{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:41:33Z","timestamp":1742924493042,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031813245"},{"type":"electronic","value":"9783031813252"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-81325-2_5","type":"book-chapter","created":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T15:08:34Z","timestamp":1740409714000},"page":"65-80","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Revolutionizing Data Privacy: The ENCRYPT Project\u2019s Innovations and Applications"],"prefix":"10.1007","author":[{"given":"Stelios","family":"Erotokritou","sequence":"first","affiliation":[]},{"given":"Ioannis","family":"Giannoulakis","sequence":"additional","affiliation":[]},{"given":"Emmanouil","family":"Kafetzakis","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Kaltakis","sequence":"additional","affiliation":[]},{"given":"Ettore","family":"Etenzi","sequence":"additional","affiliation":[]},{"given":"Sotiris","family":"Diamantopoulos","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Mazzeo","sequence":"additional","affiliation":[]},{"given":"Salvatore","family":"D\u2019Antonio","sequence":"additional","affiliation":[]},{"given":"Jean-Paul","family":"Bultel","sequence":"additional","affiliation":[]},{"given":"Athanasios","family":"Stratikopoulos","sequence":"additional","affiliation":[]},{"given":"Angelos","family":"Papoutsis","sequence":"additional","affiliation":[]},{"given":"James","family":"Lloyd","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Meditskos","sequence":"additional","affiliation":[]},{"given":"Vincenzo","family":"Napolitano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,25]]},"reference":[{"key":"5_CR1","unstructured":"Kairouz, P., et al.: Advances and open problems in federated learning. arXiv preprint arXiv:1912.04977 (2019)"},{"key":"5_CR2","first-page":"79","volume":"51","author":"A Acar","year":"2018","unstructured":"Acar, A., Aksu, H., Selcuk Uluagac, A., Conti, M.: A survey on homomorphic encryption schemes: theory and implementation. ACM Comput. Surv. 51, 79 (2018)","journal-title":"ACM Comput. Surv."},{"key":"5_CR3","unstructured":"ENCRYPT Homepage. https:\/\/encrypt-project.eu\/. Accessed 23 May 2024"},{"key":"5_CR4","first-page":"6","volume":"50","author":"P Martins","year":"2017","unstructured":"Martins, P., Sousa, L., Mariano, A.: A survey on fully homomorphic encryption: an engineering perspective. ACM Comput. Surv. 50, 6 (2017)","journal-title":"ACM Comput. Surv."},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Sabt, M., Achemlal, M., Bouabdallah, A.: Trusted execution environment: what it is, and what it is not. In: 2015 IEEE Trustcom\/BigDataSE\/ISPA, vol. 1, pp. 57\u201364. IEEE (2015)","DOI":"10.1109\/Trustcom.2015.357"},{"key":"5_CR6","doi-asserted-by":"publisher","unstructured":"Dwork, C.: Differential privacy. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 338\u2013340. Springer, Boston, MA (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_752","DOI":"10.1007\/978-1-4419-5906-5_752"},{"key":"5_CR7","doi-asserted-by":"publisher","unstructured":"D'Antonio, S., Lazarou, G., Mazzeo, G., Stan, O., Zuber, M., Tsavdaridis, I.: The alliance of HE and TEE to enhance their performance and security. In: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy, pp. 641\u2013647 (2023). https:\/\/doi.org\/10.1109\/CSR57506.2023.10224999","DOI":"10.1109\/CSR57506.2023.10224999"},{"issue":"2","key":"5_CR8","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1109\/TNNLS.2021.3070843","volume":"33","author":"S Ji","year":"2021","unstructured":"Ji, S., Pan, S., Cambria, E., Marttinen, P., Yu, P.S.: A survey on knowledge graphs: representation, acquisition, and applications. IEEE Trans. Neural Netw. Learn. Syst. 33(2), 494\u2013514 (2021)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"7","key":"5_CR9","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1016\/j.jmoneco.2009.09.003","volume":"56","author":"W Roberds","year":"2009","unstructured":"Roberds, W., Schreft, S.L.: Data breaches and identity theft. J. Monet. Econ. 56(7), 918\u2013929 (2009)","journal-title":"J. Monet. Econ."},{"issue":"1","key":"5_CR10","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1509\/jm.15.0497","volume":"81","author":"KD Martin","year":"2017","unstructured":"Martin, K.D., Borah, A., Palmatier, R.W.: Data privacy: effects on customer and firm performance. J. Mark. 81(1), 36\u201358 (2017)","journal-title":"J. Mark."},{"issue":"5","key":"5_CR11","doi-asserted-by":"publisher","first-page":"780","DOI":"10.1111\/jpim.12463","volume":"35","author":"Z Mani","year":"2018","unstructured":"Mani, Z., Chouk, I.: Consumer resistance to innovation in services: challenges and barriers in the Internet of Things era. J. Prod. Innov. Manag. 35(5), 780\u2013807 (2018)","journal-title":"J. Prod. Innov. Manag."},{"key":"5_CR12","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1016\/j.future.2019.03.042","volume":"98","author":"H Tao","year":"2019","unstructured":"Tao, H., et al.: Economic perspective analysis of protecting big data security and privacy. Future Gener. Comput. Syst. 98, 660\u2013671 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"5_CR13","unstructured":"Danezis, G., et al.: Privacy and data protection by design-from policy to engineering. arXiv preprint arXiv:1501.03726 (2015)"},{"key":"5_CR14","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). https:\/\/gdpr-info.eu\/"},{"key":"5_CR15","unstructured":"Article 29 Data Protection Working Party, Opinion 01\/2017 on the Proposed Regulation for the ePrivacy Regulation (2002\/58\/EC), WP 247, 4 April 2017"},{"key":"5_CR16","unstructured":"European Commission (EC). 2019. EGTAI: the ethics guidelines for trustworthy artificial intelligence. https:\/\/op.europa.eu\/en\/publication-detail\/-\/publication\/d3988569-0434-11ea-8c1f-01aa75ed71a1. Accessed 11 July 2024"},{"issue":"086","key":"5_CR17","first-page":"1","volume":"2016","author":"V Costan","year":"2016","unstructured":"Costan, V., Devadas, S.: Intel SGX explained. IACR Cryptology ePrint Archive 2016(086), 1\u2013118 (2016)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"5_CR18","unstructured":"Microsoft SEAL (release 4.0). https:\/\/github.com\/Microsoft\/SEAL, March 2022. Microsoft Research, Redmond, WA"},{"key":"5_CR19","unstructured":"Quickstart. 2023. Original-Date: 2017-07-18T20:41:16Z. https:\/\/openmined.github.io\/PySyft\/getting_started\/ index.html. Accessed 11 July 2024"},{"key":"5_CR20","unstructured":"github IBM-FHE Toolkit. https:\/\/github.com\/IBM\/fhe-toolkit-linux. Accessed 11 July 2024"},{"key":"5_CR21","unstructured":"Intel Corporation. Intel R Software Guard Extensions (Intel R SGX), June 2015. Reference no. 332680\u2013002"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Pedrouzo-Ulloa, A., Boudguiga, A., Chakraborty, O., Sirdey, R., Stan, O., Zuber, M.: Practical multi-key homomorphic encryption for efficient secure federated average aggregation. Poster Presentation at the 6th HomomorphicEncryption.org Standards Meeting, Seoul, South Korea (2023)","DOI":"10.1109\/CSR57506.2023.10224979"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Grivet-S\u00e9bert, A., Zuber, M., Stan, O., Sirdey, R., Gouy-Pailler, C.: A probabilistic design for practical homomorphic majority voting with intrinsic differential privacy. In: WAHC, pp. 47\u201358 (2023)","DOI":"10.1145\/3605759.3625258"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"M\u00e9n\u00e9trey, J., et al.: A comprehensive trusted runtime for WebAssembly with Intel SGX. IEEE Trans. Dependable Secure Comput. (2023)","DOI":"10.1109\/TDSC.2023.3334516"},{"key":"5_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103397","volume":"203","author":"L Coppolino","year":"2022","unstructured":"Coppolino, L., D\u2019Antonio, S., Mazzeo, G., Romano, L., Sgaglione, L.: PriSIEM: enabling privacypreserving managed security services. J. Netw. Comput. Appl. 203, 103397 (2022)","journal-title":"J. Netw. Comput. Appl."},{"key":"5_CR26","doi-asserted-by":"publisher","unstructured":"Siachos, I., Kaltakis, K., Papachristopoulou, K., Giannoulakis, I., Kafetzakis, E.: Comparison of machine learning algorithms trained under differential privacy for intrusion detection systems. In: IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy, pp. 654\u2013658 (2023). https:\/\/doi.org\/10.1109\/CSR57506.2023.10225010","DOI":"10.1109\/CSR57506.2023.10225010"},{"issue":"13","key":"5_CR27","doi-asserted-by":"publisher","first-page":"3869","DOI":"10.14778\/3565838.3565842","volume":"15","author":"M Xekalaki","year":"2022","unstructured":"Xekalaki, M., et al.: Enabling transparent acceleration of big data frameworks using heterogeneous hardware. Proc. VLDB Endow. 15(13), 3869\u20133882 (2022)","journal-title":"Proc. VLDB Endow."},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Serderidis, K., Konstantinidis, I., Meditskos, G., Peristeras, V., Bassiliades, N.: d2kg: An integrated ontology for knowledge graph-based representation of government decisions and acts. Semantic Web (Preprint), pp.1\u201323 (2024)","DOI":"10.3233\/SW-243535"},{"key":"5_CR29","unstructured":"Karalka, C., Meditskos, G., Bassiliades, N.: Towards semantic interpretation of structured data sources in privacy-preserving environments. In: KGCW@ ESWC (2023)"}],"container-title":["Lecture Notes in Business Information Processing","Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-81325-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T15:08:39Z","timestamp":1740409719000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-81325-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031813245","9783031813252"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-81325-2_5","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EMCIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European, Mediterranean, and Middle Eastern Conference on Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"emcis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/emcis.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}