{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:01:48Z","timestamp":1725483708700},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427339"},{"type":"electronic","value":"9783540454960"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_9","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T13:08:40Z","timestamp":1178370520000},"page":"112-125","source":"Crossref","is-referenced-by-count":3,"title":["Efficiency Improvements of the Private Message Service"],"prefix":"10.1007","author":[{"given":"Oliver","family":"Berthold","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Clau\u00df","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"K\u00f6psell","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Pfitzmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"9_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/3-540-63165-8_196","volume-title":"24th International Collocquium on Automata, Languages and Programming (ICALP)","author":"A. Ambainis","year":"1997","unstructured":"A. Ambainis. Upper Bound on the Communication Complexity of Private Information Retrieval. 24th International Collocquium on Automata, Languages and Programming (ICALP), LNCS 1256, Springer-Verlag, Berlin 1997, 401\u2013407"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"B. Chor, O. Goldreich, E. Kushilevitz, M. Sudan. Private Information Retrieval. 36th Annual Symposium on Foundations of Computer Sience (FOCS) 1995, IEEE Computer Society, 1995, 41\u201350","DOI":"10.1109\/SFCS.1995.492461"},{"key":"9_CR3","first-page":"304","volume-title":"29th Symposium on Theory of Computing (STOC) 1997","author":"B. Chor","year":"1997","unstructured":"B. Chor and N. Gilboa. Computationally Private Information Retrieval. 29th Symposium on Theory of Computing (STOC) 1997, ACM, New York 1997, 304\u2013313"},{"key":"9_CR4","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/SECPRI.1995.398920","volume-title":"1995 IEEE Symposium on Research in Security and Privacy","author":"D. A. Cooper","year":"1995","unstructured":"D. A. Cooper, K. P. Birman. Preserving Privacy in a Network of Mobile Computers. 1995 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos 1995, 26\u201338"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/BF01200848","volume":"1","author":"D. A. Cooper","year":"1995","unstructured":"D. A. Cooper, K. P. Birman. The design and implementation of a private message service for mobile computers. Wireless Networks 1, 1995, 297\u2013309","journal-title":"Wireless Networks"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s001450010008","volume":"14","author":"G. Crescenzo Di","year":"2001","unstructured":"G. Di Crescenzo, Y. Ishai, R. Ostrovsky. Universal Service-Providers for Private Information Retrieval. Journal of Cryptology 14, 2001, 37\u201374","journal-title":"Journal of Cryptology"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"O. Goldreich. Towards a theory of software protection and simulation by oblivious RAMs. In Proc. 19th Annual ACM Symp. Theory Comp., 1987","DOI":"10.1145\/28395.28416"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"O. Goldreich, R. Ostrovsky. Software protection and simulation by oblivious RAMs. JACM, 1996","DOI":"10.1145\/233551.233553"},{"key":"9_CR9","unstructured":"R. Ostrovsky. Software protection and simulation on oblivious RAMs. M. I. T. Ph. D. Thesis in Computer Sience, June 1992. Preliminary version in Proc. 22nd Annual ACM Symp. Theory Comp., 1990"},{"key":"9_CR10","first-page":"294","volume-title":"29th Symposium on Theory of Computing (STOC) 1997","author":"R. Ostrovsky","year":"1997","unstructured":"R. Ostrovsky, V. Shoup. Private Information Storage. 29th Symposium on Theory of Computing (STOC) 1997, ACM, New York 1997, 294\u2013303"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/0167-4048(87)90087-3","volume":"6\/2","author":"A. Pfitzmann","year":"1987","unstructured":"A. Pfitzmann, M. Waidner: Networks without user observability. Computers & Security 6\/2, 1987, 158\u2013166","journal-title":"Computers & Security"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T14:49:15Z","timestamp":1550328555000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_9","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}