{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:13Z","timestamp":1750306633149,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000811","name":"European Institute of Innovation and Technology","doi-asserted-by":"publisher","award":["20103P34XC"],"award-info":[{"award-number":["20103P34XC"]}],"id":[{"id":"10.13039\/501100000811","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,4]]},"DOI":"10.1145\/2590296.2590303","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"135-146","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["PIDGIN"],"prefix":"10.1145","author":[{"given":"Muhammad Rizwan","family":"Asghar","sequence":"first","affiliation":[{"name":"CREATE-NET, Trento, Italy"}]},{"given":"Ashish","family":"Gehani","sequence":"additional","affiliation":[{"name":"SRI International, Menlo Park, CA, USA"}]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[{"name":"University of Trento, Trento, Italy"}]},{"given":"Giovanni","family":"Russello","sequence":"additional","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]}],"member":"320","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Haggle: An EU funded project. http:\/\/www.haggleproject.org\/ June 2010. Last accessed: August 7 2013.  Haggle: An EU funded project. http:\/\/www.haggleproject.org\/ June 2010. Last accessed: August 7 2013."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.23"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.11.010"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_5_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT","author":"Boneh D.","year":"2004","unstructured":"D. Boneh , G. Crescenzo , R. Ostrovsky , and G. Persiano . Public key encryption with keyword search . In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004 , volume 3027 of Lecture Notes in Computer Science , pages 506 -- 522 . Springer Berlin Heidelberg , 2004. D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 506--522. Springer Berlin Heidelberg, 2004."},{"key":"e_1_3_2_1_6_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/978-3-642-15364-8_32","volume-title":"Database and Expert Systems Applications","author":"Choi S.","year":"2010","unstructured":"S. Choi , G. Ghinita , and E. Bertino . A privacy-enhancing content-based publish\/subscribe system using scalar product preserving transformations . In P. G. Bringas, A. Hameurlain, and G. Quirchmayr, editors, Database and Expert Systems Applications , volume 6261 of Lecture Notes in Computer Science , pages 368 -- 384 . Springer Berlin Heidelberg , 2010 . S. Choi, G. Ghinita, and E. Bertino. A privacy-enhancing content-based publish\/subscribe system using scalar product preserving transformations. In P. G. Bringas, A. Hameurlain, and G. Quirchmayr, editors, Database and Expert Systems Applications, volume 6261 of Lecture Notes in Computer Science, pages 368--384. Springer Berlin Heidelberg, 2010."},{"key":"e_1_3_2_1_7_1","unstructured":"Emarketer. Smartphones tablets drive faster growth in ecommerce sales - mobile will take a greater percentage of total ecommerce retail sales. http:\/\/goo.gl\/48Mbp April 2013. Last accessed: August 7 2013.  Emarketer. Smartphones tablets drive faster growth in ecommerce sales - mobile will take a greater percentage of total ecommerce retail sales. http:\/\/goo.gl\/48Mbp April 2013. Last accessed: August 7 2013."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.158"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_10_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/978-3-642-35999-6_11","volume-title":"L. Knudsen and H. Wu","author":"Grewal G.","year":"2013","unstructured":"G. Grewal , R. Azarderakhsh , P. Longa , S. Hu , and D. Jao . Efficient implementation of bilinear pairings on ARM processors . In L. Knudsen and H. Wu , editors, Selected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science , pages 149 -- 165 . Springer Berlin Heidelberg , 2013 . G. Grewal, R. Azarderakhsh, P. Longa, S. Hu, and D. Jao. Efficient implementation of bilinear pairings on ARM processors. In L. Knudsen and H. Wu, editors, Selected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science, pages 149--165. Springer Berlin Heidelberg, 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005142"},{"key":"e_1_3_2_1_12_1","volume-title":"Attribute-based publishing with hidden credentials and hidden policies","author":"Kapadia A.","year":"2007","unstructured":"A. Kapadia , P. P. Tsang , and S. W. Smith . Attribute-based publishing with hidden credentials and hidden policies . In NDSS. The Internet Society , 2007 . A. Kapadia, P. P. Tsang, and S. W. Smith. Attribute-based publishing with hidden credentials and hidden policies. In NDSS. The Internet Society, 2007."},{"key":"e_1_3_2_1_13_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1007\/978-3-540-78967-3_9","volume-title":"Advances in Cryptology EUROCRYPT","author":"Katz J.","year":"2008","unstructured":"J. Katz , A. Sahai , and B. Waters . Predicate encryption supporting disjunctions, polynomial equations, and inner products . In N. Smart, editor, Advances in Cryptology EUROCRYPT 2008 , volume 4965 of Lecture Notes in Computer Science , pages 146 -- 162 . Springer Berlin Heidelberg , 2008. J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In N. Smart, editor, Advances in Cryptology EUROCRYPT 2008, volume 4965 of Lecture Notes in Computer Science, pages 146--162. Springer Berlin Heidelberg, 2008."},{"key":"e_1_3_2_1_14_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/978-3-642-21031-0_3","volume-title":"Information Security Practice and Experience","author":"Lai J.","year":"2011","unstructured":"J. Lai , R. Deng , and Y. Li . Fully secure cipertext-policy hiding CP-ABE . In F. Bao and J. Weng, editors, Information Security Practice and Experience , volume 6672 of Lecture Notes in Computer Science , pages 24 -- 39 . Springer Berlin Heidelberg , 2011 . J. Lai, R. Deng, and Y. Li. Fully secure cipertext-policy hiding CP-ABE. In F. Bao and J. Weng, editors, Information Security Practice and Experience, volume 6672 of Lecture Notes in Computer Science, pages 24--39. Springer Berlin Heidelberg, 2011."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295164"},{"key":"e_1_3_2_1_16_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-540-68914-0_7","volume-title":"Applied Cryptography and Network Security","author":"Nishide T.","year":"2008","unstructured":"T. Nishide , K. Yoneyama , and K. Ohta . Attribute-based encryption with partially hidden encryptor-specified access structures . In S. Bellovin, R. Gennaro, A. Keromytis, and M. Yung, editors, Applied Cryptography and Network Security , volume 5037 of Lecture Notes in Computer Science , pages 111 -- 129 . Springer Berlin Heidelberg , 2008 . T. Nishide, K. Yoneyama, and K. Ohta. Attribute-based encryption with partially hidden encryptor-specified access structures. In S. Bellovin, R. Gennaro, A. Keromytis, and M. Yung, editors, Applied Cryptography and Network Security, volume 5037 of Lecture Notes in Computer Science, pages 111--129. Springer Berlin Heidelberg, 2008."},{"key":"e_1_3_2_1_17_1","volume-title":"Department of Information Technology","author":"Nordstrom E.","year":"2009","unstructured":"E. Nordstrom , P. Gunningberg , and C. Rohner . A search-based network architecture for mobile devices. Technical report , Department of Information Technology , Uppsala University , 2009 . E. Nordstrom, P. Gunningberg, and C. Rohner. A search-based network architecture for mobile devices. Technical report, Department of Information Technology, Uppsala University, 2009."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.248176"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2010.5447902"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_27"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.04.035"},{"key":"e_1_3_2_1_22_1","first-page":"44","volume-title":"IEEE Symposium on Security and Privacy","author":"Song D. X.","year":"2000","unstructured":"D. X. Song , D. Wagner , and A. Perrig . Practical techniques for searches on encrypted data . In IEEE Symposium on Security and Privacy , pages 44 -- 55 . IEEE Computer Society , 2000 . D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In IEEE Symposium on Security and Privacy, pages 44--55. IEEE Computer Society, 2000."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.136"}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Kyoto Japan","acronym":"ASIA CCS '14"},"container-title":["Proceedings of the 9th ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590303","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2590296.2590303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:51Z","timestamp":1750229751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590303"}},"subtitle":["privacy-preserving interest and content sharing in opportunistic networks"],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":23,"alternative-id":["10.1145\/2590296.2590303","10.1145\/2590296"],"URL":"https:\/\/doi.org\/10.1145\/2590296.2590303","relation":{},"subject":[],"published":{"date-parts":[[2014,6,4]]},"assertion":[{"value":"2014-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}