{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:45:11Z","timestamp":1772725511488,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-14-1-0333"],"award-info":[{"award-number":["N00014-14-1-0333"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["EFMA-1441209,CNS-1010928"],"award-info":[{"award-number":["EFMA-1441209,CNS-1010928"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Mozilla Foundation"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978407","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T08:46:35Z","timestamp":1477385195000},"page":"1591-1601","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["A Protocol for Privately Reporting Ad Impressions at Scale"],"prefix":"10.1145","author":[{"given":"Matthew","family":"Green","sequence":"first","affiliation":[{"name":"Johns Hopkins University, Baltimore, MD, USA"}]},{"given":"Watson","family":"Ladd","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Ian","family":"Miers","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, Baltimore, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Brave web browser. https:\/\/www.brave.com\/."},{"key":"e_1_3_2_1_2_1","volume-title":"June","author":"National Broadband Map.","year":"2014","unstructured":"National Broadband Map. http:\/\/www.broadbandmap.gov\/summarize\/nationwide, June 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/metrics.torproject.org\/userstats-bridge-country.html?start=2015-2-14&end=2016-02-14&country=all","author":"Tor","year":"2016","unstructured":"Tor metrics -- bridge users by country. https:\/\/metrics.torproject.org\/userstats-bridge-country.html?start=2015-2-14&end=2016-02-14&country=all, 2016. Online; accessed 14 February 2016."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/metrics.torproject.org\/userstats-relay-country.html?start=2015-02-14&end=2016-02-14&country=all&events=off","author":"Tor","year":"2016","unstructured":"Tor metrics -- direct users by country. https:\/\/metrics.torproject.org\/userstats-relay-country.html?start=2015-02-14&end=2016-02-14&country=all&events=off, 2016. Online; accessed 14 February 2016."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/metrics.torproject.org\/bandwidth.html","author":"Tor","year":"2016","unstructured":"Tor metrics -- total relay bandwidth in the network. https:\/\/metrics.torproject.org\/bandwidth.html, 2016. Online; accessed 14 February 2016."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/metrics.torproject.org\/userstats-relay-country.html","author":"Tor","year":"2016","unstructured":"Tor metrics bridge users by country. https:\/\/metrics.torproject.org\/userstats-relay-country.html, 2016. Online; accessed 21 May 2016."},{"key":"e_1_3_2_1_7_1","volume-title":"The cost of ad blocking.","year":"2015","unstructured":"Adobe. The cost of ad blocking. Available at https:\/\/downloads.pagefair.com\/wp-content\/uploads\/2016\/05\/2015_report-the_cost_of_ad_blocking.pdf, 2015."},{"key":"e_1_3_2_1_8_1","unstructured":"Carlos Aguilar-Melchor Joris Barrier Laurent Fousse and Marc-Olivier Killijian. Xpir: Private information retrieval for everyone. Cryptology ePrint Archive Report 2014\/1025 2014. http:\/\/eprint.iacr.org\/."},{"key":"e_1_3_2_1_9_1","volume-title":"Trustzone: Integrated hardware and software security. ARM white paper, 3(4):18--24","author":"Alves Tiago","year":"2004","unstructured":"Tiago Alves and Don Felton. Trustzone: Integrated hardware and software security. ARM white paper, 3(4):18--24, 2004."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy","volume":"13","author":"Anati Ittai","year":"2013","unstructured":"Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. Innovative technology for cpu based attestation and sealing. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, volume 13, 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.25"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756169.1756194"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Daniel J. Bernstein and Tanja Lange. Computing small discrete logarithms faster. In Steven D. Galbraith and Mridul Nandi editors Progress In Cryptology-INDOCRYPT 2012 number 7668 in Lecture Notes in Computer Science pages 317--338. Springer December 2012.","DOI":"10.1007\/978-3-642-34931-7_19"},{"key":"e_1_3_2_1_14_1","volume-title":"September","author":"Brodkin Jon","year":"2014","unstructured":"Jon Brodkin. AT&T and Verizon defend data caps on home Internet service. http:\/\/arstechnica.com\/business\/2014\/09\/att-and-verizon-defend-data-caps-on-home-internet-service\/, September 2014."},{"key":"e_1_3_2_1_15_1","unstructured":"Jan Camenisch and Markus Stadler. Proof systems for general statements about discrete logarithms. Technical Report 260 Department of Computer Science ETH Zurich 1997."},{"key":"e_1_3_2_1_16_1","first-page":"53","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015","author":"Chanchary Farah","year":"2015","unstructured":"Farah Chanchary and Sonia Chiasson. User perceptions of sharing, advertising, and tracking. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), pages 53--67, Ottawa, July 2015. USENIX Association."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866346"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534780"},{"key":"e_1_3_2_1_19_1","volume-title":"A secure and optimally efficient multi-authority election scheme. European transactions on Telecommunications, 8(5):481--490","author":"Cramer Ronald","year":"1997","unstructured":"Ronald Cramer, Rosario Gennaro, and Berry Schoenmakers. A secure and optimally efficient multi-authority election scheme. European transactions on Telecommunications, 8(5):481--490, 1997."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830555"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.15"},{"key":"e_1_3_2_1_22_1","first-page":"389","volume-title":"Italy, May 9--12","author":"de Rooij Peter","year":"1994","unstructured":"Peter de Rooij. Advances in Cryptology -- EUROCRYPT'94: Workshop on the Theory and Application of Cryptographic Techniques Perugia, Italy, May 9--12, 1994 Proceedings, chapter Efficient exponentiation using precomputation and vector addition chains, pages 389--399. Springer Berlin Heidelberg, Berlin, Heidelberg, 1995."},{"key":"e_1_3_2_1_23_1","volume-title":"May","author":"Goldberg Rafi","year":"2013","unstructured":"Rafi Goldberg. Lack of trust in internet privacy and security may deter economic and other online activities privacy and security may deter economic and other online activities. Available at https:\/\/www.ntia.doc.gov\/blog\/2016\/lack-trust-internet-privacy-and-security-may-deter-economic-and-other-online-activities, May 2013."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_32"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_9"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046784"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/646139.680791"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894863.1894882"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2013.6488451"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653733"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/646140.680934"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028098"},{"key":"e_1_3_2_1_33_1","volume-title":"https:\/\/github.com\/floodyberry\/ed25519-donna","author":"Moon Andrew","year":"2014","unstructured":"Andrew Moon. Ed25519-donna. https:\/\/github.com\/floodyberry\/ed25519-donna, 2014."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180409"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1976.21"},{"key":"e_1_3_2_1_37_1","unstructured":"PricewaterhouseCoopers. Iab internet advertising revenue report. http:\/\/www.iab.com\/wp-content\/uploads\/2015\/05\/IAB_Internet_Advertising_Revenue_FY_2014.pdf."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_2"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/322217.322225"},{"key":"e_1_3_2_1_40_1","first-page":"127","volume-title":"NDSS","volume":"8","author":"Snader Robin","year":"2008","unstructured":"Robin Snader and Nikita Borisov. A tune-up for tor: Improving security and performance in the tor network. In NDSS, volume 8, page 127, 2008."},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings Network and Distributed System Symposium","author":"Toubiana Vincent","year":"2010","unstructured":"Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, and Solon Barocas. Adnostic: Privacy preserving targeted advertising. In Proceedings Network and Distributed System Symposium, 2010."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/2387880.2387898"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978407","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978407","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:24:12Z","timestamp":1763457852000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978407"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":42,"alternative-id":["10.1145\/2976749.2978407","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978407","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}