{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:13:09Z","timestamp":1743048789841,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319123998"},{"type":"electronic","value":"9783319124001"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12400-1_23","type":"book-chapter","created":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T15:15:00Z","timestamp":1414509300000},"page":"239-252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["On the Feasibility of a Technological Response to the Surveillance Morass"],"prefix":"10.1007","author":[{"given":"Joan","family":"Feigenbaum","sequence":"first","affiliation":[]},{"given":"J\u00e9r\u00e9mie","family":"Koenig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,29]]},"reference":[{"key":"23_CR1","volume-title":"No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State","author":"G Greenwald","year":"2014","unstructured":"Greenwald, G.: No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books, New York (2014)"},{"issue":"5","key":"23_CR2","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/1941487.1941498","volume":"54","author":"A Goldfarb","year":"2011","unstructured":"Goldfarb, A., Tucker, C.E.: Online advertising, behavioral targeting, and privacy. Commun. ACM 54(5), 25\u201327 (2011)","journal-title":"Commun. ACM"},{"key":"23_CR3","unstructured":"Lichtblau, E., Schmidt, M.S.: Other Agencies Clamor for Data NSA Compiles. The New York Times, 23 Aug 2013"},{"key":"23_CR4","unstructured":"Gorman, S.: NSA Officers Spy on Love Interests. The Wall Street Journal, 23 August 2013"},{"key":"23_CR5","unstructured":"Gellman, B., Soltani, A.: NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say. The Washington Post, 30 Oct 2013"},{"key":"23_CR6","unstructured":"Clarke, R.A., Morell, M.J., Stone, G.R., Sunstein, C.R., Swire, P.: Liberty and Security in a Changing World, 12 Dec 2013. http:\/\/www.scribd.com\/doc\/192387819\/NSA-review-board-s-report"},{"key":"23_CR7","unstructured":"Soltani, A., Gellman, B.: New Documents Show How the NSA Infers Relationships Based on Mobile Location Data. The Washington Post, 10 Dec 2013"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-24676-3_1","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"MJ Freedman","year":"2004","unstructured":"Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1\u201319. Springer, Heidelberg (2004)"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/11535218_15","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"L Kissner","year":"2005","unstructured":"Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241\u2013257. Springer, Heidelberg (2005)"},{"issue":"4","key":"23_CR10","doi-asserted-by":"crossref","first-page":"593","DOI":"10.3233\/JCS-2005-13401","volume":"13","author":"J Vaidya","year":"2005","unstructured":"Vaidya, J., Clifton, C.: Secure set intersection cardinality with application to association rule mining. J. Comput. Secur. 13(4), 593\u2013622 (2005)","journal-title":"J. Comput. Secur."},{"key":"23_CR11","unstructured":"The Guardian: Project Bullrun - classification guide to the NSA\u2019s decryption program, 5 Sept 2013. http:\/\/www.theguardian.com\/world\/interactive\/2013\/sep\/05\/nsa-project-bullrun-classification-guide"},{"issue":"7","key":"23_CR12","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSPEC.2007.376605","volume":"44","author":"V Prevelakis","year":"2007","unstructured":"Prevelakis, V., Spinellis, D.: The athens affair. IEEE Spectrum. 44(7), 26\u201333 (2007)","journal-title":"IEEE Spectrum."},{"key":"23_CR13","unstructured":"Schneier, B.: When It Comes to Security, We\u2019re Back to Feudalism, 26 Nov 2012. https:\/\/www.schneier.com\/essay-406.html"},{"key":"23_CR14","volume-title":"Who Owns the Future?","author":"J Lanier","year":"2013","unstructured":"Lanier, J.: Who Owns the Future?. Simon and Schuster, New York (2013)"},{"key":"23_CR15","unstructured":"AOL, Apple, Dropbox, Facebook, Google, LinkedIn, Microsoft, Twitter, Yahoo!: Global Government Surveillance Reform (2013). http:\/\/reformgover-nmentsurveillance.com"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Gulbrandsen, A., Vixie, P., Esibov, L.: A DNS RR for specifying the location of services (DNS SRV). RFC 2782 (Proposed Standard), Feb 2000. http:\/\/www.ietf.org\/rfc\/rfc2782.txt. Updated in RFC 6335","DOI":"10.17487\/rfc2782"},{"key":"23_CR17","unstructured":"Vaughan-Nichols, S.J.: Freedom box: Freeing the Internet one Server at a time, 16 Feb 2011. http:\/\/www.zdnet.com\/blog\/networking\/freedom-box-freeing-the-internet-one-server-at-a-time\/698"},{"key":"23_CR18","unstructured":"Henderson, N.: Open Source Project arkOS Brings Simplicity to Self-Hosting, 12 Nov 2013. http:\/\/www.thewhir.com\/web-hosting-news\/open-source-project-arkos-brings-simplicity-to-self-hosting"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Madhavapeddy, A., Mortier, R., Rotsos, C., Scott, D., Singh, B., Gazagnaire, T., Smith, S., Hand, S., Crowcroft, J.: Unikernels: library operating systems for the cloud. In: 18th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 461\u2013472. ACM Press, New York (2013)","DOI":"10.1145\/2499368.2451167"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12400-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T23:56:10Z","timestamp":1674172570000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12400-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319123998","9783319124001"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12400-1_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"29 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}