{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:05:19Z","timestamp":1763017519857,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/hpec.2014.7040946","type":"proceedings-article","created":{"date-parts":[[2015,2,17]],"date-time":"2015-02-17T14:50:25Z","timestamp":1424184625000},"page":"1-6","source":"Crossref","is-referenced-by-count":53,"title":["Computing on masked data: a high performance method for improving big data veracity"],"prefix":"10.1109","author":[{"given":"Jeremy","family":"Kepner","sequence":"first","affiliation":[]},{"given":"Vijay","family":"Gadepally","sequence":"additional","affiliation":[]},{"given":"Pete","family":"Michaleas","sequence":"additional","affiliation":[]},{"given":"Nabil","family":"Schear","sequence":"additional","affiliation":[]},{"given":"Mayank","family":"Varia","sequence":"additional","affiliation":[]},{"given":"Arkady","family":"Yerukhimovich","sequence":"additional","affiliation":[]},{"given":"Robert K.","family":"Cunningham","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Protocols for Secure Computations (Extended Abstract)","author":"yao","year":"1982","journal-title":"FOCS"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.155"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35170-9_24"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2093506"},{"key":"13","article-title":"Taming biological big data with D4M","volume":"20","author":"kepner","year":"2013","journal-title":"Lincoln Laboratory Journal"},{"key":"14","article-title":"3D data management: Controlling data volume, velocity and variety","author":"laney","year":"2001","journal-title":"Gartner"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2013.6670318"},{"key":"12","article-title":"The abstract algebra of big data","author":"kepner","year":"2013","journal-title":"Union College Mathematics Conference"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1365815.1365816"},{"key":"2","article-title":"Highly-scalable searchable symmetric encryption with support for boolean queries","author":"cash","year":"2013","journal-title":"Crypto"},{"key":"1","article-title":"Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract)","author":"ben-or","year":"1988","journal-title":"STOC"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6289129"},{"key":"7","first-page":"482","article-title":"A tweakable enciphering mode","volume":"2729","author":"halevi","year":"2003","journal-title":"Crypto"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"journal-title":"Federal Information Processing Standards Publication 197 United States National Institute of Standards and Technology (NIST)","article-title":"Announcing the advanced encryption standard (AES)","year":"2001","key":"5"},{"journal-title":"Cyber Security and Reliability in A Digital Cloud","year":"2013","author":"evans","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719918"},{"key":"8","article-title":"Algorithms in HElib","author":"halevi","year":"0","journal-title":"Cryptology EPrint Archive Report 2014\/106"}],"event":{"name":"2014 IEEE High Performance Extreme Computing Conference (HPEC)","start":{"date-parts":[[2014,9,9]]},"location":"Waltham, MA, USA","end":{"date-parts":[[2014,9,11]]}},"container-title":["2014 IEEE High Performance Extreme Computing Conference (HPEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7027306\/7040940\/07040946.pdf?arnumber=7040946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:30:18Z","timestamp":1490308218000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7040946\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/hpec.2014.7040946","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}