{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:57Z","timestamp":1750307097205,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,3]],"date-time":"2012-09-03T00:00:00Z","timestamp":1346630400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,3]]},"DOI":"10.1145\/2381716.2381842","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"659-663","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Using private information retrieval protocol for an e-commerce application"],"prefix":"10.1145","author":[{"given":"Sunil B.","family":"Mane","sequence":"first","affiliation":[{"name":"College of Engineering, Pune M. S., India"}]},{"given":"Suraj T.","family":"Sawant","sequence":"additional","affiliation":[{"name":"College of Engineering, Pune M. S., India"}]},{"given":"Pradeep K.","family":"Sinha","sequence":"additional","affiliation":[{"name":"High Performance Computing, Center for Development and Advance Computing, Pune M. S., India"}]}],"member":"320","published-online":{"date-parts":[[2012,9,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"E-commerce and E-business: Zorayda Ruth Andam.  E-commerce and E-business: Zorayda Ruth Andam."},{"key":"e_1_3_2_1_2_1","unstructured":"Privacy and Security Issues in E-Commerce: Mark S. Ackerman and Donald T. Davis Jr.  Privacy and Security Issues in E-Commerce: Mark S. Ackerman and Donald T. Davis Jr."},{"key":"e_1_3_2_1_3_1","unstructured":"E-commerce security issues:{Online}.Available: http:\/\/www.ecommerce-digest.com\/ecommerce-security-issues.html.  E-commerce security issues:{Online}.Available: http:\/\/www.ecommerce-digest.com\/ecommerce-security-issues.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Private Information Retrieval: An overview and current trends - Dmitri Asonov  Private Information Retrieval: An overview and current trends - Dmitri Asonov"},{"key":"e_1_3_2_1_5_1","unstructured":"K. Regan and C. Saliba. Privacy watchdogs blast amazon. E-Commerce Times {Online}.Available: http:\/\/www.ecommercetimes.com\/news\/articles2000\/000914-3.html Sept. 2000  K. Regan and C. Saliba. Privacy watchdogs blast amazon. E-Commerce Times {Online}.Available: http:\/\/www.ecommercetimes.com\/news\/articles2000\/000914-3.html Sept. 2000"},{"key":"e_1_3_2_1_6_1","unstructured":"CNN. Amazon client checks out. CNN Financial Network {Online}.Available: http:\/\/cnnfn.cnn.com\/2000\/09\/13\/technology\/privacy\/index.htm Sept. 2000  CNN. Amazon client checks out. CNN Financial Network {Online}.Available: http:\/\/cnnfn.cnn.com\/2000\/09\/13\/technology\/privacy\/index.htm Sept. 2000"},{"key":"e_1_3_2_1_7_1","volume-title":"Dec.","author":"Olsen","year":"1999","unstructured":"S. Olsen . Top web sites compromise consumer privacy. CNET News Archive, {Online}.Available: http:\/\/yahoo.cnet.com\/news\/0-1007-200-1500309.html , Dec. 1999 . S. Olsen. Top web sites compromise consumer privacy. CNET News Archive, {Online}.Available: http:\/\/yahoo.cnet.com\/news\/0-1007-200-1500309.html, Dec. 1999."},{"volume-title":"The online privacy protection act","author":"Rotenber","key":"e_1_3_2_1_8_1","unstructured":"M. Rotenber . The online privacy protection act . Electronic Privacy Information Center , {Online}.Available: http:\/\/www.epic.org\/privacy\/internet\/EPIC_testimony_799.pdf, July 1999. M. Rotenber. The online privacy protection act. Electronic Privacy Information Center, {Online}.Available: http:\/\/www.epic.org\/privacy\/internet\/EPIC_testimony_799.pdf, July 1999."},{"key":"e_1_3_2_1_9_1","volume-title":"Sept.","author":"Beaumont","year":"2000","unstructured":"C. Beaumont . What price privacy when dotcoms go down?NEW ZEALAND HERALD , Sept. 2000 . C. Beaumont. What price privacy when dotcoms go down?NEW ZEALAND HERALD, Sept. 2000."},{"key":"e_1_3_2_1_10_1","volume-title":"June","author":"Disabatino","year":"2000","unstructured":"J. Disabatino . Disney offers to buy toys-mart.com customer list. CNN News Online, {Online}.Available: www.cnn.com\/2000\/TECH\/computing\/07\/14\/disney.toysmart.list.idg\/ , June 2000 . J. Disabatino. Disney offers to buy toys-mart.com customer list. CNN News Online, {Online}.Available: www.cnn.com\/2000\/TECH\/computing\/07\/14\/disney.toysmart.list.idg\/, June 2000."},{"key":"e_1_3_2_1_11_1","volume-title":"June","author":"Sandoval","year":"2000","unstructured":"G. Sandoval . Failed dotcoms may be selling your private information. CNET News Archive, {Online}.Available: http:\/\/yahoo.cnet.com\/news\/0-1007-200-2176430.html , June 2000 . G. Sandoval. Failed dotcoms may be selling your private information. CNET News Archive, {Online}.Available: http:\/\/yahoo.cnet.com\/news\/0-1007-200-2176430.html, June 2000."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293447"},{"key":"e_1_3_2_1_13_1","unstructured":"iPrivacy. {Online}.Available: http:\/\/www.iprivacy.com.  iPrivacy. {Online}.Available: http:\/\/www.iprivacy.com."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258609"},{"key":"e_1_3_2_1_15_1","volume-title":"M.: Private Information Retrieval. In: 46th IEEE Symposium on Foundations of Computer Science (FOCS'95)","author":"Chor B.","year":"1995","unstructured":"Chor , B. , Goldreich , O. , Kushilevitz , E. , Sudan , M.: Private Information Retrieval. In: 46th IEEE Symposium on Foundations of Computer Science (FOCS'95) , Pittsburgh, PA, USA, IEEE Computer Society Press ( 1995 ) 41--50 Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private Information Retrieval. In: 46th IEEE Symposium on Foundations of Computer Science (FOCS'95), Pittsburgh, PA, USA, IEEE Computer Society Press (1995) 41--50"},{"volume-title":"FOCS: IEEE Symposium on Foundations of Computer Science (FOCS). (1997)","author":"Kushilevitz E.","key":"e_1_3_2_1_16_1","unstructured":"Kushilevitz , E. , Ostrovsky , R. : Replication Is Not Needed: Single Database, Computationally-Private Information Retrieval (extended abstract) . In: FOCS: IEEE Symposium on Foundations of Computer Science (FOCS). (1997) 364--373 Kushilevitz, E., Ostrovsky, R.: Replication Is Not Needed: Single Database, Computationally-Private Information Retrieval (extended abstract). In: FOCS: IEEE Symposium on Foundations of Computer Science (FOCS). (1997) 364--373"},{"key":"e_1_3_2_1_17_1","series-title":"Lecture Notes in Computer Science","volume-title":"13th Annual International Conference on the Theory and Application of Cryptology & Information Security (ASIACRYPT'98), Bei-jing, China.","author":"Stern J. P.","year":"1998","unstructured":"Stern , J. P. : A New Efficient All-Or-Nothing Disclosure of Secrets Protocol . In: 13th Annual International Conference on the Theory and Application of Cryptology & Information Security (ASIACRYPT'98), Bei-jing, China. Volume 1514 of Lecture Notes in Computer Science . Springer ( 1998 ) 357--371. Stern, J. P.: A New Efficient All-Or-Nothing Disclosure of Secrets Protocol. In: 13th Annual International Conference on the Theory and Application of Cryptology & Information Security (ASIACRYPT'98), Bei-jing, China. Volume 1514 of Lecture Notes in Computer Science. Springer (1998) 357--371."},{"key":"e_1_3_2_1_18_1","series-title":"Lecture Notes in Computer Science","volume-title":"Stadler","author":"Cachin C.","year":"1999","unstructured":"Cachin , C. , Micali , S. , Stadler , M. : Computationally Private Information Retrieval with Polylogarithmic Communication. In: 18th Annual Eurocrypt Conference (EUROCRYPT'99), Prague, Czech Republic. Volume 1592 of Lecture Notes in Computer Science ., Springer ( 1999 ) 402--4145 Cachin, C., Micali, S., Stadler, M.: Computationally Private Information Retrieval with Polylogarithmic Communication. In: 18th Annual Eurocrypt Conference (EUROCRYPT'99), Prague, Czech Republic. Volume 1592 of Lecture Notes in Computer Science., Springer (1999) 402--4145"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595308"},{"key":"e_1_3_2_1_21_1","unstructured":"C. Aguilar-melchor \"A lattice-based computationally-efficient private information retrieval protocol.  C. Aguilar-melchor \"A lattice-based computationally-efficient private information retrieval protocol."}],"event":{"name":"CUBE '12: CUBE International IT Conference & Exhibition","sponsor":["CUOT Curtin University of Technology"],"location":"Pune India","acronym":"CUBE '12"},"container-title":["Proceedings of the CUBE International Information Technology Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381842","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381716.2381842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:46Z","timestamp":1750239286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381842"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,3]]},"references-count":20,"alternative-id":["10.1145\/2381716.2381842","10.1145\/2381716"],"URL":"https:\/\/doi.org\/10.1145\/2381716.2381842","relation":{},"subject":[],"published":{"date-parts":[[2012,9,3]]},"assertion":[{"value":"2012-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}