{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:45Z","timestamp":1750306785729,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,4]],"date-time":"2013-11-04T00:00:00Z","timestamp":1383523200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,4]]},"DOI":"10.1145\/2517840.2517847","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"83-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Distributed privacy-preserving transparency logging"],"prefix":"10.1145","author":[{"given":"Tobias","family":"Pulls","sequence":"first","affiliation":[{"name":"Karlstad University, Karlstad, Sweden"}]},{"given":"Roel","family":"Peeters","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Karel","family":"Wouters","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2013,11,4]]},"reference":[{"unstructured":"The Go Programming Language version 1.1 RC2.  The Go Programming Language version 1.1 RC2.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","series-title":"LNCS","volume-title":"BBox: A Distributed Secure Log Architecture","author":"Accorsi R.","year":"2010","unstructured":"R. Accorsi . BBox: A Distributed Secure Log Architecture . In J. Camenisch and L. Costas, editors, EuroPKI '10, volume 6711 of LNCS . Springer , 2010 . R. Accorsi. BBox: A Distributed Secure Log Architecture. In J. Camenisch and L. Costas, editors, EuroPKI '10, volume 6711 of LNCS. Springer, 2010."},{"key":"e_1_3_2_1_3_1","series-title":"LNCS","first-page":"566","volume-title":"Advances in Cryptology -- ASIACRYPT '01","author":"Bellare M.","year":"2001","unstructured":"M. Bellare , A. Boldyrevay , A. Desaiz , and D. Pointcheval . Key-Privacy in Public-Key Encryption . In C. Boyd, editor, Advances in Cryptology -- ASIACRYPT '01 , volume 2248 of LNCS , pages 566 -- 582 . Springer , 2001 . M. Bellare, A. Boldyrevay, A. Desaiz, and D. Pointcheval. Key-Privacy in Public-Key Encryption. In C. Boyd, editor, Advances in Cryptology -- ASIACRYPT '01, volume 2248 of LNCS, pages 566--582. Springer, 2001."},{"key":"e_1_3_2_1_4_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/BFb0055718","volume-title":"Advance in Cryptology -- CRYPTO '98","author":"Bellare M.","year":"1998","unstructured":"M. Bellare , A. Desai , D. Pointcheval , and P. Rogaway . Relations Among Notions of Security for Public-Key Encryption Schemes . In H. Krawczyk, editor, Advance in Cryptology -- CRYPTO '98 , volume 1462 of LNCS , pages 26 -- 45 . Springer , 1998 . M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations Among Notions of Security for Public-Key Encryption Schemes. In H. Krawczyk, editor, Advance in Cryptology -- CRYPTO '98, volume 1462 of LNCS, pages 26--45. Springer, 1998."},{"doi-asserted-by":"crossref","unstructured":"M.\n      Bellare\n     and \n      B.\n      Yee\n  . \n  Forward-Security in Private-Key Cryptography\n  . In M. Joye editor CT-RSA '03 volume \n  2612\n   of \n  LNCS pages \n  1\n  --\n  18\n  . \n  Springer 2003\n  .   M. Bellare and B. Yee. Forward-Security in Private-Key Cryptography. In M. Joye editor CT-RSA '03 volume 2612 of LNCS pages 1--18. Springer 2003.","key":"e_1_3_2_1_5_1","DOI":"10.1007\/3-540-36563-X_1"},{"key":"e_1_3_2_1_6_1","volume-title":"Forward Integrity For Secure Audit Logs. Technical report","author":"Bellare M.","year":"1997","unstructured":"M. Bellare and B. S. Yee . Forward Integrity For Secure Audit Logs. Technical report , 1997 . M. Bellare and B. S. Yee. Forward Integrity For Secure Audit Logs. Technical report, 1997."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.5555\/1251375.1251396"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1137\/0217017"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1007\/978-3-642-14282-6_25"},{"unstructured":"J. E.\n      Holt\n    .\n  Logcrypt: Forward Security and Public Verification for Secure Audit Logs\n  . In R. Buyya T. Ma R. Safavi-Naini C. Steketee and W. Susilo editors ACSW Frontiers '06 volume \n  54\n   of \n  CRPIT pages \n  203\n  --\n  211\n  . \n  Australian Computer Society 2006\n  .   J. E. Holt. Logcrypt: Forward Security and Public Verification for Secure Audit Logs. In R. Buyya T. Ma R. Safavi-Naini C. Steketee and W. Susilo editors ACSW Frontiers '06 volume 54 of CRPIT pages 203--211. Australian Computer Society 2006.","key":"e_1_3_2_1_11_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/SERVICES.2011.91"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1007\/978-3-540-70567-3_4"},{"key":"e_1_3_2_1_14_1","volume-title":"FIPS 186--3: Digital Signature Standard (DSS)","author":"NIST.","year":"2009","unstructured":"NIST. FIPS 186--3: Digital Signature Standard (DSS) , 2009 . NIST. FIPS 186--3: Digital Signature Standard (DSS), 2009."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1007\/978-3-658-03371-2_6"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1016\/j.aos.2009.04.005"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/1151030.1151052"},{"key":"e_1_3_2_1_19_1","first-page":"53","volume-title":"Cryptographic Support for Secure Logs on Untrusted Machines. In USENIX Security Symposium '98","author":"Schneier B.","year":"1998","unstructured":"B. Schneier and J. Kelsey . Cryptographic Support for Secure Logs on Untrusted Machines. In USENIX Security Symposium '98 , pages 53 -- 62 . USENIX, 1998 . B. Schneier and J. Kelsey. Cryptographic Support for Secure Logs on Untrusted Machines. In USENIX Security Symposium '98, pages 53--62. USENIX, 1998."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.5555\/647995.742445"},{"key":"e_1_3_2_1_22_1","volume-title":"UN e-Government Survey","author":"United Nations Department of Economic and Social Affairs.","year":"2012","unstructured":"United Nations Department of Economic and Social Affairs. UN e-Government Survey 2012 . E-Government for the People. Technical report, 2012. United Nations Department of Economic and Social Affairs. UN e-Government Survey 2012. E-Government for the People. Technical report, 2012."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1109\/DSD.2012.69"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1109\/ARES.2008.41"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1109\/ACSAC.2009.28"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS'13","name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","location":"Berlin Germany"},"container-title":["Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517840.2517847","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517840.2517847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:14Z","timestamp":1750232054000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517840.2517847"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,4]]},"references-count":22,"alternative-id":["10.1145\/2517840.2517847","10.1145\/2517840"],"URL":"https:\/\/doi.org\/10.1145\/2517840.2517847","relation":{},"subject":[],"published":{"date-parts":[[2013,11,4]]},"assertion":[{"value":"2013-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}