{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:15:20Z","timestamp":1761621320273},"publisher-location":"Cham","reference-count":52,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319576381"},{"type":"electronic","value":"9783319576398"}],"license":[{"start":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T00:00:00Z","timestamp":1496188800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-57639-8_4","type":"book-chapter","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T09:34:07Z","timestamp":1496136847000},"page":"51-69","source":"Crossref","is-referenced-by-count":11,"title":["The Present and Future of Privacy-Preserving Computation in Fog Computing"],"prefix":"10.1007","author":[{"given":"Patr\u00edcia R.","family":"Sousa","sequence":"first","affiliation":[]},{"given":"Lu\u00eds","family":"Antunes","sequence":"additional","affiliation":[]},{"given":"Rolando","family":"Martins","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"4_CR1","volume-title":"Quantitative analysis of the full bitcoin transaction graph, in International Conference on Financial Cryptography and Data Security","author":"D. Ron","year":"2013","unstructured":"D. Ron, A. Shamir, Quantitative analysis of the full bitcoin transaction graph, in International Conference on Financial Cryptography and Data Security (Springer, Berlin, 2013)"},{"key":"4_CR2","volume-title":"Blockchain: Blueprint for a New Economy","author":"M. Swan","year":"2015","unstructured":"M. Swan, Blockchain: Blueprint for a New Economy (O\u2019Reilly Media, Sebastopol, 2015)"},{"key":"4_CR3","unstructured":"A. Dorri, S.S. Kanhere, R. Jurdak, Blockchain in internet of things: challenges and solutions (2016). arXiv preprint arXiv:1608.05187"},{"key":"4_CR4","unstructured":"G. Zyskind, O. Nathan, A. Pentland, Enigma: decentralized computation platform with guaranteed privacy (2015). arXiv preprint arXiv:1506.03471"},{"key":"4_CR5","unstructured":"What is IOTA? https:\/\/iota.readme.io\/v1.1.0\/docs . Cited 23 January 2017"},{"key":"4_CR6","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MC.2015.207","volume":"48","author":"J.S. Preden","year":"2015","unstructured":"J.S. Preden et al., The benefits of self-awareness and attention in fog and mist computing. IEEE Comput. Mag. 48, 37\u201345 (2015)","journal-title":"IEEE Comput. Mag."},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"M. Atzori, Blockchain-based architectures for the internet of things: a survey. Browser Download This Paper (2016)","DOI":"10.2139\/ssrn.2846810"},{"key":"4_CR8","unstructured":"IOTA: Economy of Internet-of-Things (2016). https:\/\/medium.com\/@DavidSonstebo\/iota-97592581f985#.rhosuii7l. Cited 10 November 2016"},{"key":"4_CR9","unstructured":"IOTA (2016). http:\/\/www.iotatoken.com\/ . Cited 10 November 2016"},{"key":"4_CR10","unstructured":"Ethereum - Homestead Release Blockchain App Platform (2013). https:\/\/www.ethereum.org\/ . Cited 11 November 2016"},{"key":"4_CR11","unstructured":"IOTA: Internet of Things Without the Blockchain? (2016) http:\/\/bitcoinist.net\/iota-internet-things-without-blockchain\/ . Cited 10 November 2016"},{"key":"4_CR12","unstructured":"P. Veena et\u00a0al., Empowering the edge-practical insights on a decentralized internet of things. IBM Institute for Business Value 17 (2015)"},{"key":"4_CR13","unstructured":"Autonomous Decentralized Peer-to-Peer Telemetry (2015). http:\/\/wiki.p2pfoundation.net\/Autonomous_Decentralized_Peer-to-Peer_Telemetry . Cited 11 November 2016"},{"key":"4_CR14","unstructured":"M. Signorini, Towards an internet of trust: issues and solutions for identification and authentication in the internet of things. Ph.D Thesis, Universitat Pompeu Fabra (2015)"},{"key":"4_CR15","unstructured":"S. Nakamoto, Bitcoin: a peer-to-peer electronic cash system (2008). https:\/\/bitcoin.org\/en\/ . Cited 18 April 2017"},{"key":"4_CR16","unstructured":"S. King, S. Nadal, Ppcoin: peer-to-peer crypto-currency with proof-of-stake. Self-published paper (2012)"},{"key":"4_CR17","unstructured":"TeleHash - Encrypted Mesh Protocol (2014). http:\/\/telehash.org\/ . Cited 11 November 2016"},{"key":"4_CR18","unstructured":"IBM & Samsung live demo of ADEPT \u2014 TheProtocol.TV (2015). https:\/\/www.youtube.com\/watch?v=U1XOPIqyP7A . Cited 11 November 2016"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"A.C. Yao, Protocols for secure computations, in 23rd Annual Symposium on Foundations of Computer Science, 1982. SFCS\u201908 (IEEE, New York, 1982)","DOI":"10.1109\/SFCS.1982.38"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"N.M. Edwin, Software frameworks, architectural and design patterns. J. Softw. Eng. Appl. 7 (8), 670 (2014)","DOI":"10.4236\/jsea.2014.78061"},{"key":"4_CR21","volume-title":"Use of web application frameworks in the development of small applications, in MIPRO, 2011 Proceedings of the 34th International Convention","author":"I.P. Vuksanovic","year":"2011","unstructured":"I.P. Vuksanovic, B. Sudarevic, Use of web application frameworks in the development of small applications, in MIPRO, 2011 Proceedings of the 34th International Convention (IEEE, New York, 2011)"},{"key":"4_CR22","unstructured":"Twisted Matrix Labs: Building the engine of your Internet (2016). http:\/\/twistedmatrix.com\/trac\/ . Cited 25 October 2016"},{"key":"4_CR23","unstructured":"The General Multiprecision PYthon project (GMPY) (2008). https:\/\/wiki.python.org\/moin\/GmPy . Cited 25 October 2016"},{"key":"4_CR24","unstructured":"A. Aly, Network flow problems with secure multiparty computation. Diss. Ph.D Thesis, Universt\u00e9 catholique de Louvain, IMMAQ (2015)"},{"key":"4_CR25","volume-title":"Asynchronous multiparty computation: theory and implementation, in International Workshop on Public Key Cryptography","author":"I. Damg\u00e5rd","year":"2009","unstructured":"I. Damg\u00e5rd et al., Asynchronous multiparty computation: theory and implementation, in International Workshop on Public Key Cryptography (Springer, Berlin, 2009)"},{"key":"4_CR26","unstructured":"VIFF, the Virtual Ideal Functionality Framework (2007). http:\/\/viff.dk\/ . Cited 25 October 2016"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"D. Bogdanov, S. Laur, J. Willemson, Sharemind: a framework for fast privacy-preserving computations. in European Symposium on Research in Computer Security (Springer, Berlin, 2008)","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"4_CR28","unstructured":"Sharemind SDK Beta (2015). https:\/\/sharemind-sdk.github.io\/.Cited25October2016"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"I. Damg\u00e5rd et al., Multiparty computation from somewhat homomorphic encryption, in Advances in Cryptology\u2014CRYPTO 2012 (Springer, Berlin, 2012), pp. 643\u2013662","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Y. Lindell et al., Efficient constant round multi-party computation combining BMR and SPDZ. in Annual Cryptology Conference (Springer, Berlin, 2015)","DOI":"10.1007\/978-3-662-48000-7_16"},{"key":"4_CR31","volume-title":"Practical covertly secure mpc for dishonest majority\u2014or: Breaking the spdz limits, in European Symposium on Research in Computer Security","author":"I. Damg\u00e5rd","year":"2013","unstructured":"I. Damg\u00e5rd et al., Practical covertly secure mpc for dishonest majority\u2014or: Breaking the spdz limits, in European Symposium on Research in Computer Security (Springer, Berlin, 2013)"},{"key":"4_CR32","unstructured":"SPDZ Software (2016). https:\/\/www.cs.bris.ac.uk\/Research\/CryptographySecurity\/SPDZ\/ . Cited 25 October 2016"},{"key":"4_CR33","unstructured":"D. Malkhi et al., Fairplay-secure two-party computation system, in USENIX Security Symposium, vol.\u00a04 (2004)"},{"key":"4_CR34","volume-title":"FairplayMP: a system for secure multi-party computation, in Proceedings of the 15th ACM Conference on Computer and Communications Security","author":"A. Ben-David","year":"2008","unstructured":"A. Ben-David, N. Nisan, B. Pinkas, FairplayMP: a system for secure multi-party computation, in Proceedings of the 15th ACM Conference on Computer and Communications Security (ACM, New York, 2008)"},{"key":"4_CR35","unstructured":"SCAPI Documentation (2014). https:\/\/scapi.readthedocs.io\/en\/latest\/intro.html . Cited 30 October 2016"},{"key":"4_CR36","volume-title":"TASTY: tool for automating secure two-party computations, in Proceedings of the 17th ACM Conference on Computer and Communications Security","author":"W. Henecka","year":"2010","unstructured":"W. Henecka et al., TASTY: tool for automating secure two-party computations, in Proceedings of the 17th ACM Conference on Computer and Communications Security (ACM, New York, 2010)"},{"key":"4_CR37","unstructured":"M. Burkhart et al., Sepia: security through private information aggregation (2009). arXiv preprint arXiv:0903.4258"},{"key":"4_CR38","unstructured":"M. Burkhart, M. Strasser, D. Many, X.A. Dimitropoulos, SEPIA: privacy-preserving aggregation of multi-domain network events and statistics, in USENIX Security Symposium, USENIX Association (2010), pp. 223\u2013240"},{"key":"4_CR39","unstructured":"SEPIA - Security through Private Information Aggregation (2011). http:\/\/sepia.ee.ethz.ch\/ . Cited 10 November 2016"},{"key":"4_CR40","unstructured":"Y. Ejgenberg et al., SCAPI: the secure computation application programming interface. IACR Cryptol. 2012, 629 (2012). ePrint Archive"},{"key":"4_CR41","unstructured":"P. Chen, S. Narayanan, J. Shen, Using Secure MPC to Play Games. (Massachusetts Institute of Technology, 2015)"},{"key":"4_CR42","doi-asserted-by":"crossref","unstructured":"A.C.-C. Yao, How to generate and exchange secrets, in 27th Annual Symposium on Foundations of Computer Science, 1986 (IEEE, New York, 1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"4_CR43","volume-title":"Combining secret sharing and garbled circuits for efficient private IEEE 754 floating-point computations, in International Conference on Financial Cryptography and Data Security","author":"P. Pullonen","year":"2015","unstructured":"P. Pullonen, S. Siim, Combining secret sharing and garbled circuits for efficient private IEEE 754 floating-point computations, in International Conference on Financial Cryptography and Data Security (Springer, Berlin, 2015)"},{"issue":"11","key":"4_CR44","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, How to share a secret. Commun. ACM 22 (11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"4_CR45","unstructured":"K.V. J\u00f3nsson, G. Kreitz, M. Uddin, Secure multi-party sorting and applications. IACR Cryptol. 2011, 122 (2011). ePrint Archive"},{"key":"4_CR46","unstructured":"Y. Huang et al., Faster secure two-party computation using garbled circuits, in USENIX Security Symposium, vol.\u00a0201(1) (2011)"},{"key":"4_CR47","volume-title":"Poster: secure multi-party computation as a tool for privacy-preserving data analysis (University of Virginia","author":"S. Havron","year":"2016","unstructured":"S. Havron, Poster: secure multi-party computation as a tool for privacy-preserving data analysis (University of Virginia, 2016)"},{"key":"4_CR48","volume-title":"Secure multiparty computations on bitcoin, in 2014 IEEE Symposium on Security and Privacy","author":"M. Andrychowicz","year":"2014","unstructured":"M. Andrychowicz et al., Secure multiparty computations on bitcoin, in 2014 IEEE Symposium on Security and Privacy (IEEE, New York, 2014)"},{"issue":"1","key":"4_CR49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13635-015-0025-9","volume":"2015","author":"S. Rass","year":"2015","unstructured":"S. Rass, P. Schartner, M. Brodbeck, Private function evaluation by local two-party computation. EURASIP J. Inform. Secur. 2015 (1), 1\u201311 (2015)","journal-title":"EURASIP J. Inform. Secur."},{"key":"4_CR50","unstructured":"B. Yuan, W. Lin, C. McDonnell, Blockchains and electronic health records(2015). http:\/\/mcdonnell.mit.edu\/blockchain_ehr.pdf . Cited 18 April 2017"},{"key":"4_CR51","unstructured":"M. Herlihy, M. Moir, Enhancing accountability and trust in distributed ledgers (2016). arXiv preprint arXiv:1606.07490"},{"key":"4_CR52","unstructured":"Blockchain and Health IT: Algorithms, Privacy, and Data (2016). White Paper"}],"container-title":["Fog Computing in the Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57639-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T07:17:54Z","timestamp":1569395874000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-57639-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,31]]},"ISBN":["9783319576381","9783319576398"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57639-8_4","relation":{},"subject":[],"published":{"date-parts":[[2017,5,31]]}}}