{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:40Z","timestamp":1750306720396,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,21]],"date-time":"2014-09-21T00:00:00Z","timestamp":1411257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,21]]},"DOI":"10.1145\/2642687.2642693","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"41-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Classification of technological privacy techniques for LTE-based public safety networks"],"prefix":"10.1145","author":[{"given":"Hamidreza","family":"Ghafghazi","sequence":"first","affiliation":[{"name":"University of Ottawa, Ottawa, ON, Canada"}]},{"given":"Amr","family":"El Mougy","sequence":"additional","affiliation":[{"name":"German University in Cairo, Cairo, Egypt"}]},{"given":"Hussein T.","family":"Mouftah","sequence":"additional","affiliation":[{"name":"University of Ottawa, Ottawa, ON, Canada"}]},{"given":"Carlisle","family":"Adams","sequence":"additional","affiliation":[{"name":"University of Ottawa, Ottawa, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2014,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6619579"},{"volume-title":"A technical overview.\" Motorola","year":"2007","key":"e_1_3_2_1_2_1","unstructured":"Motorola, \"Long term evolution (LTE) : A technical overview.\" Motorola , 2007 , Tech. Rep . {Online}. Available: http:\/\/www.motorola.com Motorola, \"Long term evolution (LTE): A technical overview.\" Motorola, 2007, Tech. Rep. {Online}. Available: http:\/\/www.motorola.com"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461193"},{"key":"e_1_3_2_1_4_1","first-page":"62","volume-title":"Security advances and challenges in 4G wireless networks,\" in Eighth Annual International Conference on Privacy Security and Trust (PST)","author":"Seddigh N.","year":"2010","unstructured":"N. Seddigh , B. Nandy , R. Makkar , and J. F. Beaumont , \" Security advances and challenges in 4G wireless networks,\" in Eighth Annual International Conference on Privacy Security and Trust (PST) , Ottawa, Canada , Aug 2010 , pp. 62 -- 71 . N. Seddigh, B. Nandy, R. Makkar, and J. F. Beaumont, \"Security advances and challenges in 4G wireless networks,\" in Eighth Annual International Conference on Privacy Security and Trust (PST), Ottawa, Canada, Aug 2010, pp. 62--71."},{"key":"e_1_3_2_1_5_1","first-page":"158","volume-title":"Belgrade","author":"Simic M.","year":"2012","unstructured":"M. Simic , \"Feasibility of long term evolution (LTE) as technology for public safety,\" in 20th IEEE Telecommunications Forum (TELFOR) , Belgrade , Serbia , Nov 2012 , pp. 158 -- 161 . M. Simic, \"Feasibility of long term evolution (LTE) as technology for public safety,\" in 20th IEEE Telecommunications Forum (TELFOR), Belgrade, Serbia, Nov 2012, pp. 158--161."},{"issue":"1","key":"e_1_3_2_1_6_1","first-page":"35","article-title":"A classification for privacy techniques","volume":"3","author":"Adams C.","year":"2006","unstructured":"C. Adams , \" A classification for privacy techniques ,\" University of Ottawa Law & Technology Journal , vol. 3 , no. 1 , pp. 35 -- 52 , 2006 . C. Adams, \"A classification for privacy techniques,\" University of Ottawa Law & Technology Journal, vol. 3, no. 1, pp. 35--52, 2006.","journal-title":"University of Ottawa Law & Technology Journal"},{"key":"e_1_3_2_1_7_1","unstructured":"www.citig.ca \"Industry Canada Minister Paradis \" March 2012. www.citig.ca \"Industry Canada Minister Paradis \" March 2012."},{"key":"e_1_3_2_1_8_1","volume-title":"Situational awareness in public safety networks,\" in the 5th Annual WiSense Workshop","author":"Mougy A. E.","year":"2013","unstructured":"A. E. Mougy and H. Mouftah , \" Situational awareness in public safety networks,\" in the 5th Annual WiSense Workshop , Ottawa, Canada , 2013 . A. E. Mougy and H. Mouftah, \"Situational awareness in public safety networks,\" in the 5th Annual WiSense Workshop, Ottawa, Canada, 2013."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.481"},{"volume-title":"r.s.c","year":"1985","key":"e_1_3_2_1_10_1","unstructured":"\"Privacy act\" , r.s.c . 1985 , c. p-21, \"http:\/\/laws.justice.gc.ca\/en\/p-21\/95414.html,\" Last Visited , May 2013. \"Privacy act\", r.s.c. 1985, c. p-21, \"http:\/\/laws.justice.gc.ca\/en\/p-21\/95414.html,\" Last Visited, May 2013."},{"key":"e_1_3_2_1_11_1","volume-title":"May","author":"S.C.","year":"2013","unstructured":"\"Personal information protection and electronic documents act\", S.C. 2000 , c. 5, \"http:\/\/laws.justice.gc.ca\/en\/p-8.6\/93196.html,\" Last Visited , May 2013 . \"Personal information protection and electronic documents act\", S.C. 2000, c. 5, \"http:\/\/laws.justice.gc.ca\/en\/p-8.6\/93196.html,\" Last Visited, May 2013."},{"key":"e_1_3_2_1_12_1","unstructured":"Wikipedia \"Personally identifiable information\" \"http:\/\/en.wikipedia.org\/wiki\/personally identifying information \" Last Visited May 2013. Wikipedia \"Personally identifiable information\" \"http:\/\/en.wikipedia.org\/wiki\/personally identifying information \" Last Visited May 2013."},{"key":"e_1_3_2_1_13_1","volume-title":"LTE and femtocells,\" in 2nd International Femtocell Workshop","author":"Bilogrevic I.","year":"2010","unstructured":"I. Bilogrevic , M. Jadliwala , and J.-P. Hubaux , \"Security issues in next generation mobile networks : LTE and femtocells,\" in 2nd International Femtocell Workshop , Luton, UK , no. EPFL-POSTER-149153, Luton, UK , 2010 . I. Bilogrevic, M. Jadliwala, and J.-P. Hubaux, \"Security issues in next generation mobile networks: LTE and femtocells,\" in 2nd International Femtocell Workshop, Luton, UK, no. EPFL-POSTER-149153, Luton, UK, 2010."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.136"},{"key":"e_1_3_2_1_15_1","first-page":"15","volume-title":"Enhancing privacy in lte paging system using physical layer identification,\" in Data Privacy Management and Autonomous Spontaneous Security","author":"Ta T.","year":"2013","unstructured":"T. Ta and J. S. Baras , \" Enhancing privacy in lte paging system using physical layer identification,\" in Data Privacy Management and Autonomous Spontaneous Security . Pisa, Italy : Springer , 2013 , pp. 15 -- 28 . T. Ta and J. S. Baras, \"Enhancing privacy in lte paging system using physical layer identification,\" in Data Privacy Management and Autonomous Spontaneous Security. Pisa, Italy: Springer, 2013, pp. 15--28."},{"key":"e_1_3_2_1_16_1","unstructured":"3GPP \"3GPP system architecture evolution (SAE); security architecture \" in TS 33.401 V9.7.0 2011. 3GPP \"3GPP system architecture evolution (SAE); security architecture \" in TS 33.401 V9.7.0 2011."},{"key":"e_1_3_2_1_17_1","unstructured":"3GPP \"Non-access-stratum (NAS) protocol for evolved packet system (EPS) \" TS 24.301 V9.11.0 2013. 3GPP \"Non-access-stratum (NAS) protocol for evolved packet system (EPS) \" TS 24.301 V9.11.0 2013."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_19_1","first-page":"41","volume-title":"USA: IEEE Computer Society","author":"Chor B.","year":"1995","unstructured":"B. Chor , O. Goldreich , E. Kushilevitz , and M. Sudan , \" Private information retrieval,\" in Proceedings of the 36th Annual Symposium on Foundations of Computer Science, ser. FOCS \"95. Washington, DC , USA: IEEE Computer Society , 1995 , pp. 41 -- 58 . B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, \"Private information retrieval,\" in Proceedings of the 36th Annual Symposium on Foundations of Computer Science, ser. FOCS \"95. Washington, DC, USA: IEEE Computer Society, 1995, pp. 41--58."},{"key":"e_1_3_2_1_20_1","first-page":"72","article-title":"A survey on private information retrieval","volume":"82","author":"Gasarch W.","year":"2004","unstructured":"W. Gasarch , \" A survey on private information retrieval ,\" Bulletin of the EATCS , vol. 82 , pp. 72 -- 107 , 2004 . W. Gasarch, \"A survey on private information retrieval,\" Bulletin of the EATCS, vol. 82, pp. 72--107, 2004.","journal-title":"Bulletin of the EATCS"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_13"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"A. Beimel Y. Ishai E. Kushilevitz and J.-F. Raymond \"Breaking the $o(n^1\/(2k-1))$ barrier for information-theoretic private information retrieval \" in The 43rd Annual IEEE Symposium on Foundations of Computer Science 2002 pp. 261--270. A. Beimel Y. Ishai E. Kushilevitz and J.-F. Raymond \"Breaking the $o(n^1\/(2k-1))$ barrier for information-theoretic private information retrieval \" in The 43rd Annual IEEE Symposium on Foundations of Computer Science 2002 pp. 261--270.","DOI":"10.1109\/SFCS.2002.1181949"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258609"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258606"},{"key":"e_1_3_2_1_25_1","first-page":"364","volume-title":"USA","author":"Kushilevitz E.","year":"1997","unstructured":"E. Kushilevitz and R. Ostrovsky , \" Replication is not needed: single database, computationally-private information retrieval,\" in 38th Annual Symposium on Foundations of Computer Science., Miami Beach, FL , USA , Oct 1997 , pp. 364 -- 373 . E. Kushilevitz and R. Ostrovsky, \"Replication is not needed: single database, computationally-private information retrieval,\" in 38th Annual Symposium on Foundations of Computer Science., Miami Beach, FL, USA, Oct 1997, pp. 364--373."},{"key":"e_1_3_2_1_26_1","volume-title":"On the computational practicality of private information retrieval,\" in In Proceedings of the Network and Distributed Systems Security Symposium","author":"Sion R.","year":"2007","unstructured":"R. Sion and B. Carbunar , \" On the computational practicality of private information retrieval,\" in In Proceedings of the Network and Distributed Systems Security Symposium , 2007 . R. Sion and B. Carbunar, \"On the computational practicality of private information retrieval,\" in In Proceedings of the Network and Distributed Systems Security Symposium, 2007."},{"key":"e_1_3_2_1_27_1","first-page":"50","volume-title":"A lattice-based computationally-efficient private information retrieval protocol,\" in Western European Workshop on Research in Cryptology (WEWoRC2007)","author":"Aguilar-Melchor C.","year":"2007","unstructured":"C. Aguilar-Melchor and P. Gaborit , \" A lattice-based computationally-efficient private information retrieval protocol,\" in Western European Workshop on Research in Cryptology (WEWoRC2007) , Bochum, Germany . Book of Abstracts. Citeseer , 2007 , pp. 50 -- 54 . C. Aguilar-Melchor and P. Gaborit, \"A lattice-based computationally-efficient private information retrieval protocol,\" in Western European Workshop on Research in Cryptology (WEWoRC2007), Bochum, Germany. Book of Abstracts. Citeseer, 2007, pp. 50--54."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516730"},{"key":"e_1_3_2_1_29_1","first-page":"225","volume-title":"Symmetrically private information retrieval,\" in Progress in Cryptology--INDOCRYPT","author":"Mishra S. K.","year":"2000","unstructured":"S. K. Mishra and P. Sarkar , \" Symmetrically private information retrieval,\" in Progress in Cryptology--INDOCRYPT 2000 . Springer , 2000, pp. 225 -- 236 . S. K. Mishra and P. Sarkar, \"Symmetrically private information retrieval,\" in Progress in Cryptology--INDOCRYPT 2000. Springer, 2000, pp. 225--236."},{"key":"e_1_3_2_1_30_1","first-page":"353","volume-title":"Highly-scalable searchable symmetric encryption with support for boolean queries,\" in Advances in Cryptology--CRYPTO","author":"Cash D.","year":"2013","unstructured":"D. Cash , S. Jarecki , C. Jutla , H. Krawczyk , M.-C. Ro\u015fu , and M. Steiner , \" Highly-scalable searchable symmetric encryption with support for boolean queries,\" in Advances in Cryptology--CRYPTO 2013 . Springer , 2013, pp. 353 -- 373 . D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Ro\u015fu, and M. Steiner, \"Highly-scalable searchable symmetric encryption with support for boolean queries,\" in Advances in Cryptology--CRYPTO 2013. Springer, 2013, pp. 353--373."},{"key":"e_1_3_2_1_31_1","volume-title":"Usable PIR,\" in NDSS","author":"Williams P.","year":"2008","unstructured":"P. Williams and R. Sion , \" Usable PIR,\" in NDSS . The Internet Society , 2008 . P. Williams and R. Sion, \"Usable PIR,\" in NDSS. The Internet Society, 2008."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765299.1765315"},{"key":"e_1_3_2_1_33_1","first-page":"162","volume-title":"An efficient and practical scheme for privacy protection in the e-commerce of digital goods,\" in Information Security and Cryptology--ICISC","author":"Bao F.","year":"2000","unstructured":"F. Bao , R. H. Deng , and P. Feng , \" An efficient and practical scheme for privacy protection in the e-commerce of digital goods,\" in Information Security and Cryptology--ICISC 2000 . Springer , 2001, pp. 162 -- 170 . F. Bao, R. H. Deng, and P. Feng, \"An efficient and practical scheme for privacy protection in the e-commerce of digital goods,\" in Information Security and Cryptology--ICISC 2000. Springer, 2001, pp. 162--170."},{"key":"e_1_3_2_1_34_1","first-page":"1","volume-title":"Networking and Mobile Computing (WiCOM)","author":"Xiehua L.","year":"2011","unstructured":"L. Xiehua and W. Yongjun , \" Security enhanced authentication and key agreement protocol for LTE\/SAE network,\" in 7th IEEE International Conference on Wireless Communications , Networking and Mobile Computing (WiCOM) , Wuhan, China , Sept 2011 , pp. 1 -- 4 . L. Xiehua and W. Yongjun, \"Security enhanced authentication and key agreement protocol for LTE\/SAE network,\" in 7th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Wuhan, China, Sept 2011, pp. 1--4."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.148"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644534"},{"key":"e_1_3_2_1_37_1","first-page":"333","volume-title":"the scrub system.\" in Proceedings of the AMIA Annual Fall Symposium","author":"Sweeney L.","year":"1996","unstructured":"L. Sweeney , \"Replacing personally-identifying information in medical records , the scrub system.\" in Proceedings of the AMIA Annual Fall Symposium . American Medical Informatics Association , 1996 , pp. 333 -- 337 . L. Sweeney, \"Replacing personally-identifying information in medical records, the scrub system.\" in Proceedings of the AMIA Annual Fall Symposium. American Medical Informatics Association, 1996, pp. 333--337."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956810"},{"key":"e_1_3_2_1_39_1","volume-title":"dissertation","author":"Gentry C.","year":"2009","unstructured":"C. Gentry , \" A fully homomorphic encryption scheme,\" Ph. D. dissertation , Stanford University , 2009 . C. Gentry, \"A fully homomorphic encryption scheme,\" Ph.D. dissertation, Stanford University, 2009."},{"key":"e_1_3_2_1_40_1","first-page":"369","article-title":"Oblivious polynomial evaluation and oblivious neural learning","author":"Chang Y.-C.","year":"2001","unstructured":"Y.-C. Chang and C.-J. Lu , \" Oblivious polynomial evaluation and oblivious neural learning ,\" in Advances in Cryptology--Asiacrypt 2001. Springer, 2001 , pp. 369 -- 384 . Y.-C. Chang and C.-J. Lu, \"Oblivious polynomial evaluation and oblivious neural learning,\" in Advances in Cryptology--Asiacrypt 2001. Springer, 2001, pp. 369--384.","journal-title":"Advances in Cryptology--Asiacrypt"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1983.1654444"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.110811.111240"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.23"}],"event":{"name":"MSWiM'14: 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Montreal QC Canada","acronym":"MSWiM'14"},"container-title":["Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642687.2642693","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2642687.2642693","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:31Z","timestamp":1750231171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642687.2642693"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,21]]},"references-count":45,"alternative-id":["10.1145\/2642687.2642693","10.1145\/2642687"],"URL":"https:\/\/doi.org\/10.1145\/2642687.2642693","relation":{},"subject":[],"published":{"date-parts":[[2014,9,21]]},"assertion":[{"value":"2014-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}