{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:09:42Z","timestamp":1761401382602,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,29]],"date-time":"2007-10-29T00:00:00Z","timestamp":1193616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,29]]},"DOI":"10.1145\/1314333.1314351","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"84-90","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Private web search"],"prefix":"10.1145","author":[{"given":"Felipe","family":"Saint-Jean","sequence":"first","affiliation":[{"name":"Yale University, New Haven, CT"}]},{"given":"Aaron","family":"Johnson","sequence":"additional","affiliation":[{"name":"Yale University, New Haven, CT"}]},{"given":"Dan","family":"Boneh","sequence":"additional","affiliation":[{"name":"Stanford University, Palo Alto, CA"}]},{"given":"Joan","family":"Feigenbaum","sequence":"additional","affiliation":[{"name":"Yale University, New Haven, CT"}]}],"member":"320","published-online":{"date-parts":[[2007,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_20"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/795662.796270"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_4_1","unstructured":"Eff. http:\/\/www.eff.org\/Privacy\/AOL\/.  Eff. http:\/\/www.eff.org\/Privacy\/AOL\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773174"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352606"},{"key":"e_1_3_2_1_7_1","unstructured":"Foxtor. http:\/\/cups.cs.cmu.edu\/foxtor\/.  Foxtor. http:\/\/cups.cs.cmu.edu\/foxtor\/."},{"key":"e_1_3_2_1_8_1","volume-title":"A survey on private information retrieval","author":"Gasarch William","year":"2004","unstructured":"William Gasarch . A survey on private information retrieval , 2004 . William Gasarch. A survey on private information retrieval, 2004."},{"key":"e_1_3_2_1_9_1","unstructured":"Google. http:\/\/www.google.com\/.  Google. http:\/\/www.google.com\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135884"},{"key":"e_1_3_2_1_11_1","unstructured":"Jap. http:\/\/anon.inf.tu-dresden.de\/index_en.html.  Jap. http:\/\/anon.inf.tu-dresden.de\/index_en.html."},{"key":"e_1_3_2_1_12_1","first-page":"364","volume-title":"Proceedings of the 38th IEEE Symposium on Foundations of Computer Science","author":"Kushilevitz Eyal","unstructured":"Eyal Kushilevitz and Rafail Ostrovsky . Replication is NOT needed: SINGLE database, computationally-private information retrieval . In Proceedings of the 38th IEEE Symposium on Foundations of Computer Science , pages 364 -\u00bf373, October 1997. Eyal Kushilevitz and Rafail Ostrovsky. Replication is NOT needed: SINGLE database, computationally-private information retrieval. In Proceedings of the 38th IEEE Symposium on Foundations of Computer Science, pages 364-\u00bf373, October 1997."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_1_14_1","unstructured":"p0f. http:\/\/lcamtuf.coredump.cx\/p0f\/README.  p0f. http:\/\/lcamtuf.coredump.cx\/p0f\/README."},{"key":"e_1_3_2_1_15_1","unstructured":"Privoxy. http:\/\/www.privoxy.org.  Privoxy. http:\/\/www.privoxy.org."},{"key":"e_1_3_2_1_16_1","volume-title":"The boundary between privacy and utility in data anonymization","author":"Rastogi Vibhor","year":"2006","unstructured":"Vibhor Rastogi , Dan Suciu , and Sungho Hong . The boundary between privacy and utility in data anonymization , 2006 . http:\/\/www.citebase.org\/abstract?id=oai:arXiv.org:cs\/0612103. Vibhor Rastogi, Dan Suciu, and Sungho Hong. The boundary between privacy and utility in data anonymization, 2006. http:\/\/www.citebase.org\/abstract?id=oai:arXiv.org:cs\/0612103."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"e_1_3_2_1_19_1","unstructured":"Simile. http:\/\/simile.mit.edu\/java-firefox-extension\/.  Simile. http:\/\/simile.mit.edu\/java-firefox-extension\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Tor. http:\/\/tor.eff.org.  Tor. http:\/\/tor.eff.org."},{"key":"e_1_3_2_1_21_1","unstructured":"Torbutton. http:\/\/freehaven.net\/~squires\/torbutton\/.  Torbutton. http:\/\/freehaven.net\/~squires\/torbutton\/."},{"key":"e_1_3_2_1_22_1","unstructured":"Trackmenot. http:\/\/mrl.nyu.edu\/~dhowe\/TrackMeNot\/.  Trackmenot. http:\/\/mrl.nyu.edu\/~dhowe\/TrackMeNot\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974131"}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 2007 ACM workshop on Privacy in electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314351","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314333.1314351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314351"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,29]]},"references-count":22,"alternative-id":["10.1145\/1314333.1314351","10.1145\/1314333"],"URL":"https:\/\/doi.org\/10.1145\/1314333.1314351","relation":{},"subject":[],"published":{"date-parts":[[2007,10,29]]},"assertion":[{"value":"2007-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}