{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:23Z","timestamp":1750221323025,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,9,27]],"date-time":"2017-09-27T00:00:00Z","timestamp":1506470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1649583,1717065"],"award-info":[{"award-number":["1649583,1717065"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,9,27]]},"DOI":"10.1145\/3132190.3132206","type":"proceedings-article","created":{"date-parts":[[2017,9,15]],"date-time":"2017-09-15T12:21:06Z","timestamp":1505478066000},"page":"60-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Querying Invisible Objects"],"prefix":"10.1145","author":[{"given":"Yin","family":"Liu","sequence":"first","affiliation":[{"name":"Software Innovations Lab, Virginia Tech"}]},{"given":"Zheng","family":"Song","sequence":"additional","affiliation":[{"name":"Software Innovations Lab, Virginia Tech"}]},{"given":"Eli","family":"Tilevich","sequence":"additional","affiliation":[{"name":"Software Innovations Lab, Virginia Tech"}]}],"member":"320","published-online":{"date-parts":[[2017,9,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Christian Cachin. 1997. Entropy measures and unconditional security in cryptography. Ph.D. Dissertation. Swiss Federal Institute of Technology in Zurich.  Christian Cachin. 1997. Entropy measures and unconditional security in cryptography. Ph.D. Dissertation. Swiss Federal Institute of Technology in Zurich."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002168.2002175"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_6_1","unstructured":"Ira R Forman and Nate Forman. 2004. Java Reflection in Action (In Action series). (2004).   Ira R Forman and Nate Forman. 2004. Java Reflection in Action (In Action series). (2004)."},{"volume-title":"Theory and Practice of Differential Privacy.","author":"Gaboardi Marco","key":"e_1_3_2_1_7_1"},{"volume-title":"USENIX Security Symposium. 299--316","year":"2009","author":"Geambasu Roxana","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Li Gong and Gary Ellison. 2003. Inside Java (TM) 2 Platform Security: Architecture API Design and Implementation. Pearson Education.   Li Gong and Gary Ellison. 2003. Inside Java (TM) 2 Platform Security: Architecture API Design and Implementation. Pearson Education."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/979922.979963"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v4i1.610"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.29"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2578855.2535851"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"e_1_3_2_1_16_1","unstructured":"Secure Hash Standard. 2002. FIPS PUB 180--2. National Institute of Standards and Technology (2002).  Secure Hash Standard. 2002. FIPS PUB 180--2. National Institute of Standards and Technology (2002)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2013.6913208"},{"key":"e_1_3_2_1_18_1","unstructured":"Scott Wolchok Owen S Hofmann Nadia Heninger Edward W Felten J Alex Halderman Christopher J Rossbach Brent Waters and Emmett Witchel. 2010. Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.. In NDSS.  Scott Wolchok Owen S Hofmann Nadia Heninger Edward W Felten J Alex Halderman Christopher J Rossbach Brent Waters and Emmett Witchel. 2010. Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.. In NDSS."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.and.EUC.2013.18"},{"key":"e_1_3_2_1_20_1","unstructured":"Yang Yang Chenhao Tan Zongtao Liu Fei Wu and Yueting Zhuang. 2017. Urban Dreams of Migrants: A Case Study of Migrant Integration in Shanghai. arXiv preprint arXiv:1706.00682 (2017).  Yang Yang Chenhao Tan Zongtao Liu Fei Wu and Yueting Zhuang. 2017. Urban Dreams of Migrants: A Case Study of Migrant Integration in Shanghai. arXiv preprint arXiv:1706.00682 (2017)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2010.104"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.21"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009884"}],"event":{"name":"ManLang 2017: 14th International Conference on Managed Languages and Runtimes","sponsor":["Charles University Charles University","SIGAPP ACM Special Interest Group on Applied Computing","SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Prague Czech Republic","acronym":"ManLang 2017"},"container-title":["Proceedings of the 14th International Conference on Managed Languages and Runtimes"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132190.3132206","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132190.3132206","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132190.3132206","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:56Z","timestamp":1750212836000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132190.3132206"}},"subtitle":["Supporting Data-Driven, Privacy-Preserving Distributed Applications"],"short-title":[],"issued":{"date-parts":[[2017,9,27]]},"references-count":23,"alternative-id":["10.1145\/3132190.3132206","10.1145\/3132190"],"URL":"https:\/\/doi.org\/10.1145\/3132190.3132206","relation":{},"subject":[],"published":{"date-parts":[[2017,9,27]]},"assertion":[{"value":"2017-09-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}