{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T00:18:13Z","timestamp":1771978693536,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,10,30]],"date-time":"2006-10-30T00:00:00Z","timestamp":1162166400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,10,30]]},"DOI":"10.1145\/1180405.1180455","type":"proceedings-article","created":{"date-parts":[[2007,1,16]],"date-time":"2007-01-16T20:15:56Z","timestamp":1168978556000},"page":"410-420","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Secure function evaluation with ordered binary decision diagrams"],"prefix":"10.1145","author":[{"given":"Louis","family":"Kruger","sequence":"first","affiliation":[{"name":"University of Wisconsin-Madison"}]},{"given":"Somesh","family":"Jha","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison"}]},{"given":"Eu-Jin","family":"Goh","sequence":"additional","affiliation":[{"name":"Stanford University"}]},{"given":"Dan","family":"Boneh","sequence":"additional","affiliation":[{"name":"Stanford University"}]}],"member":"320","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"LNCS","first-page":"40","volume-title":"Proceedings of Eurocrypt","author":"Aggarwal Gagan","year":"2004","unstructured":"Gagan Aggarwal , Nina Mishra , and Benny Pinkas . Secure computation of the k-th ranked element . In Christian Cachin and Jan Camenisch, editors, Proceedings of Eurocrypt 2004 , volume 3027 of LNCS , pages 40 -- 55 . Springer-Verlag , May 2004. Gagan Aggarwal, Nina Mishra, and Benny Pinkas. Secure computation of the k-th ranked element. In Christian Cachin and Jan Camenisch, editors, Proceedings of Eurocrypt 2004, volume 3027 of LNCS, pages 40--55. Springer-Verlag, May 2004."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.537122"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676819"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/217474.217583"},{"key":"e_1_3_2_1_5_1","unstructured":"Buddy. http:\/\/sourceforge.net\/projects\/buddy.  Buddy. http:\/\/sourceforge.net\/projects\/buddy."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/381473.381519"},{"key":"e_1_3_2_1_7_1","volume-title":"Model Checking","author":"Clarke E.M.","year":"2000","unstructured":"E.M. Clarke , O. Grumberg , and D.A. Peled . Model Checking . The MIT Press , 2000 . E.M. Clarke, O. Grumberg, and D.A. Peled. Model Checking. The MIT Press, 2000."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/224841.224875"},{"key":"e_1_3_2_1_9_1","volume-title":"The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation","author":"Cranor Lorrie","year":"2002","unstructured":"Lorrie Cranor , Marc Langheinrich , Massimo Marchiori , Martin Presler-Marshall , and Joseph Reagle . The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation , 16 April 2002 . Lorrie Cranor, Marc Langheinrich, Massimo Marchiori, Martin Presler-Marshall, and Joseph Reagle. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation, 16 April 2002."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293440"},{"key":"e_1_3_2_1_11_1","volume-title":"2004 EU Workshop on Secure Multiparty Protocols (SMP)","author":"Feigenbaum J.","year":"2004","unstructured":"J. Feigenbaum , B. Pinkas , R. Ryger , and F. Saint-Jean . Secure computation of surveys . In 2004 EU Workshop on Secure Multiparty Protocols (SMP) , 2004 . J. Feigenbaum, B. Pinkas, R. Ryger, and F. Saint-Jean. Secure computation of surveys. In 2004 EU Workshop on Secure Multiparty Protocols (SMP), 2004."},{"key":"e_1_3_2_1_12_1","series-title":"LNCS","first-page":"1","volume-title":"Proceedings of Eurocrypt","author":"Freedman Michael","year":"2004","unstructured":"Michael Freedman , Kobbi Nissim , and Benny Pinkas . Efficient private matching and set intersection . In Christian Cachin and Jan Camenisch, editors, Proceedings of Eurocrypt 2004 , volume 3027 of LNCS , pages 1 -- 19 . Springer-Verlag , May 2004. Michael Freedman, Kobbi Nissim, and Benny Pinkas. Efficient private matching and set intersection. In Christian Cachin and Jan Camenisch, editors, Proceedings of Eurocrypt 2004, volume 3027 of LNCS, pages 1--19. Springer-Verlag, May 2004."},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. of 42nd","author":"Goldberg Ian","year":"1997","unstructured":"Ian Goldberg , David Wagner , and Eric Brewer . Privacy-enhancing technologies for the internet . In Proc. of 42nd IEEE Spring COMPCON. IEEE Computer Society Press , February 1997 . Ian Goldberg, David Wagner, and Eric Brewer. Privacy-enhancing technologies for the internet. In Proc. of 42nd IEEE Spring COMPCON. IEEE Computer Society Press, February 1997."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/975541"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_16_1","unstructured":"Javabdd - java binary decision diagram library. http:\/\/javabdd.sourceforge.net\/.  Javabdd - java binary decision diagram library. http:\/\/javabdd.sourceforge.net\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/3090475.3090494"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0019-2"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337028"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948139"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 13th Usenix Security Symposium","author":"Malkhi D.","year":"2004","unstructured":"D. Malkhi , N. Nisan , B. Pinkas , and Y. Sella . Fairplay --- a secure two-party computation system . In Proceedings of the 13th Usenix Security Symposium , San Diego, CA, USA , August 2004 . D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Fairplay --- a secure two-party computation system. In Proceedings of the 13th Usenix Security Symposium, San Diego, CA, USA, August 2004."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/365411.365502"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.7326\/0003-4819-127-2-199707150-00008"},{"key":"e_1_3_2_1_25_1","volume-title":"Americans and online privacy: The system is broken. Technical report","author":"Turow Joseph","year":"2003","unstructured":"Joseph Turow . Americans and online privacy: The system is broken. Technical report , Annenberg Public Policy Center , June 2003 . Joseph Turow. Americans and online privacy: The system is broken. Technical report, Annenberg Public Policy Center, June 2003."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996859"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"}],"event":{"name":"CCS06: 13th ACM Conference on Computer and Communications Security 2006","location":"Alexandria Virginia USA","acronym":"CCS06","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 13th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1180405.1180455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T04:13:40Z","timestamp":1673064820000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1180405.1180455"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10,30]]},"references-count":26,"alternative-id":["10.1145\/1180405.1180455","10.1145\/1180405"],"URL":"https:\/\/doi.org\/10.1145\/1180405.1180455","relation":{},"subject":[],"published":{"date-parts":[[2006,10,30]]},"assertion":[{"value":"2006-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}