{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:49:02Z","timestamp":1725796142884},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662439357"},{"type":"electronic","value":"9783662439364"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43936-4_24","type":"book-chapter","created":{"date-parts":[[2014,6,27]],"date-time":"2014-06-27T12:05:04Z","timestamp":1403870704000},"page":"364-372","source":"Crossref","is-referenced-by-count":2,"title":["On Minimizing the Size of Encrypted Databases"],"prefix":"10.1007","author":[{"given":"Giovanni","family":"Di Crescenzo","sequence":"first","affiliation":[]},{"given":"David","family":"Shallcross","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","first-page":"340","volume-title":"DBSec 2014","author":"G. Crescenzo Di","year":"2014","unstructured":"Di Crescenzo, G., Cook, D., McIntosh, A., Panagos, E.: Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database. In: Atluri, V., Pernul, G. (eds.) DBSec 2014. LNCS, vol.\u00a08566, pp. 340\u2013356. Springer, Heidelberg (2014)"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Di Crescenzo, G., Feigenbaum, J., Gupta, D., Panagos, E., Perry, J., Wright, R.: Practical and Privacy-Preserving Policy Compliance for Outsourced Data. In: Proc. of 2nd WAHC Workshop (2014)","DOI":"10.1007\/978-3-662-44774-1_15"},{"key":"24_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1287\/opre.30.1.29","volume":"30","author":"R.E. Erickson","year":"1982","unstructured":"Erickson, R.E., Halfin, S., Luss, H.: Optimal Sizing of Records when Divided Messages Can Be Stored in Records of Different Sizes. Operations Research\u00a030, 29\u201339 (1982)","journal-title":"Operations Research"},{"key":"24_CR4","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1287\/mnsc.26.8.796","volume":"26","author":"R.E. Erickson","year":"1980","unstructured":"Erickson, R.E., Luss, H.: Optimal Sizing of records Used to Store Messages of Various Lengths. Management Science\u00a026, 796\u2013809 (1980)","journal-title":"Management Science"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority. In: Proc. of ACM STOC 1987, pp. 218\u2013229 (1987)","DOI":"10.1145\/28395.28420"},{"issue":"2","key":"24_CR6","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic Encryption. J. Comput. Syst. Sci.\u00a028(2), 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fcs, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. of SIGMOD Conference 2002, pp. 216\u2013227 (2002)","DOI":"10.1145\/564716.564717"},{"key":"24_CR8","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1057\/jors.1983.241","volume":"34","author":"H. Luss","year":"1983","unstructured":"Luss, H.: An Extended Model for the Optimal Sizing of Records. Journal of Operation Research Society\u00a034, 1099\u20131105 (1983)","journal-title":"Journal of Operation Research Society"},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/TSE.1981.230819","volume":"SE-7","author":"P. Sipala","year":"1981","unstructured":"Sipala, P.: Optimum Cell Size for the Storage of Messages. IEEE Transactions on Software Engineering\u00a0SE-7, 132\u2013134 (1981)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"24_CR10","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/321250.321255","volume":"12","author":"E. Wolman","year":"1965","unstructured":"Wolman, E.: A Fixed Optimum Cell-Size for Records of Various Lengths. Journal of the ACM\u00a012, 53\u201370 (1965)","journal-title":"Journal of the ACM"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: How to Generate and Exchange Secrets. In: Proc. of IEEE FOCS 1986, pp. 162\u2013167 (1986)","DOI":"10.1109\/SFCS.1986.25"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXVIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43936-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T04:41:37Z","timestamp":1558932097000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43936-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662439357","9783662439364"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43936-4_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}