{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:23:58Z","timestamp":1771705438183,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T00:00:00Z","timestamp":1386547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["258414"],"award-info":[{"award-number":["258414"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004356","name":"Nokia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004356","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2523668","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:44:07Z","timestamp":1389041047000},"page":"159-168","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Do I know you?"],"prefix":"10.1145","author":[{"given":"Marcin","family":"Nagy","sequence":"first","affiliation":[{"name":"Aalto University, Finland"}]},{"given":"Emiliano","family":"De Cristofaro","sequence":"additional","affiliation":[{"name":"PARC (a Xerox Company)"}]},{"given":"Alexandra","family":"Dmitrienko","sequence":"additional","affiliation":[{"name":"Fraunhofer SIT\/CASED, Germany"}]},{"given":"N.","family":"Asokan","sequence":"additional","affiliation":[{"name":"University of Helsinki &amp; Aalto University, Finland"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"TU Darmstadt\/CASED, Germany"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bandwagon. http:\/\/bandwagon.io.  Bandwagon. http:\/\/bandwagon.io."},{"key":"e_1_3_2_1_2_1","unstructured":"Sidecar---My ride is your ride. http:\/\/side.cr\/.  Sidecar---My ride is your ride. http:\/\/side.cr\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Zoosk. http:\/\/zoosk.com.  Zoosk. http:\/\/zoosk.com."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872771"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_27"},{"key":"e_1_3_2_1_6_1","volume-title":"S&P","author":"Balfanz D.","year":"2003"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_36"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-002-0120-1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Carter H. Amrutkar C. Dacosta I. and Traynor P. For your phone only: custom protocols for efficient secure function evaluation on mobile devices. Security and Communication Networks (2013).  Carter H. Amrutkar C. Dacosta I. and Traynor P. For your phone only: custom protocols for efficient secure function evaluation on mobile devices. Security and Communication Networks (2013).","DOI":"10.1002\/sec.851"},{"key":"e_1_3_2_1_13_1","volume-title":"NDSS","author":"Danezis G.","year":"2009"},{"key":"e_1_3_2_1_14_1","volume-title":"CANS","author":"De Cristofaro E.","year":"2012"},{"key":"e_1_3_2_1_15_1","volume-title":"ASIACRYPT","author":"De Cristofaro E.","year":"2010"},{"key":"e_1_3_2_1_16_1","volume-title":"ACNS","author":"De Cristofaro E.","year":"2011"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_13"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_4"},{"key":"e_1_3_2_1_19_1","volume-title":"INFOCOM","author":"Dong W.","year":"2011"},{"key":"e_1_3_2_1_20_1","unstructured":"Eppstein D. Goodrich M. T. and Baldi P. Privacy-Enhanced Methods for Comparing Compressed DNA Sequences. http:\/\/arxiv.org\/abs\/1107.3593 2011.  Eppstein D. Goodrich M. T. and Baldi P. Privacy-Enhanced Methods for Comparing Compressed DNA Sequences. http:\/\/arxiv.org\/abs\/1107.3593 2011."},{"key":"e_1_3_2_1_21_1","volume-title":"CT-RSA","author":"Fischlin M.","year":"2011"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_3"},{"key":"e_1_3_2_1_23_1","volume-title":"EUROCRYPT","author":"Freedman M. J.","year":"2004"},{"key":"e_1_3_2_1_24_1","volume-title":"RFC Editor","author":"Hardt D.","year":"2012"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455832"},{"key":"e_1_3_2_1_26_1","volume-title":"TCC","author":"Hazay C.","year":"2008"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_16"},{"key":"e_1_3_2_1_28_1","unstructured":"Huang Y. Chapman E. and Evans D. Privacy-preserving applications on smartphones. In HotSec (2011).   Huang Y. Chapman E. and Evans D. Privacy-preserving applications on smartphones. In HotSec (2011)."},{"key":"e_1_3_2_1_29_1","unstructured":"Huang Y. Evans D. and Katz J. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? In NDSS (2012).  Huang Y. Evans D. and Katz J. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? In NDSS (2012)."},{"key":"e_1_3_2_1_31_1","volume-title":"ICPP","author":"Ioannidis I.","year":"2002"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_34"},{"key":"e_1_3_2_1_33_1","volume-title":"SCN","author":"Jarecki S.","year":"2010"},{"key":"e_1_3_2_1_34_1","volume-title":"Financial Cryptography","author":"J\u00e4rvinen K.","year":"2010"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046729"},{"key":"e_1_3_2_1_36_1","volume-title":"CODASPY","author":"Kerschbaum F.","year":"2011"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_15"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943517"},{"key":"e_1_3_2_1_39_1","volume-title":"INFOCOM","author":"Li M.","year":"2011"},{"key":"e_1_3_2_1_40_1","volume-title":"ACNS","author":"Manulis M.","year":"2010"},{"key":"e_1_3_2_1_41_1","volume-title":"NDSS","author":"Mittal P.","year":"2013"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484332"},{"key":"e_1_3_2_1_43_1","volume-title":"NordSec","author":"Nagy M.","year":"2013"},{"key":"e_1_3_2_1_44_1","unstructured":"NIST. http:\/\/www.nsa.gov\/ia\/_files\/nist-routines.pdf.  NIST. http:\/\/www.nsa.gov\/ia\/_files\/nist-routines.pdf."},{"key":"e_1_3_2_1_45_1","volume-title":"USEC","author":"Norcie G.","year":"2013"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592606.1592624"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179529.1179532"},{"key":"e_1_3_2_1_48_1","volume-title":"ICDCS","author":"Tanenbaum","year":"1986"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187843"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2008.52"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_3_2_1_52_1","unstructured":"Zhang L. and Li X.-Y. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks. http:\/\/arxiv.org\/abs\/1207.7199 2012.  Zhang L. and Li X.-Y. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks. http:\/\/arxiv.org\/abs\/1207.7199 2012."},{"key":"e_1_3_2_1_53_1","volume-title":"INFOCOM","author":"Zhang R.","year":"2012"}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","location":"New Orleans Louisiana USA","acronym":"ACSAC '13","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523668","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2523668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:03Z","timestamp":1750232043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523668"}},"subtitle":["efficient and privacy-preserving common friend-finder protocols and applications"],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":51,"alternative-id":["10.1145\/2523649.2523668","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2523668","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}