{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:41:12Z","timestamp":1725745272757},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T00:00:00Z","timestamp":1638835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T00:00:00Z","timestamp":1638835200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T00:00:00Z","timestamp":1638835200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,7]]},"DOI":"10.1109\/wifs53200.2021.9648381","type":"proceedings-article","created":{"date-parts":[[2021,12,24]],"date-time":"2021-12-24T15:36:03Z","timestamp":1640360163000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers"],"prefix":"10.1109","author":[{"given":"Jelle","family":"Vos","sequence":"first","affiliation":[]},{"given":"Zekeriya","family":"Erkin","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Doerr","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414506"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98113-0_13"},{"key":"ref12","first-page":"6","article-title":"Efficient and quasi-accurate multiparty private set union","author":"miyaji","year":"0","journal-title":"IEEE International Conference on Smart Computing"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_34"},{"journal-title":"The Ristretto Group","year":"0","author":"valence","key":"ref16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57878-7_14"},{"journal-title":"2015 data breach investigations report","year":"2015","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_16"},{"key":"ref5","first-page":"433","article-title":"A different cup of TI? the added value of commercial threat intelligence","author":"bouwman","year":"0","journal-title":"29th USENIX Security Symposium (USENIX Security 20)"},{"key":"ref8","first-page":"223","article-title":"SEPIA: privacy-preserving aggregation of multi-domain network events and statistics","author":"burkhart","year":"2010","journal-title":"19th USENIX Security Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2020071"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/08850607.2020.1780062"},{"journal-title":"ENISA Threat Landscape Report 2017","year":"2017","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-015-0301-1"}],"event":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2021,12,7]]},"location":"Montpellier, France","end":{"date-parts":[[2021,12,10]]}},"container-title":["2021 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9648364\/9648373\/09648381.pdf?arnumber=9648381","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:59:47Z","timestamp":1652187587000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9648381\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/wifs53200.2021.9648381","relation":{},"subject":[],"published":{"date-parts":[[2021,12,7]]}}}