{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:36:19Z","timestamp":1742384179871},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642012433"},{"type":"electronic","value":"9783642012440"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01244-0_24","type":"book-chapter","created":{"date-parts":[[2009,5,23]],"date-time":"2009-05-23T04:53:02Z","timestamp":1243054382000},"page":"270-282","source":"Crossref","is-referenced-by-count":23,"title":["Privacy-Preserving Content-Based Publish\/Subscribe Networks"],"prefix":"10.1007","author":[{"given":"Abdullatif","family":"Shikfa","sequence":"first","affiliation":[]},{"given":"Melek","family":"\u00d6nen","sequence":"additional","affiliation":[]},{"given":"Refik","family":"Molva","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Agrawal, R., Evfimievski, A.V., Srikant, R.: Information sharing across private databases. In: SIGMOD Conference, pp. 86\u201397 (2003)","key":"24_CR1","DOI":"10.1145\/872757.872771"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/3-540-45539-6_18","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multiuser setting: Security proofs and improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 259\u2013274. Springer, Heidelberg (2000)"},{"issue":"12","key":"24_CR3","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/163298.163303","volume":"36","author":"K.P. Birman","year":"1993","unstructured":"Birman, K.P.: The process group approach to reliable distributed computing. Commun. ACM\u00a036(12), 37\u201353 (1993)","journal-title":"Commun. ACM"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 506\u2013522. Springer, Heidelberg (2004)"},{"issue":"3","key":"24_CR5","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1145\/380749.380767","volume":"19","author":"A. Carzaniga","year":"2001","unstructured":"Carzaniga, A., Rosenblum, D.S., Wolf, A.L.: Design and evaluation of a wide-area event notification service. ACM Trans. Comput. Syst.\u00a019(3), 332\u2013383 (2001)","journal-title":"ACM Trans. Comput. Syst."},{"key":"24_CR6","first-page":"327","volume-title":"ARES","author":"L. Chmielewski","year":"2008","unstructured":"Chmielewski, L., Hoepman, J.-H.: Fuzzy private matching (extended abstract). In: ARES, pp. 327\u2013334. IEEE Computer Society, Los Alamitos (2008)"},{"key":"24_CR7","volume-title":"IPDPS 2003: Proceedings of the 17th International Symposium on Parallel and Distributed Processing","author":"A.K. Datta","year":"2003","unstructured":"Datta, A.K., Gradinariu, M., Raynal, M., Simon, G.: Anonymous publish\/subscribe in p2p networks. In: IPDPS 2003: Proceedings of the 17th International Symposium on Parallel and Distributed Processing, Washington, DC, USA. IEEE Computer Society, Los Alamitos (2003)"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-24676-3_1","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M.J. Freedman","year":"2004","unstructured":"Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 1\u201319. Springer, Heidelberg (2004)"},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-61996-8_37","volume-title":"Information Hiding","author":"D.M. Goldschlag","year":"1996","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Information Hiding, pp. 137\u2013150. Springer, Heidelberg (1996)"},{"unstructured":"Li, Y., Tygar, J., Hellerstein, J.M.: Private matching. IRB-TR-04-005 (February 2004)","key":"24_CR10"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-540-69830-2_8","volume-title":"Wireless Sensor Networks","author":"M. \u00d6nen","year":"2007","unstructured":"\u00d6nen, M., Molva, R.: Secure data aggregation with multiple encryption. In: Langendoen, K.G., Voigt, T. (eds.) EWSN 2007. LNCS, vol.\u00a04373, pp. 117\u2013132. Springer, Heidelberg (2007)"},{"unstructured":"Opyrchal, L., Prakash, A.: Secure distribution of events in content-based publish subscribe systems. In: SSYM 2001: Proceedings of the 10th conference on USENIX Security Symposium, Berkeley, CA, USA, pp. 21\u201321. USENIX Association (2001)","key":"24_CR12"},{"doi-asserted-by":"crossref","unstructured":"Opyrchal, L., Prakash, A., Agrawal, A.: Supporting privacy policies in a publish-subscribe substrate for pervasive environments. JNW, 17\u201326 (2007)","key":"24_CR13","DOI":"10.4304\/jnw.2.1.17-26"},{"doi-asserted-by":"crossref","unstructured":"Pannetrat, A., Molva, R.: Multiple layer encryption for multicast groups. In: The proceedings of CMS 2002, Portoroz, Slovenia (September 2002)","key":"24_CR14","DOI":"10.1007\/978-0-387-35612-9_11"},{"issue":"1","key":"24_CR15","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S. Pohlig","year":"1978","unstructured":"Pohlig, S., Hellman, M.: An improved algorithm for computing logarithms over gf(p) and its cryptographic significance. IEEE Transactions on Information Theory\u00a024(1), 106\u2013110 (1978)","journal-title":"IEEE Transactions on Information Theory"},{"unstructured":"Raiciu, C., Rosenblum, D.S.: Enabling confidentiality in content-based publish\/subscribe infrastructures. In: Securecomm and Workshops, 2006, 28 2006-September 1 2006, pp. 1\u201311 (2006)","key":"24_CR16"},{"key":"24_CR17","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021, 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 44\u201355 (2000)","key":"24_CR18"},{"key":"24_CR19","first-page":"22","volume-title":"ICDCS 2007: Proceedings of the 27th International Conference on Distributed Computing Systems","author":"M. Srivatsa","year":"2007","unstructured":"Srivatsa, M., Liu, L.: Secure event dissemination in publish-subscribe networks. In: ICDCS 2007: Proceedings of the 27th International Conference on Distributed Computing Systems, Washington, DC, USA, p. 22. IEEE Computer Society, Los Alamitos (2007)"},{"key":"24_CR20","volume-title":"Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS 2002)","author":"C. Wang","year":"2002","unstructured":"Wang, C., Carzaniga, A., Evans, D., Wolf, A.: Security issues and requirements for internet-scale publish-subscribe systems. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS 2002). IEEE Computer Society, Los Alamitos (2002)"}],"container-title":["IFIP Advances in Information and Communication Technology","Emerging Challenges for Security, Privacy and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01244-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,8]],"date-time":"2019-03-08T03:47:31Z","timestamp":1552016851000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01244-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642012433","9783642012440"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01244-0_24","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}