{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:06:57Z","timestamp":1725574017875},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540408086"},{"type":"electronic","value":"9783540452294"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45229-4_22","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T05:58:04Z","timestamp":1294379884000},"page":"216-226","source":"Crossref","is-referenced-by-count":4,"title":["Profiting from Untrusted Parties in Web-Based Applications"],"prefix":"10.1007","author":[{"given":"Claus","family":"Boyens","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Fischmann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/3-540-36467-6_16","volume-title":"Privacy Enhancing Technologies","author":"D. Asonov","year":"2003","unstructured":"Asonov, D., Freytag, J.C.: Almost optimal private information retrieval. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 209\u2013223. Springer, Heidelberg (2003)"},{"key":"22_CR2","unstructured":"Beaver, D.: Commodity-based cryptography. In: Proceedings of the ACM STOC Conference, El Paso, USA (1997)"},{"key":"22_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/3-540-45710-0_2","volume-title":"Advances in Databases and Information Systems","author":"C. Boyens","year":"2002","unstructured":"Boyens, C., G\u00fcnther, O.: Trust is not enough: Privacy and security in ASP and web service environments. In: Manolopoulos, Y., N\u00e1vrat, P. (eds.) ADBIS 2002. LNCS, vol.\u00a02435, p. 8. Springer, Heidelberg (2002)"},{"key":"22_CR4","unstructured":"Boyens, C., G\u00fcnther, O.: Using online services in untrusted environments - a privacy-preserving architecture. In: Proceedings of the European Conference on Information Systems (ECIS), Naples, Italy (2003) (to appear)"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/3-540-39118-5_12","volume-title":"Advances in Cryptology - EUROCRYPT \u201987","author":"E. Brickell","year":"1988","unstructured":"Brickell, E., Yacobi, Y.: On privacy homomorphisms. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol.\u00a0304, pp. 117\u2013125. Springer, Heidelberg (1988)"},{"key":"22_CR6","first-page":"41","volume-title":"Proceedings of the 36th IEEE Conference on Foundations of Computer Science","author":"B. Chor","year":"1995","unstructured":"Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of the 36th IEEE Conference on Foundations of Computer Science, pp. 41\u201350. IEEE Press, New York (1995)"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Chowdhury, S.D., Duncan, G., Krishnan, R., Roehrig, S., Mukherjee, S.: Disclosure detection in multivariate categorical databases: auditing confidentiality protection through two new matrix operators. Management Science 45(12) (December 1999)","DOI":"10.1287\/mnsc.45.12.1710"},{"key":"22_CR8","unstructured":"Domingo-Ferrer, J., Herrera-Joancomarti, J.: A privacy homomorphism allowing field operations on encrypted data. Jornades de Matematica Discreta i Algorismica, Barcelona (1999)"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Feigenbaum, J., Freedman, M., Sander, T., Shostack, A.: Privacy engineering for digital rights management systems. In: Digital Rights Management Workshop, pp. 76\u2013105 (2001)","DOI":"10.1007\/3-540-47870-1_6"},{"key":"22_CR10","unstructured":"Goldreich, O.: Secure multi-party computation. Working Draft (1998)"},{"key":"22_CR11","volume-title":"Foundations of Secure Computation","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation. Academic Press, New York (1978)"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM\u00a021(2) (1978)","DOI":"10.1145\/359340.359342"},{"key":"22_CR13","first-page":"831","volume":"31","author":"S.W. Smith","year":"1999","unstructured":"Smith, S.W., Weingart, S.H.: Building a high-performance, programmable secure coprocessor. Computer Networks, Special Issue on Computer Network Security\u00a031, 831\u2013860 (1999)","journal-title":"Computer Networks, Special Issue on Computer Network Security"},{"key":"22_CR14","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W. Stallings","year":"1999","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice-Hall, Englewood Cliffs (1999)"},{"key":"22_CR15","unstructured":"Sweeney, L.: Computational Disclosure Control: A Primer on Data Privacy Protection. PhD thesis, Massachusetts Institute of Technology (2001)"},{"key":"22_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-0121-9","volume-title":"Elements of Statistical Disclosure Control","author":"L. Willenborg","year":"2001","unstructured":"Willenborg, L., de Waal, T.: Elements of Statistical Disclosure Control. Addison-Wesley, Reading (2001)"}],"container-title":["Lecture Notes in Computer Science","E-Commerce and Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45229-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T17:11:52Z","timestamp":1559927512000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45229-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540408086","9783540452294"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45229-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}