{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:13:09Z","timestamp":1729653189377,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,4]]},"DOI":"10.1109\/icdew.2007.4401059","type":"proceedings-article","created":{"date-parts":[[2007,12,18]],"date-time":"2007-12-18T14:56:26Z","timestamp":1197989786000},"page":"715-724","source":"Crossref","is-referenced-by-count":0,"title":["Secure Mediation of Join Queries by Processing Ciphertexts"],"prefix":"10.1109","author":[{"given":"Joachim","family":"Biskup","sequence":"first","affiliation":[]},{"given":"Christian","family":"Tsatedem","sequence":"additional","affiliation":[]},{"given":"Lena","family":"Wiese","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"103","article-title":"A secure and optimally efficient multi-authority election scheme","author":"cramer","year":"1997","journal-title":"Proc Eurocrypt?96"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/319566.319580"},{"key":"ref12","first-page":"1","article-title":"Efficient private matching and set intersection","author":"freedman","year":"2004","journal-title":"Advances in Cryptology Proc Of EUROCRYPT"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/978-3-540-24571-1_10","article-title":"Efficient execution of aggregation queries over encrypted relational databases","author":"hacig\u00fcm\u00fc\u00e5\u00ff","year":"2004","journal-title":"Proc of the Database Systems for Advanced Applications"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8.50064-4"},{"key":"ref16","first-page":"241","article-title":"Privacy-preserving set operations","author":"kissner","year":"2005","journal-title":"Proceedings of Advances in Cryptology CRYPTO'99"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45140-4_16"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/11805588_7"},{"key":"ref19","first-page":"133","article-title":"Anti-tamper databases: Querying encrypted databases","author":"ozsoyoglu","year":"2003","journal-title":"Data and Applications Security XVII"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/11535706_20"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"365","DOI":"10.3233\/JCS-2003-11306","article-title":"Secure mediation: Requirements, design, and architecture","volume":"11","author":"altenschmidt","year":"2003","journal-title":"Journal of Computer Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/237814.238015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1996.492086"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053289"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099575"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/3-540-36233-9_9","article-title":"Explicit representation of constrained schema mappings for mediated data integration","author":"altenschmidt","year":"2002","journal-title":"Databases in Networked Information Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872771"},{"key":"ref9","first-page":"98","article-title":"Anti-tamper databases: Processing aggregate queries over encrypted databases","author":"chung","year":"2006","journal-title":"Proc of Int Conf on Data Engineering Workshops"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/11805588_22"},{"journal-title":"Homomorphic Cryptosystems and Their Applications","year":"2004","author":"rappe","key":"ref21"},{"key":"ref24","first-page":"479","article-title":"Privacy-preserving queries on encrypted data","author":"yang","year":"2006","journal-title":"Proceedings of the Second European Symposium on Research in Computer Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/64.621227"}],"event":{"name":"2007 IEEE 23rd International Conference on Data Engineering Workshop","start":{"date-parts":[[2007,4,17]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2007,4,20]]}},"container-title":["2007 IEEE 23rd International Conference on Data Engineering Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4400942\/4400943\/04401059.pdf?arnumber=4401059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T22:15:33Z","timestamp":1557094533000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4401059\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icdew.2007.4401059","relation":{},"subject":[],"published":{"date-parts":[[2007,4]]}}}