvious use cases of the network. Additionally, an upper level networking protocol is described to handle reliable communication between planets. This trans-planetary Data Mailing Protocol (TDMP) operates three processes working together: a database of retrievable files and user inbox files; a ‘parcel’ structure for data to be contained; and parcel piece fragmenting for asynchronous pipelined transmission and loss handling. Together, these systems allow ease of connection between people, scientists, and experiments.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132420755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/MOBISECSERV.2018.8311437
A. Vora, L. Reznik, I. Khokhlov
Harnessing the power of mobile computing platforms has opened up newer possibilities of gathering and classifying data by leveraging the use of crowd-sourcing. In the current generation that is being dominated by the mobile computing platform namely smart-phones, crowd-sourcing can be achieved in a relatively hassle-free yet effective means of collecting data from a large set of ordinary users. Tapping into this source pool, however, has a drawback of unspecified data quality and security and hence the lack of trust in the data collected. This paper proposes an approach that aims to realize the most influential factors related to destructiveness of potholes that are encountered on roadways, while supplementing the data with quality estimates derived from the completeness of the data and security and quality factors of the input device itself that is involved in the data collection process, thereby addressing the drawback of data trust. The mobile application design is described. The application use cases are presented and discussed.
{"title":"Mobile road pothole classification and reporting with data quality estimates","authors":"A. Vora, L. Reznik, I. Khokhlov","doi":"10.1109/MOBISECSERV.2018.8311437","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311437","url":null,"abstract":"Harnessing the power of mobile computing platforms has opened up newer possibilities of gathering and classifying data by leveraging the use of crowd-sourcing. In the current generation that is being dominated by the mobile computing platform namely smart-phones, crowd-sourcing can be achieved in a relatively hassle-free yet effective means of collecting data from a large set of ordinary users. Tapping into this source pool, however, has a drawback of unspecified data quality and security and hence the lack of trust in the data collected. This paper proposes an approach that aims to realize the most influential factors related to destructiveness of potholes that are encountered on roadways, while supplementing the data with quality estimates derived from the completeness of the data and security and quality factors of the input device itself that is involved in the data collection process, thereby addressing the drawback of data trust. The mobile application design is described. The application use cases are presented and discussed.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"146 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129773978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/MOBISECSERV.2018.8311444
Nour El Madhoun, E. Bertin, G. Pujolle
EMV (Europay Mastercard Visa) is the international standard implemented to secure purchase and deposit/withdrawal transactions. It represents a set of security rules and messages exchanged between the transaction actors in order to guarantee important security properties (such as authentication, authorization, integrity, etc.). However, several recent research studies have analyzed the EMV security standard and show that it is vulnerable to attacks. This paper presents an overview of the EMV protocol and its security vulnerabilities.
{"title":"An Overview of the EMV Protocol and Its Security Vulnerabilities","authors":"Nour El Madhoun, E. Bertin, G. Pujolle","doi":"10.1109/MOBISECSERV.2018.8311444","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311444","url":null,"abstract":"EMV (Europay Mastercard Visa) is the international standard implemented to secure purchase and deposit/withdrawal transactions. It represents a set of security rules and messages exchanged between the transaction actors in order to guarantee important security properties (such as authentication, authorization, integrity, etc.). However, several recent research studies have analyzed the EMV security standard and show that it is vulnerable to attacks. This paper presents an overview of the EMV protocol and its security vulnerabilities.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"5 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132432597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/MOBISECSERV.2018.8311442
A. Wall, Hannes Raddatz, Michael Rethfeldt, P. Danielis, D. Timmermann
In smart building scenarios there are a lot of vulnerable devices that could be exploited to run attacks against other devices within the same LAN. Even though existing solutions mostly tackle the problem by cluster-based authentication and key management schemes, none of them leverages the potential of isolating traffic by network interface virtualization. Thus, we proposed in a previous work a concept to avoid unauthorized communication by considering separating applications with virtual MAC interfaces as the consequence. The decreased attack surface, as the main advantage, is achieved by isolating communication through virtual MAC interfaces based on application-specific demands. To demonstrate the efficiency of this concept we developed an implementation based on state-of-the-art communication protocols. We applied our interface virtualization concept to the IEEE 802.11s WLAN mesh technology, combining it with a lightweight RESTful web service for security credentials deployment. The resulting proof-of-concept implementation in a real-world multi-hop scenario shows performance of the credentials deployment and the impact of the MAC-layer parallelization. The promising results, e.g., no drop of the overall throughput using multiple virtual MAC interfaces, show that our concept can be an efficient solution for future smart buildings.
{"title":"Performance evaluation of MAC-layer trust zones over virtual network interfaces","authors":"A. Wall, Hannes Raddatz, Michael Rethfeldt, P. Danielis, D. Timmermann","doi":"10.1109/MOBISECSERV.2018.8311442","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311442","url":null,"abstract":"In smart building scenarios there are a lot of vulnerable devices that could be exploited to run attacks against other devices within the same LAN. Even though existing solutions mostly tackle the problem by cluster-based authentication and key management schemes, none of them leverages the potential of isolating traffic by network interface virtualization. Thus, we proposed in a previous work a concept to avoid unauthorized communication by considering separating applications with virtual MAC interfaces as the consequence. The decreased attack surface, as the main advantage, is achieved by isolating communication through virtual MAC interfaces based on application-specific demands. To demonstrate the efficiency of this concept we developed an implementation based on state-of-the-art communication protocols. We applied our interface virtualization concept to the IEEE 802.11s WLAN mesh technology, combining it with a lightweight RESTful web service for security credentials deployment. The resulting proof-of-concept implementation in a real-world multi-hop scenario shows performance of the credentials deployment and the impact of the MAC-layer parallelization. The promising results, e.g., no drop of the overall throughput using multiple virtual MAC interfaces, show that our concept can be an efficient solution for future smart buildings.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121436886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}