{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:49:33Z","timestamp":1743050973910,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545672"},{"type":"electronic","value":"9783642545689"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54568-9_8","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:35Z","timestamp":1395325895000},"page":"114-132","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Privacy-Preserving Publish\/Subscribe: Efficient Protocols in a Distributed Model"],"prefix":"10.1007","author":[{"given":"Giovanni","family":"Di Crescenzo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Brian","family":"Coan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John","family":"Schultz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Simon","family":"Tsang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rebecca N.","family":"Wright","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"issue":"2","key":"8_CR1","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1145\/857076.857078","volume":"35","author":"PTh Eugster","year":"2003","unstructured":"Eugster, PTh, Felber, P., Guerraoui, R., Kermarrec, A.-M.: The many faces of publish\/subscribe. ACM Comput. Surv. 35(2), 114\u2013131 (2003)","journal-title":"ACM Comput. Surv."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Impagliazzo, R., Rudich, S.: Limits on the provable consequences of one-way permutations. In: Proceedings of the ACM STOC, pp. 44\u201361 (1989)","DOI":"10.1145\/73007.73012"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Yao, A.C.-C.: Protocols for secure computations. In: Proceedings of the IEEE FOCS 1982, pp. 160\u2013164 (1982)","DOI":"10.1109\/SFCS.1982.38"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: Proceedings of the ACM STOC, pp. 218\u2013229 (1987)","DOI":"10.1145\/28395.28420"},{"key":"8_CR5","series-title":"LNCS","first-page":"74","volume-title":"EUROCRYPT 1999","author":"G Di Crescenzo","year":"1999","unstructured":"Di Crescenzo, G., Ostrovsky, R., Rajagopalan, S.: Conditional oblivious transfer and timed-release encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 74\u201389. Springer, Heidelberg (1999)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Raiciu, C., Rosenblum, D.S.: Enabling confidentiality in content-based publish\/subscribe infrastructures. In: Proceedings of the SecureComm 2006, pp. 1\u201311 (2006)","DOI":"10.1109\/SECCOMW.2006.359552"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Minami, K., Lee, A.J., Winslett, M., Borisov, N.: Secure aggregation in a publish\/subscribe system. In: Proceedings of the WPES 2008, pp. 95\u2013104 (2008)","DOI":"10.1145\/1456403.1456419"},{"key":"8_CR8","series-title":"IFIP AICT","first-page":"270","volume-title":"SEC 2009","author":"A Shikfa","year":"2009","unstructured":"Shikfa, A., Onen, M., Molva, R.: Privacy-preserving content-based publish\/subscribe networks. In: Gritzalis, D., Lopez, J. (eds.) SEC 2009. IFIP AICT, vol. 297, pp. 270\u2013282. Springer, Heidelberg (2009)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Tariq, M.A., Koldehofe, B., Altaweel, A., Rothermel, K.: Providing basic security mechanisms in broker-less publish\/subscribe systems. In: Proceedings of the ACM DEBS, pp. 38\u201349 (2010)","DOI":"10.1145\/1827418.1827425"},{"key":"8_CR10","series-title":"LNICST","first-page":"272","volume-title":"SecureComm 2010","author":"M Ion","year":"2010","unstructured":"Ion, M., Russello, G., Crispo, B.: Supporting publication and subscription confidentiality in pub\/sub networks. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 272\u2013289. Springer, Heidelberg (2010)"},{"key":"8_CR11","series-title":"LNCS","first-page":"368","volume-title":"DEXA 2010, Part I","author":"S Choi","year":"2010","unstructured":"Choi, S., Ghinita, G., Bertino, E.: A privacy-enhancing content-based publish\/subscribe system using scalar product preserving transformations. In: Bringas, P.G., Hameurlain, A., Quirchmayr, G. (eds.) DEXA 2010, Part I. LNCS, vol. 6261, pp. 368\u2013384. Springer, Heidelberg (2010)"},{"key":"8_CR12","first-page":"278","volume-title":"NSS 2013 LNCS","author":"G Di Crescenzo","year":"2013","unstructured":"Di Crescenzo, G., Burns, J., Coan, B., Schultz, J., Stanton, J., Tsang, S., Wright, R.N.: Efficient and private three-party publish\/subscribe. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013 LNCS, vol. 7873, pp. 278\u2013292. Springer, Heidelberg (2013)"},{"key":"8_CR13","series-title":"LNCS","first-page":"97","volume-title":"CRYPTO 1995","author":"D Beaver","year":"1995","unstructured":"Beaver, D.: Precomputing oblivious transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97\u2013109. Springer, Heidelberg (1995)"},{"key":"8_CR14","series-title":"LNCS","first-page":"72","volume-title":"FC 2000","author":"G Di Crescenzo","year":"2001","unstructured":"Di Crescenzo, G.: Private selective payment protocols. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 72\u201389. Springer, Heidelberg (2001)"},{"key":"8_CR15","series-title":"LNCS","first-page":"259","volume-title":"FC 2001","author":"G Di Crescenzo","year":"2002","unstructured":"Di Crescenzo, G.: Privacy for the stock market. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, pp. 259\u2013278. Springer, Heidelberg (2002)"},{"key":"8_CR16","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/3-540-44987-6_8","volume-title":"EUROCRYPT 2001","author":"W Aiello","year":"2001","unstructured":"Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: how to sell digital goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 119\u2013135. Springer, Heidelberg (2001)"},{"key":"8_CR17","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-540-40061-5_27","volume-title":"ASIACRYPT 2003","author":"H Lipmaa","year":"2003","unstructured":"Lipmaa, H.: Verifiable homomorphic oblivious transfer and private equality test. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 416\u2013433. Springer, Heidelberg (2003)"},{"key":"8_CR18","unstructured":"Michael, O.: Rabin: How to exchange secrets with oblivious transfer. Technical report\u00a0 TR-81, Aiken Computation Lab, Harvard University (1981)"},{"key":"8_CR19","unstructured":"Moni, N., Pinkas, B.: Efficient oblivious transfer protocols. In: Proceedings of the SODA 2001, pp. 448\u2013457 (2001)"},{"issue":"6","key":"8_CR20","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"8_CR21","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T El Gamal","year":"1985","unstructured":"El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54568-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T22:15:42Z","timestamp":1675808142000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54568-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545672","9783642545689"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54568-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}