{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:32:15Z","timestamp":1766565135413,"version":"3.48.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,6]]},"DOI":"10.1109\/isc266238.2025.11293348","type":"proceedings-article","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T18:28:12Z","timestamp":1766514492000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Preserving Parking Lot Surveillance Utilizing Homomorphic Encryption"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-5673-9750","authenticated-orcid":false,"given":"Katharina","family":"Barlage","sequence":"first","affiliation":[{"name":"Fraunhofer FOKUS,Berlin,Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4717-4206","authenticated-orcid":false,"given":"Andrei","family":"Aleksandrov","sequence":"additional","affiliation":[{"name":"Fraunhofer FOKUS,Berlin,Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4411-0557","authenticated-orcid":false,"given":"Philipp","family":"L\u00e4mmel","sequence":"additional","affiliation":[{"name":"Fraunhofer FOKUS,Berlin,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55137-6_7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41763-9_1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4324\/9781315200811"},{"key":"ref4","article-title":"Smart\u2019 parking meter vendor had data stolen in ransomware attack","volume-title":"StateScoop","author":"Freed","year":"2020"},{"key":"ref5","article-title":"Hackers steal customer data from Europe\u2019s largest parking app operator","volume-title":"The Guardian","author":"Jolly","year":"2023"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3540878"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1142\/S0129156425406539"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref10","article-title":"TenSEAL: A Library for Encrypted Tensor Operations Using Homomorphic Encryption","author":"Benaissa","year":"2021","journal-title":"arXiv preprint arXiv"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2962132.2984894"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2016.06.004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43461-7_4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/eng2.12297"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3048177"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2984621"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.03.014"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3175829"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2870167"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3006337"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3016945"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.036278"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2905490"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8862652"},{"volume-title":"YOLOv8: State-of-the-Art Computer Vision Model.","key":"ref25"},{"volume-title":"TenSEAL tutorials.","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2023.104608"},{"volume-title":"Secured Cosine Similarity Computation in Homomorphic Encryption (TenSEAL)","year":"2025","key":"ref28"}],"event":{"name":"2025 IEEE International Smart Cities Conference (ISC2)","start":{"date-parts":[[2025,10,6]]},"location":"Patras, Greece","end":{"date-parts":[[2025,10,9]]}},"container-title":["2025 IEEE International Smart Cities Conference (ISC2)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11293139\/11293247\/11293348.pdf?arnumber=11293348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T07:34:04Z","timestamp":1766561644000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11293348\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/isc266238.2025.11293348","relation":{},"subject":[],"published":{"date-parts":[[2025,10,6]]}}}