{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T20:10:06Z","timestamp":1744229406633,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642335358"},{"type":"electronic","value":"9783642335365"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33536-5_19","type":"book-chapter","created":{"date-parts":[[2012,9,30]],"date-time":"2012-09-30T11:52:35Z","timestamp":1349005955000},"page":"187-201","source":"Crossref","is-referenced-by-count":3,"title":["Oblivious Assignment with m Slots"],"prefix":"10.1007","author":[{"given":"Giuseppe","family":"Ateniese","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Baldoni","sequence":"additional","affiliation":[]},{"given":"Silvia","family":"Bonomi","sequence":"additional","affiliation":[]},{"given":"Giuseppe Antonio","family":"Di Luna","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Baldoni, R., Bonomi, S., Di Luna, G.A.: Oblivious Assignment with m Slots. Technical report, MIDLAB 2\/12 - University of Rome \u201cLa Sapienza\u201d (2012), http:\/\/www.dis.uniroma1.it\/~midlab\/publications.php","DOI":"10.1007\/978-3-642-33536-5_19"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/1102120.1102134","volume-title":"Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005","author":"G. Ateniese","year":"2005","unstructured":"Ateniese, G., Camenisch, J., de Medeiros, B.: Untraceable rfid tags via insubvertible encryption. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, pp. 92\u2013101. ACM, New York (2005)"},{"key":"19_CR3","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1145\/79147.79158","volume":"37","author":"H. Attiya","year":"1990","unstructured":"Attiya, H., Bar-Noy, A., Dolev, D., Peleg, D., Reischuk, R.: Renaming in an asynchronous environment. Journal of the ACM\u00a037, 524\u2013548 (1990)","journal-title":"Journal of the ACM"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Attiya, H., Welch, J.: Distributed Computing: Fundamentals, Simulations and Advanced Topics, 2nd edn. John Wiley Interscience (March 2004)","DOI":"10.1002\/0471478210"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Baldoni, R., Virgillito, A., Petrassi, R.: A distributed mutual exclusion algorithm for mobile ad-hoc networks. In: IEEE Symposium on Computers and Communications, p. 539 (2002)","DOI":"10.1109\/ISCC.2002.1021727"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-540-40974-8_29","volume-title":"Cryptography and Coding","author":"A. Barnett","year":"2003","unstructured":"Barnett, A., Smart, N.P.: Mental Poker Revisited. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol.\u00a02898, pp. 370\u2013383. Springer, Heidelberg (2003)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/BFb0054851","volume-title":"Algorithmic Number Theory","author":"D. Boneh","year":"1998","unstructured":"Boneh, D.: The Decision Diffie-Hellman Problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol.\u00a01423, pp. 48\u201363. Springer, Heidelberg (1998)"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Bulgannawar, S., Vaidya, N.H.: A distributed k-mutual exclusion algorithm. In: International Conference on Distributed Computer Systems, pp. 153\u2013160 (1995)","DOI":"10.1109\/ICDCS.1995.500014"},{"key":"19_CR9","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1145\/72981.72991","volume-title":"Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing, Priciple of Distributed Computing 1989","author":"J.E. Burns","year":"1989","unstructured":"Burns, J.E., Peterson, G.L.: The ambiguity of choosing. In: Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing, Priciple of Distributed Computing 1989, pp. 145\u2013157. ACM, New York (1989)"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology","author":"T. Gamal El","year":"1985","unstructured":"El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 10\u201318. Springer, Heidelberg (1985)"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pp. 169\u2013178. ACM (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"19_CR12","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography: vol. 2, Basic Applications","author":"O. Goldreich","year":"2004","unstructured":"Goldreich, O.: Foundations of Cryptography: vol. 2, Basic Applications. Cambridge University Press, New York (2004)"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal re-encryption for mixnets. In: Proceedings of the 2004 RSA Conference, pp. 163\u2013178. Springer (2002)","DOI":"10.1007\/978-3-540-24660-2_14"},{"issue":"4","key":"19_CR14","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/0020-0190(94)90014-0","volume":"49","author":"H. Kakugawa","year":"1994","unstructured":"Kakugawa, H., Fujita, S., Yamashita, M., Ae, T.: A distributed k-mutual exclusion algorithm using k-coterie. Information Processing Letters\u00a049(4), 213\u2013218 (1994)","journal-title":"Information Processing Letters"},{"key":"19_CR15","unstructured":"Le Lann, G.: Distributed systems - towards a formal approach. In: Congress of International Federation for Information Processing, pp. 155\u2013160 (1977)"},{"issue":"2","key":"19_CR16","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1145\/214438.214445","volume":"3","author":"M. Maekawa","year":"1985","unstructured":"Maekawa, M.: A square root n algorithm for mutual exclusion in decentralized systems. ACM Transaction on Computer System\u00a03(2), 145\u2013159 (1985)","journal-title":"ACM Transaction on Computer System"},{"issue":"4","key":"19_CR17","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/0020-0190(89)90211-1","volume":"30","author":"K. Raymond","year":"1989","unstructured":"Raymond, K.: A distributed algorithm for multiple entries to a critical section. Information Processing Letters\u00a030(4), 189\u2013193 (1989)","journal-title":"Information Processing Letters"},{"key":"19_CR18","volume-title":"Algorithms for mutual exclusion","author":"M. Raynal","year":"1986","unstructured":"Raynal, M.: Algorithms for mutual exclusion. MIT Press, Cambridge (1986)"},{"issue":"1","key":"19_CR19","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/358527.358537","volume":"24","author":"G. Ricart","year":"1981","unstructured":"Ricart, G., Agrawala, A.K.: An optimal algorithm for mutual exclusion in computer networks. Communincations of the ACM\u00a024(1), 9\u201317 (1981)","journal-title":"Communincations of the ACM"},{"key":"19_CR20","unstructured":"Shamir, A., Rivest, R.L., Adleman, L.M.: Mental Poker. Technical Report MIT-LCS-TM-125, Massachusetts Institute of Technology (1979)"},{"issue":"4","key":"19_CR21","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1145\/6110.214406","volume":"3","author":"I. Suzuki","year":"1985","unstructured":"Suzuki, I., Kasami, T.: A distributed mutual exclusion algorithm. ACM Transaction on Computer System\u00a03(4), 344\u2013349 (1985)","journal-title":"ACM Transaction on Computer System"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: 23st Annual IEEE Symposium on Foundations of Computer Science, pp. 160\u2013164. IEEE Computer Society Press (1982)","DOI":"10.1109\/SFCS.1982.38"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33536-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T19:31:45Z","timestamp":1744227105000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33536-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642335358","9783642335365"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33536-5_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}