{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:53Z","timestamp":1750306673552,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T00:00:00Z","timestamp":1406505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,7,28]]},"DOI":"10.1145\/2637113.2637119","type":"proceedings-article","created":{"date-parts":[[2014,7,22]],"date-time":"2014-07-22T15:08:30Z","timestamp":1406041710000},"page":"53-65","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Domain-Polymorphic Programming of Privacy-Preserving Applications"],"prefix":"10.1145","author":[{"given":"Dan","family":"Bogdanov","sequence":"first","affiliation":[{"name":"Cybernetica AS"}]},{"given":"Peeter","family":"Laud","sequence":"additional","affiliation":[{"name":"Cybernetica AS"}]},{"given":"Jaak","family":"Randmets","sequence":"additional","affiliation":[{"name":"Cybernetica AS"}]}],"member":"320","published-online":{"date-parts":[[2014,7,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"volume-title":"Y.: Fairplay - Secure Two-Party Computation System. In: Proceedings of the 13th USENIX Security Symposium. USENIX'04, USENIX (2004)","author":"Malkhi D.","key":"e_1_3_2_1_2_1","unstructured":"Malkhi , D. , Nisan , N. , Pinkas , B. , Sella , Y.: Fairplay - Secure Two-Party Computation System. In: Proceedings of the 13th USENIX Security Symposium. USENIX'04, USENIX (2004) 287--302 Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - Secure Two-Party Computation System. In: Proceedings of the 13th USENIX Security Symposium. USENIX'04, USENIX (2004) 287--302"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866358"},{"volume-title":"A.: Automatic Protocol Selection in Secure Two-Party Computations. In: 20th Network and Distributed System Security Symposium (NDSS). (2013)","author":"Kerschbaum F.","key":"e_1_3_2_1_6_1","unstructured":"Kerschbaum , F. , Schneider , T. , Schr\u00f6pfer , A.: Automatic Protocol Selection in Secure Two-Party Computations. In: 20th Network and Distributed System Security Symposium (NDSS). (2013) Kerschbaum, F., Schneider, T., Schr\u00f6pfer, A.: Automatic Protocol Selection in Secure Two-Party Computations. In: 20th Network and Distributed System Security Symposium (NDSS). (2013)"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_1_8_1","volume-title":"SecreC: a Privacy-Aware Programming Language with Applications in Data Mining. Master's thesis","author":"Jagom\u00e4gis R.","year":"2010","unstructured":"Jagom\u00e4gis , R. : SecreC: a Privacy-Aware Programming Language with Applications in Data Mining. Master's thesis , Institute of Computer Science , University of Tartu ( 2010 ) Jagom\u00e4gis, R.: SecreC: a Privacy-Aware Programming Language with Applications in Data Mining. Master's thesis, Institute of Computer Science, University of Tartu (2010)"},{"key":"e_1_3_2_1_9_1","volume-title":"An analysis framework for an imperative privacy-preserving programming language. Master's thesis","author":"Ristioja J.","year":"2010","unstructured":"Ristioja , J. : An analysis framework for an imperative privacy-preserving programming language. Master's thesis , Institute of Computer Science , University of Tartu ( 2010 ) Ristioja, J.: An analysis framework for an imperative privacy-preserving programming language. Master's thesis, Institute of Computer Science, University of Tartu (2010)"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1255329.1255333"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2011.46"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.46"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.48"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517872.2517874"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.30"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382278"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509554"},{"volume-title":"IEEE Symposium on Security and Privacy, IEEE Computer Society (1998)","author":"Myers A.C.","key":"e_1_3_2_1_19_1","unstructured":"Myers , A.C. , Liskov , B. : Complete, safe information flow with decentralized labels . In: IEEE Symposium on Security and Privacy, IEEE Computer Society (1998) 186--197 Myers, A.C., Liskov, B.: Complete, safe information flow with decentralized labels. In: IEEE Symposium on Security and Privacy, IEEE Computer Society (1998) 186--197"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503302"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.13"},{"volume-title":"Proceedings of the 42nd Annual Symposium on Foundations of Computer Science. FOCS'01, IEEE Computer Society (2001)","author":"Canetti R.","key":"e_1_3_2_1_22_1","unstructured":"Canetti , R. : Universally composable security: A new paradigm for cryptographic protocols . In: Proceedings of the 42nd Annual Symposium on Foundations of Computer Science. FOCS'01, IEEE Computer Society (2001) 136--145 Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: Proceedings of the 42nd Annual Symposium on Foundations of Computer Science. FOCS'01, IEEE Computer Society (2001) 136--145"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"e_1_3_2_1_24_1","series-title":"Lecture Notes in Computer Science","volume-title":"N.P.","author":"Damg\u00e5rd I.","year":"2012","unstructured":"Damg\u00e5rd , I. , Pastro , V. , Smart , N.P. , Zakarias, S. : Multiparty computation from somewhat homomorphic encryption. In Safavi-Naini, R., Canetti, R., eds.: Proceedings of the 32nd Annual Cryptology Conference. CRYPTO'12. Volume 7417 of Lecture Notes in Computer Science ., Springer ( 2012 ) 643--662 Damg\u00e5rd, I., Pastro, V., Smart, N.P., Zakarias, S.: Multiparty computation from somewhat homomorphic encryption. In Safavi-Naini, R., Canetti, R., eds.: Proceedings of the 32nd Annual Cryptology Conference. CRYPTO'12. Volume 7417 of Lecture Notes in Computer Science., Springer (2012) 643--662"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0177-2"},{"volume-title":"B.: Round-Efficient Oblivious Database Manipulation. In: Proceedings of the 14th International Conference on Information Security. ISC'11. (2011)","author":"Laur S.","key":"e_1_3_2_1_26_1","unstructured":"Laur , S. , Willemson , J. , Zhang , B.: Round-Efficient Oblivious Database Manipulation. In: Proceedings of the 14th International Conference on Information Security. ISC'11. (2011) 262--277 Laur, S., Willemson, J., Zhang, B.: Round-Efficient Oblivious Database Manipulation. In: Proceedings of the 14th International Conference on Information Security. ISC'11. (2011) 262--277"},{"key":"e_1_3_2_1_27_1","series-title":"Lecture Notes in Computer Science","volume-title":"Nielsen","author":"Damg\u00e5rd I.","year":"2003","unstructured":"Damg\u00e5rd , I. , Nielsen , J.B. : Universally composable efficient multiparty computation from threshold homomorphic encryption. In Boneh, D., ed.: CRYPTO. Volume 2729 of Lecture Notes in Computer Science ., Springer ( 2003 ) 247--264 Damg\u00e5rd, I., Nielsen, J.B.: Universally composable efficient multiparty computation from threshold homomorphic encryption. In Boneh, D., ed.: CRYPTO. Volume 2729 of Lecture Notes in Computer Science., Springer (2003) 247--264"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/277697.277716"},{"key":"e_1_3_2_1_32_1","volume-title":"8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings.","volume":"2727","author":"Damg\u00e5rd I.","year":"2003","unstructured":"Damg\u00e5rd , I. , Jurik , M. : A Length-Flexible Threshold Cryptosystem with Applications. In Safavi-Naini, R., Seberry, J., eds.: Information Security and Privacy , 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings. Volume 2727 of Lecture Notes in Computer Science., Springer ( 2003 ) 350--364 Damg\u00e5rd, I., Jurik, M.: A Length-Flexible Threshold Cryptosystem with Applications. In Safavi-Naini, R., Seberry, J., eds.: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings. Volume 2727 of Lecture Notes in Computer Science., Springer (2003) 350--364"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_34_1","series-title":"Lecture Notes in Computer Science","volume-title":"Paskin","author":"Ishai Y.","year":"2007","unstructured":"Ishai , Y. , Paskin , A. : Evaluating Branching Programs on Encrypted Data. In Vadhan, S.P., ed.: TCC. Volume 4392 of Lecture Notes in Computer Science ., Springer ( 2007 ) 575--594 Ishai, Y., Paskin, A.: Evaluating Branching Programs on Encrypted Data. In Vadhan, S.P., ed.: TCC. Volume 4392 of Lecture Notes in Computer Science., Springer (2007) 575--594"},{"volume-title":"Data representations in secure multi-party computations (2012) Seminar in cryptography","author":"Pullonen P.","key":"e_1_3_2_1_35_1","unstructured":"Pullonen , P. : Data representations in secure multi-party computations (2012) Seminar in cryptography , University of Tartu . Pullonen, P.: Data representations in secure multi-party computations (2012) Seminar in cryptography, University of Tartu."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.22"},{"key":"e_1_3_2_1_37_1","first-page":"371","volume":"201","author":"Bogdanov D.","year":"2013","unstructured":"Bogdanov , D. , Laud , P. , Randmets , J. : Domain-Polymorphic Programming of Privacy-Preserving Applications. Cryptology ePrint Archive , Report 201 3\/ 371 ( 2013 ) http:\/\/eprint.iacr.org\/. Bogdanov, D., Laud, P., Randmets, J.: Domain-Polymorphic Programming of Privacy-Preserving Applications. Cryptology ePrint Archive, Report 2013\/371 (2013) http:\/\/eprint.iacr.org\/.","journal-title":"Report"},{"key":"e_1_3_2_1_39_1","first-page":"850","volume":"201","author":"Kamm L.","year":"2013","unstructured":"Kamm , L. , Willemson , J. : Secure Floating-Point Arithmetic and Private Satellite Collision Analysis. Cryptology ePrint Archive , Report 201 3\/ 850 ( 2013 ) http:\/\/eprint.iacr.org\/. Kamm, L., Willemson, J.: Secure Floating-Point Arithmetic and Private Satellite Collision Analysis. Cryptology ePrint Archive, Report 2013\/850 (2013) http:\/\/eprint.iacr.org\/.","journal-title":"Report"},{"key":"e_1_3_2_1_41_1","first-page":"826","volume":"201","author":"Bogdanov D.","year":"2013","unstructured":"Bogdanov , D. , Kamm , L. , Laur , S. , Pruulmann-Vengerfeldt , P. : Secure multiparty data analysis: end user validation and practical experiments. Cryptology ePrint Archive , Report 201 3\/ 826 ( 2013 ) http:\/\/eprint.iacr.org\/. Bogdanov, D., Kamm, L., Laur, S., Pruulmann-Vengerfeldt, P.: Secure multiparty data analysis: end user validation and practical experiments. Cryptology ePrint Archive, Report 2013\/826 (2013) http:\/\/eprint.iacr.org\/.","journal-title":"Report"}],"event":{"name":"ECOOP '14: European Conference on Object-Oriented Programming","sponsor":["Uppsala University, Department of Information Science Uppsala University, Department of Information Science","SIGPLAN ACM Special Interest Group on Programming Languages","SIGSOFT ACM Special Interest Group on Software Engineering","AITO Assoc Internationale por les Technologies Objects"],"location":"Uppsala Sweden","acronym":"ECOOP '14"},"container-title":["Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2637113.2637119","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2637113.2637119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:00:55Z","timestamp":1750230055000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2637113.2637119"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,28]]},"references-count":37,"alternative-id":["10.1145\/2637113.2637119","10.1145\/2637113"],"URL":"https:\/\/doi.org\/10.1145\/2637113.2637119","relation":{},"subject":[],"published":{"date-parts":[[2014,7,28]]},"assertion":[{"value":"2014-07-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}