{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T09:00:18Z","timestamp":1775638818816,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,11,1]],"date-time":"2015-11-01T00:00:00Z","timestamp":1446336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1145\/2809695.2809723","type":"proceedings-article","created":{"date-parts":[[2015,11,2]],"date-time":"2015-11-02T18:33:30Z","timestamp":1446489210000},"page":"197-210","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":65,"title":["Talos"],"prefix":"10.1145","author":[{"given":"Hossein","family":"Shafagh","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Anwar","family":"Hithnawi","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Andreas","family":"Droescher","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Simon","family":"Duquennoy","sequence":"additional","affiliation":[{"name":"SICS Swedish ICT, Kista, Sweden"}]},{"given":"Wen","family":"Hu","sequence":"additional","affiliation":[{"name":"UNSW, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2015,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Spied on Chats, Gawker. Online: www.gawker.com\/5637234","author":"Chen A.","year":"2010","unstructured":"A. Chen . GCreep: Google Engineer Stalked Teens , Spied on Chats, Gawker. Online: www.gawker.com\/5637234 , 2010 . A. Chen. GCreep: Google Engineer Stalked Teens, Spied on Chats, Gawker. Online: www.gawker.com\/5637234, 2010."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_3_2_1_4_1","unstructured":"D. F. Aranha and C. P. L. Gouv\u00eaa. RELIC is an Efficient Library for Cryptography. Online: https:\/\/github.com\/relic-toolkit\/relic.  D. F. Aranha and C. P. L. Gouv\u00eaa. RELIC is an Efficient Library for Cryptography. Online: https:\/\/github.com\/relic-toolkit\/relic."},{"key":"e_1_3_2_1_5_1","volume-title":"Orthogonal Security with Cipherbase. In Conference on Innovative Data Systems Research (CIDR)","author":"Arasu A.","year":"2013","unstructured":"A. Arasu , S. Blanas , K. Eguro , R. Kaushik , D. Kossmann , R. Ramamurthy , and R. Venkatesan . Orthogonal Security with Cipherbase. In Conference on Innovative Data Systems Research (CIDR) , 2013 . A. Arasu, S. Blanas, K. Eguro, R. Kaushik, D. Kossmann, R. Ramamurthy, and R. Venkatesan. Orthogonal Security with Cipherbase. In Conference on Innovative Data Systems Research (CIDR), 2013."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989346"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1777777.1777820"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/3088723.3088749"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704155"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_19"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090264"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23241"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180440"},{"key":"e_1_3_2_1_17_1","volume-title":"Practical Techniques for Searches on Encrypted Data. In IEEE Symposium on Security and Privacy","author":"Song D. X.","year":"2000","unstructured":"D. X. Song , D. Wagner , and A. Perrig . Practical Techniques for Searches on Encrypted Data. In IEEE Symposium on Security and Privacy , 2000 . D. X. Song, D. Wagner, and A. Perrig. Practical Techniques for Searches on Encrypted Data. In IEEE Symposium on Security and Privacy, 2000."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_20_1","unstructured":"ETH Zurich. FlockLab: A Testbed for Distributed Synchronized Tracing and Profiling of Wireless Embedded Systems. Online: http:\/\/www.flocklab.ethz.ch\/.  ETH Zurich. FlockLab: A Testbed for Distributed Synchronized Tracing and Profiling of Wireless Embedded Systems. Online: http:\/\/www.flocklab.ethz.ch\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/13801"},{"key":"e_1_3_2_1_22_1","volume-title":"Very Large Data Bases (VLDB)","author":"Ge T.","year":"2007","unstructured":"T. Ge and S. Zdonik . Answering Aggregation Queries in a Secure System Model . In Very Large Data Bases (VLDB) , 2007 . T. Ge and S. Zdonik. Answering Aggregation Queries in a Secure System Model. In Very Large Data Bases (VLDB), 2007."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488678"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802212"},{"key":"e_1_3_2_1_29_1","unstructured":"Google Cloud Database. Security and Integration with Google Cloud. Online: https:\/\/cloud.google.com\/sql\/docs.  Google Cloud Database. Security and Integration with Google Cloud. Online: https:\/\/cloud.google.com\/sql\/docs."},{"key":"e_1_3_2_1_30_1","volume-title":"RFC 6749","author":"Hardt D.","year":"2012","unstructured":"D. Hardt . The OAuth 2.0 Authorization Framework . In RFC 6749 , 2012 . D. Hardt. The OAuth 2.0 Authorization Framework. In RFC 6749, 2012."},{"key":"e_1_3_2_1_31_1","unstructured":"Haris Z. Bajwa JD and Iltifat Husain MD. Health Apps can sell your data to insurance companies and there's nothing you can do about it. Online: http:\/\/www.imedicalapps.com\/2014\/08\/health-apps-insurance-companies\/ 2014.  Haris Z. Bajwa JD and Iltifat Husain MD. Health Apps can sell your data to insurance companies and there's nothing you can do about it. Online: http:\/\/www.imedicalapps.com\/2014\/08\/health-apps-insurance-companies\/ 2014."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866358"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00224-3_19"},{"key":"e_1_3_2_1_34_1","volume-title":"Applied Cryptography and Network Security (ACNS)","author":"Hu Y.","year":"2012","unstructured":"Y. Hu , W. J. Martin , and B. Sunar . Enhanced Flexibility for Homomorphic Encryption Schemes via CRT . In Applied Cryptography and Network Security (ACNS) , 2012 . Y. Hu, W. J. Martin, and B. Sunar. Enhanced Flexibility for Homomorphic Encryption Schemes via CRT. In Applied Cryptography and Network Security (ACNS), 2012."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2014.6990364"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.22"},{"key":"e_1_3_2_1_37_1","volume-title":"Workshop on Practice and Theory in Public-Key Cryptography","author":"Jurik I. Damg\u00e5","year":"1992","unstructured":"I. Damg\u00e5 rd and M. Jurik . A generalisation, a simplification and some applications of Pailliers probabilistic public-key system . In Workshop on Practice and Theory in Public-Key Cryptography , 1992 . I. Damg\u00e5 rd and M. Jurik. A generalisation, a simplification and some applications of Pailliers probabilistic public-key system. In Workshop on Practice and Theory in Public-Key Cryptography, 1992."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"e_1_3_2_1_39_1","volume-title":"FTC: Fitness Apps Can Help You Shred Calories -- and Privacy. Online: http:\/\/adage.com\/article\/privacy-and-regulation\/ftc-signals-focus-health-fitness-data-privacy\/293080\/","author":"Kaye Kate","year":"2014","unstructured":"Kate Kaye . FTC: Fitness Apps Can Help You Shred Calories -- and Privacy. Online: http:\/\/adage.com\/article\/privacy-and-regulation\/ftc-signals-focus-health-fitness-data-privacy\/293080\/ , 2014 . Kate Kaye. FTC: Fitness Apps Can Help You Shred Calories -- and Privacy. Online: http:\/\/adage.com\/article\/privacy-and-regulation\/ftc-signals-focus-health-fitness-data-privacy\/293080\/, 2014."},{"issue":"2","key":"e_1_3_2_1_40_1","first-page":"169","article-title":"Mapping an Arbitrary Message to an Elliptic Curve when Defined over GF(2n)","volume":"8","author":"King B.","year":"2009","unstructured":"B. King . Mapping an Arbitrary Message to an Elliptic Curve when Defined over GF(2n) . International Journal of Network Security , 8 ( 2 ): 169 -- 176 , 2009 . B. King. Mapping an Arbitrary Message to an Elliptic Curve when Defined over GF(2n). International Journal of Network Security, 8(2):169--176, 2009.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28169-3_7"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2461381.2461402"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1061318.1061322"},{"key":"e_1_3_2_1_47_1","volume-title":"The Design and Implementation of Datagram TLS. In Network and Distributed System Security Symposium (NDSS)","author":"Modadugu N.","year":"2004","unstructured":"N. Modadugu and E. Rescorla . The Design and Implementation of Datagram TLS. In Network and Distributed System Security Symposium (NDSS) , 2004 . N. Modadugu and E. Rescorla. The Design and Implementation of Datagram TLS. In Network and Distributed System Security Symposium (NDSS), 2004."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography","author":"Goldreich Oded","year":"2004","unstructured":"Oded Goldreich . Foundations of Cryptography : Volume 2 , Basic Applications. Cambridge University Press , 2004 . Oded Goldreich. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, 2004."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/1786014.1786040"},{"key":"e_1_3_2_1_50_1","volume-title":"EUROCRYPT","author":"Paillier P.","year":"1999","unstructured":"P. Paillier . Public-key Cryptosystems Based on Composite Degree Residuosity Classes . In EUROCRYPT , 1999 . P. Paillier. Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In EUROCRYPT, 1999."},{"key":"e_1_3_2_1_51_1","unstructured":"Privacy Rights Clearinghouse. Chronology of Data Breaches from 2005 to Present Date. Online: www.privacyrights.org\/data-breach.  Privacy Rights Clearinghouse. Chronology of Data Breaches from 2005 to Present Date. Online: www.privacyrights.org\/data-breach."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_54_1","volume-title":"Building Web Applications on Top of Encrypted Data Using Mylar. In USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Popa R. A.","year":"2014","unstructured":"R. A. Popa , E. Stark , S. Valdez , J. Helfer , N. Zeldovich , and H. Balakrishnan . Building Web Applications on Top of Encrypted Data Using Mylar. In USENIX Symposium on Networked Systems Design and Implementation (NSDI) , 2014 . R. A. Popa, E. Stark, S. Valdez, J. Helfer, N. Zeldovich, and H. Balakrishnan. Building Web Applications on Top of Encrypted Data Using Mylar. In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2014."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.38"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_28"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43936-4_20"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58108-1_24"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2795172"},{"key":"e_1_3_2_1_60_1","volume-title":"Advances in Cryptology (CRYPTO)","author":"Shamir A.","year":"1984","unstructured":"A. Shamir . Identity-based Cryptosystems and Signature Schemes . In Advances in Cryptology (CRYPTO) , 1984 . A. Shamir. Identity-based Cryptosystems and Signature Schemes. In Advances in Cryptology (CRYPTO), 1984."},{"key":"e_1_3_2_1_61_1","volume-title":"Genera. In Symposium Mathematical Society","author":"Shanks D.","year":"1971","unstructured":"D. Shanks . Class Number , a Theory of Factorization , and Genera. In Symposium Mathematical Society , 1971 . D. Shanks. Class Number, a Theory of Factorization, and Genera. In Symposium Mathematical Society, 1971."},{"key":"e_1_3_2_1_62_1","volume-title":"Cryptography and Network Security: Principles and Practice. Pearson Education","author":"Stallings W.","year":"2002","unstructured":"W. Stallings . Cryptography and Network Security: Principles and Practice. Pearson Education , 3 rd edition, 2002 . W. Stallings. Cryptography and Network Security: Principles and Practice. Pearson Education, 3rd edition, 2002.","edition":"3"},{"key":"e_1_3_2_1_63_1","volume-title":"CC2538 System-on-Chip for 2.4-GHz IEEE 802.15.4. Online: www.ti.com.cn\/cn\/lit\/ug\/swru319c\/swru319c.pdf","author":"Instruments Texas","year":"2013","unstructured":"Texas Instruments . CC2538 System-on-Chip for 2.4-GHz IEEE 802.15.4. Online: www.ti.com.cn\/cn\/lit\/ug\/swru319c\/swru319c.pdf , 2013 . Texas Instruments. CC2538 System-on-Chip for 2.4-GHz IEEE 802.15.4. Online: www.ti.com.cn\/cn\/lit\/ug\/swru319c\/swru319c.pdf, 2013."}],"event":{"name":"SenSys '15: The 13th ACM Conference on Embedded Network Sensor Systems","location":"Seoul South Korea","acronym":"SenSys '15","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2809695.2809723","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2809695.2809723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:34Z","timestamp":1750225414000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2809695.2809723"}},"subtitle":["Encrypted Query Processing for the Internet of Things"],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":60,"alternative-id":["10.1145\/2809695.2809723","10.1145\/2809695"],"URL":"https:\/\/doi.org\/10.1145\/2809695.2809723","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]},"assertion":[{"value":"2015-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}