{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:44:07Z","timestamp":1725727447543},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642386305"},{"type":"electronic","value":"9783642386312"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38631-2_21","type":"book-chapter","created":{"date-parts":[[2013,5,27]],"date-time":"2013-05-27T04:37:49Z","timestamp":1369629469000},"page":"278-292","source":"Crossref","is-referenced-by-count":7,"title":["Efficient and Private Three-Party Publish\/Subscribe"],"prefix":"10.1007","author":[{"given":"Giovanni","family":"Di Crescenzo","sequence":"first","affiliation":[]},{"given":"Jim","family":"Burns","sequence":"additional","affiliation":[]},{"given":"Brian","family":"Coan","sequence":"additional","affiliation":[]},{"given":"John","family":"Schultz","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Stanton","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Tsang","sequence":"additional","affiliation":[]},{"given":"Rebecca N.","family":"Wright","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"21_CR1","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1145\/857076.857078","volume":"35","author":"P.T. Eugster","year":"2003","unstructured":"Eugster, P.T., Felber, P., Guerraoui, R., Kermarrec, A.M.: The many faces of publish\/subscribe. ACM Comput. Surv.\u00a035(2), 114\u2013131 (2003)","journal-title":"ACM Comput. Surv."},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Yao, A.C.C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162\u2013167 (1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Impagliazzo, R., Rudich, S.: Limits on the provable consequences of one-way permutations. In: STOC, pp. 44\u201361 (1989)","DOI":"10.1145\/73007.73012"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218\u2013229 (1987)","DOI":"10.1145\/28395.28420"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority (extended abstract). In: STOC, pp. 73\u201385 (1989)","DOI":"10.1145\/73007.73014"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Feige, U., Kilian, J., Naor, M.: A minimal model for secure computation (extended abstract). In: STOC, pp. 554\u2013563 (1994)","DOI":"10.1145\/195058.195408"},{"issue":"4","key":"21_CR7","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM\u00a033(4), 792\u2013807 (1986)","journal-title":"J. ACM"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Raiciu, C., Rosenblum, D.S.: Enabling confidentiality in content-based publish\/subscribe infrastructures. In: SecureComm, pp. 1\u201311 (2006)","DOI":"10.1109\/SECCOMW.2006.359552"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Minami, K., Lee, A.J., Winslett, M., Borisov, N.: Secure aggregation in a publish-subscribe system. In: WPES, pp. 95\u2013104 (2008)","DOI":"10.1145\/1456403.1456419"},{"key":"21_CR10","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-01244-0_24","volume-title":"Emerging Challenges for Security, Privacy and Trust","author":"A. Shikfa","year":"2009","unstructured":"Shikfa, A., \u00d6nen, M., Molva, R.: Privacy-preserving content-based publish\/subscribe networks. In: Gritzalis, D., Lopez, J. (eds.) SEC 2009. IFIP AICT, vol.\u00a0297, pp. 270\u2013282. Springer, Heidelberg (2009)"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Tariq, M.A., Koldehofe, B., Altaweel, A., Rothermel, K.: Providing basic security mechanisms in broker-less publish\/subscribe systems. In: DEBS, pp. 38\u201349 (2010)","DOI":"10.1145\/1827418.1827425"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/978-3-642-15364-8_32","volume-title":"Database and Expert Systems Applications","author":"S. Choi","year":"2010","unstructured":"Choi, S., Ghinita, G., Bertino, E.: A privacy-enhancing content-based publish\/subscribe system using scalar product preserving transformations. In: Bringas, P.G., Hameurlain, A., Quirchmayr, G. (eds.) DEXA 2010, Part I. LNCS, vol.\u00a06261, pp. 368\u2013384. Springer, Heidelberg (2010)"},{"key":"21_CR13","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-642-16161-2_16","volume-title":"Security and Privacy in Communication Networks","author":"M. Ion","year":"2010","unstructured":"Ion, M., Russello, G., Crispo, B.: Supporting publication and subscription confidentiality in pub\/sub networks. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol.\u00a050, pp. 272\u2013289. Springer, Heidelberg (2010)"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1007\/978-3-642-35170-9_24","volume-title":"Middleware 2012","author":"P. Pal","year":"2012","unstructured":"Pal, P., Lauer, G., Khoury, J., Hoff, N., Loyall, J.: P3S: A privacy preserving publish-subscribe middleware. In: Narasimhan, P., Triantafillou, P. (eds.) Middleware 2012. LNCS, vol.\u00a07662, pp. 476\u2013495. Springer, Heidelberg (2012)"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136\u2013145 (2001)","DOI":"10.1109\/SFCS.2001.959888"},{"key":"21_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/3-540-48910-X_6","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"G. Crescenzo Di","year":"1999","unstructured":"Di Crescenzo, G., Ostrovsky, R., Rajagopalan, S.: Conditional oblivious transfer and timed-release encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 74\u201389. Springer, Heidelberg (1999)"},{"issue":"2","key":"21_CR17","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci.\u00a028(2), 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/10718964_37","volume-title":"Information Security and Privacy","author":"E. Brickell","year":"2000","unstructured":"Brickell, E., Di Crescenzo, G., Frankel, Y.: Sharing block ciphers. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol.\u00a01841, pp. 457\u2013470. Springer, Heidelberg (2000)"},{"issue":"6","key":"21_CR19","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38631-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T07:12:20Z","timestamp":1557731540000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38631-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642386305","9783642386312"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38631-2_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}