{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T23:57:31Z","timestamp":1769299051004,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/M029026\/1"],"award-info":[{"award-number":["EP\/M029026\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978404","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"168-179","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Transparency Overlays and Applications"],"prefix":"10.1145","author":[{"given":"Melissa","family":"Chase","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, USA"}]},{"given":"Sarah","family":"Meiklejohn","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"A.\n      Anagnostopoulos M. T.\n      Goodrich and \n      R.\n      Tamassia\n  . \n  Persistent authenticated dictionaries and their applications\n  . In G. I. Davida and Y. Frankel editors ISC \n  2001 volume \n  2200\n   of \n  LNCS pages \n  379\n  --\n  393 Malaga Spain Oct. 1--3 2001. \n  Springer Berlin Germany.   A. Anagnostopoulos M. T. Goodrich and R. Tamassia. Persistent authenticated dictionaries and their applications. In G. I. Davida and Y. Frankel editors ISC 2001 volume 2200 of LNCS pages 379--393 Malaga Spain Oct. 1--3 2001. Springer Berlin Germany.","DOI":"10.1007\/3-540-45439-X_26"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48000-7_19"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.35"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660298"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_23"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"J. C.\n      Benaloh\n     and \n      M.\n      de Mare\n    .\n  One-way accumulators: A decentralized alternative to digital sinatures (extended abstract)\n  . In T. Helleseth editor EUROCRYPT'93 volume \n  765\n   of \n  LNCS pages \n  274\n  --\n  285 Lofthus Norway May 23--27 1993\n  . \n  Springer Berlin Germany.   J. C. Benaloh and M. de Mare. One-way accumulators: A decentralized alternative to digital sinatures (extended abstract). In T. Helleseth editor EUROCRYPT'93 volume 765 of LNCS pages 274--285 Lofthus Norway May 23--27 1993. Springer Berlin Germany.","DOI":"10.1007\/3-540-48285-7_24"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"I.\n      Bentov\n     and \n      R.\n      Kumaresan\n  . \n  How to use bitcoin to design fair protocols\n  . In J. A. Garay and R. Gennaro editors CRYPTO \n  2014 Part II volume \n  8617\n   of \n  LNCS pages \n  421\n  --\n  439 Santa Barbara CA USA Aug. 17--21 2014. \n  Springer Berlin Germany.  I. Bentov and R. Kumaresan. How to use bitcoin to design fair protocols. In J. A. Garay and R. Gennaro editors CRYPTO 2014 Part II volume 8617 of LNCS pages 421--439 Santa Barbara CA USA Aug. 17--21 2014. Springer Berlin Germany.","DOI":"10.1007\/978-3-662-44381-1_24"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"e_1_3_2_1_10_1","volume-title":"Mar.","author":"Bright P.","year":"2011","unstructured":"P. Bright . Independent Iranian hacker claims responsibility for Comodo hack , Mar. 2011 . P. Bright. Independent Iranian hacker claims responsibility for Comodo hack, Mar. 2011."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_27"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"J.\n      Camenisch\n     and \n      A.\n      Lysyanskaya\n  . \n  Dynamic accumulators and application to efficient revocation of anonymous credentials\n  . In M. Yung editor CRYPTO \n  2002 volume \n  2442\n   of \n  LNCS pages \n  61\n  --\n  76 Santa Barbara CA USA Aug. 18--22 2002. \n  Springer Berlin Germany.   J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In M. Yung editor CRYPTO 2002 volume 2442 of LNCS pages 61--76 Santa Barbara CA USA Aug. 18--22 2002. Springer Berlin Germany.","DOI":"10.1007\/3-540-45708-9_5"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855768.1855788"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23187"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_8"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23253"},{"key":"e_1_3_2_1_19_1","volume-title":"Aug.","author":"Goodin D.","year":"2011","unstructured":"D. Goodin . Fraudulent Google credential found in the wild , Aug. 2011 . D. Goodin. Fraudulent Google credential found in the wild, Aug. 2011."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488448"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6962"},{"key":"e_1_3_2_1_22_1","volume-title":"Sept.","author":"Leyden J.","year":"2011","unstructured":"J. Leyden . Inside 'Operation Black Tulip': DigiNotar hack analysed , Sept. 2011 . J. Leyden. Inside 'Operation Black Tulip': DigiNotar hack analysed, Sept. 2011."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31284-7_14"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of USENIX Security 2015","author":"Melara M. S.","year":"2015","unstructured":"M. S. Melara , A. Blankstein , J. Bonneau , E. W. Felten , and M. J. Freedman . CONIKS: Bringing key transparency to end users . In Proceedings of USENIX Security 2015 , 2015 . M. S. Melara, A. Blankstein, J. Bonneau, E. W. Felten, and M. J. Freedman. CONIKS: Bringing key transparency to end users. In Proceedings of USENIX Security 2015, 2015."},{"key":"e_1_3_2_1_25_1","volume-title":"Feb.","author":"Menn J.","year":"2012","unstructured":"J. Menn . Key Internet operator VeriSign hit by hackers , Feb. 2012 . J. Menn. Key Internet operator VeriSign hit by hackers, Feb. 2012."},{"key":"e_1_3_2_1_26_1","series-title":"LNCS","first-page":"218","volume-title":"CRYPTO'89","author":"Merkle R. C.","year":"1989","unstructured":"R. C. Merkle . A certified digital signature. In G. Brassard, editor, CRYPTO'89 , volume 435 of LNCS , pages 218 -- 238 , Santa Barbara, CA , USA, Aug. 20--24, 1989 . Springer , Berlin, Germany. R. C. Merkle. A certified digital signature. In G. Brassard, editor, CRYPTO'89, volume 435 of LNCS, pages 218--238, Santa Barbara, CA, USA, Aug. 20--24, 1989. Springer, Berlin, Germany."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535851"},{"key":"e_1_3_2_1_28_1","volume-title":"A Peer-to-Peer Electronic Cash System","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto . Bitcoin : A Peer-to-Peer Electronic Cash System , 2008 . bitcoin.org\/bitcoin.pdf. S. Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System, 2008. bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_29_1","volume-title":"May","year":"2015","unstructured":"Nasdaq. Nasdaq launches enterprise-wide blockchain technology initiative , May 2015 . Nasdaq. Nasdaq launches enterprise-wide blockchain technology initiative, May 2015."},{"key":"e_1_3_2_1_30_1","volume-title":"Nov.","author":"O'Leary D.","year":"2013","unstructured":"D. O'Leary , V. D'Agostino , S. R. Re , J. Burney , and A. Hoffman . Method and system for processing Internet payments using the electronic funds transfer network , Nov. 2013 . D. O'Leary, V. D'Agostino, S. R. Re, J. Burney, and A. Hoffman. Method and system for processing Internet payments using the electronic funds transfer network, Nov. 2013."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"C.\n      Papamanthou E.\n      Shi R.\n      Tamassia and \n      K.\n      Yi\n  . \n  Streaming authenticated data structures\n  . In T. Johansson and P. Q. Nguyen editors EUROCRYPT \n  2013 volume \n  7881\n   of \n  LNCS pages \n  353\n  --\n  370 Athens Greece May 26--30 2013. \n  Springer Berlin Germany.  C. Papamanthou E. Shi R. Tamassia and K. Yi. Streaming authenticated data structures. In T. Johansson and P. Q. Nguyen editors EUROCRYPT 2013 volume 7881 of LNCS pages 353--370 Athens Greece May 26--30 2013. Springer Berlin Germany.","DOI":"10.1007\/978-3-642-38348-9_22"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455826"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23379"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978404","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:15Z","timestamp":1750218015000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978404"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":32,"alternative-id":["10.1145\/2976749.2978404","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978404","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}