{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:25Z","timestamp":1750221325797,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100011403","name":"GCHQ","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100011403","id-type":"DOI","asserted-by":"publisher"}]},{"name":"EPSRC","award":["EP\/M013286\/1"],"award-info":[{"award-number":["EP\/M013286\/1"]}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["653497"],"award-info":[{"award-number":["653497"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Israeli Ministry of Science and Technology"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3139550.3139566","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T12:31:37Z","timestamp":1509453097000},"page":"5-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["AnNotify"],"prefix":"10.1145","author":[{"given":"Ania M.","family":"Piotrowska","sequence":"first","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Jamie","family":"Hayes","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Nethanel","family":"Gelernter","sequence":"additional","affiliation":[{"name":"College of Management, Academic Studies, Rishon LeTsiyon, Israel"}]},{"given":"George","family":"Danezis","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Amir","family":"Herzberg","sequence":"additional","affiliation":[{"name":"Bar Ilan Universit, Tel Aviv, Israel &amp; University of Connecticut, Storrs, CT, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"BBC 2014. \"Yo app warns Israeli citizens of missile strikes\". Online. (July 2014).  BBC 2014. \"Yo app warns Israeli citizens of missile strikes\". Online. (July 2014)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33627-0"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"#cr-split#-e_1_3_2_1_4_1.1","doi-asserted-by":"crossref","unstructured":"F. Bonomi M. Mitzenmacher R. Panigrahy S. Singh and G. Varghese. 2006. An Improved Construction for Counting Bloom Filters Algorithms - ESA. UK. https:\/\/doi.org\/10.1007\/11841036_61 10.1007\/11841036_61","DOI":"10.1007\/11841036_61"},{"key":"#cr-split#-e_1_3_2_1_4_1.2","doi-asserted-by":"crossref","unstructured":"F. Bonomi M. Mitzenmacher R. Panigrahy S. Singh and G. Varghese. 2006. An Improved Construction for Counting Bloom Filters Algorithms - ESA. UK. https:\/\/doi.org\/10.1007\/11841036_61","DOI":"10.1007\/11841036_61"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0008"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129096"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872787"},{"key":"e_1_3_2_1_10_1","volume-title":"Sphinx: A Compact and Provably Secure Mix Format 30th IEEE Symposium on Security and Privacy (S&P 2009)","author":"Danezis George","year":"2009","unstructured":"George Danezis and Ian Goldberg . 2009 . Sphinx: A Compact and Provably Secure Mix Format 30th IEEE Symposium on Security and Privacy (S&P 2009) , 17-20 May 2009, Oakland, California, USA. 269--282. George Danezis and Ian Goldberg. 2009. Sphinx: A Compact and Provably Secure Mix Format 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May 2009, Oakland, California, USA. 269--282."},{"key":"e_1_3_2_1_11_1","unstructured":"C. Devet I. Goldberg and N. Heninger. 2012. Optimally robust private information retrieval. In USENIX Security 12. 269--283.  C. Devet I. Goldberg and N. Heninger. 2012. Optimally robust private information retrieval. In USENIX Security 12. 269--283."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"C. Dwork. 2006. Differential Privacy. ICALP (2006).  C. Dwork. 2006. Differential Privacy. ICALP (2006).","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_14_1","volume-title":"RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response CCS. ACM, USA, 1054--1067. https:\/\/doi.org\/10.1145\/2660267.2660348","author":"Pihur V.","year":"2014","unstructured":"\u00da. Erlingsson, V. Pihur , and A. Korolova . 2014 . RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response CCS. ACM, USA, 1054--1067. https:\/\/doi.org\/10.1145\/2660267.2660348 10.1145\/2660267.2660348 \u00da. Erlingsson, V. Pihur, and A. Korolova. 2014. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response CCS. ACM, USA, 1054--1067. https:\/\/doi.org\/10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.851975"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2"},{"volume-title":"An introduction to probability theory and its applications","author":"Feller William","key":"e_1_3_2_1_17_1","unstructured":"William Feller . 1968. An introduction to probability theory and its applications : volume I . Vol. 3. John Wiley & Sons New York . William Feller. 1968. An introduction to probability theory and its applications: volume I. Vol. 3. John Wiley & Sons New York."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.09.003"},{"key":"e_1_3_2_1_19_1","unstructured":"T. Gerbet A. Kumar and C. Lauradoux. 2015. A Privacy Analysis of Google and Yandex Safe Browsing. Technical Report Research Report RR-8686. INRIA. https:\/\/hal.inria.fr\/hal-01120186v4.  T. Gerbet A. Kumar and C. Lauradoux. 2015. A Privacy Analysis of Google and Yandex Safe Browsing. Technical Report Research Report RR-8686. INRIA. https:\/\/hal.inria.fr\/hal-01120186v4."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.23"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"volume-title":"Google Transparency Report - Making the web safer. (June","year":"2014","key":"e_1_3_2_1_22_1","unstructured":"Google. 2014. Google Transparency Report - Making the web safer. (June 2014 ). Google. 2014. Google Transparency Report - Making the web safer. (June 2014)."},{"volume-title":"Introduction to modern cryptography","author":"Katz Jonathan","key":"e_1_3_2_1_23_1","unstructured":"Jonathan Katz and Yehuda Lindell . 2014. Introduction to modern cryptography . CRC press . Jonathan Katz and Yehuda Lindell. 2014. Introduction to modern cryptography. CRC press."},{"key":"e_1_3_2_1_24_1","unstructured":"B. Laurie. 2004. Apres-a system for anonymous presence. (2004).  B. Laurie. 2004. Apres-a system for anonymous presence. (2004)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2010.5569976"},{"volume-title":"Conference on Computer and Communications Security (CCS '98)","author":"Mazi\u00e8res D.","key":"e_1_3_2_1_26_1","unstructured":"D. Mazi\u00e8res and M. F. Kaashoek . 1998. The Design, Implementation and Operation of an Email Pseudonym Server . In Conference on Computer and Communications Security (CCS '98) . 27--36. https:\/\/doi.org\/10.1145\/288090.288098. 10.1145\/288090.288098 D. Mazi\u00e8res and M. F. Kaashoek. 1998. The Design, Implementation and Operation of an Email Pseudonym Server. In Conference on Computer and Communications Security (CCS '98). 27--36. https:\/\/doi.org\/10.1145\/288090.288098."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22424-9"},{"key":"e_1_3_2_1_28_1","volume-title":"The Loopix Anonymity System. USENIX Security Symposium","author":"Piotrowska Ania M.","year":"2017","unstructured":"Ania M. Piotrowska , Jamie Hayes , Tariq Elahi , Sebastian Meiser , and George Danezis . 2017 . The Loopix Anonymity System. USENIX Security Symposium (2017). https:\/\/github.com\/UCL-InfoSec\/loopix. Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, and George Danezis. 2017. The Loopix Anonymity System. USENIX Security Symposium (2017). https:\/\/github.com\/UCL-InfoSec\/loopix."},{"key":"e_1_3_2_1_29_1","volume-title":"https:\/\/metrics.torproject.org\/. (April","author":"Tor Metrics The Tor","year":"2016","unstructured":"The Tor project. 2016. Tor Metrics . https:\/\/metrics.torproject.org\/. (April 2016 ). The Tor project. 2016. Tor Metrics. https:\/\/metrics.torproject.org\/. (April 2016)."},{"key":"e_1_3_2_1_30_1","unstructured":"C. E. Rothenberg C. Macapuna F. L. Verdi and M. F. Magalh\u00e3es. 2010. The Deletable Bloom filter: A new member of the Bloom family. CoRR abs\/1005.0352 (2010). http:\/\/arxiv.org\/abs\/1005.0352.  C. E. Rothenberg C. Macapuna F. L. Verdi and M. F. Magalh\u00e3es. 2010. The Deletable Bloom filter: A new member of the Bloom family. CoRR abs\/1005.0352 (2010). http:\/\/arxiv.org\/abs\/1005.0352."},{"volume-title":"Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (WPES '05)","author":"Sassaman L.","key":"e_1_3_2_1_31_1","unstructured":"L. Sassaman , B. Cohen , and N. Mathewson . 2005. The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval . In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (WPES '05) . 1--9. https:\/\/doi.org\/10.1145\/1102199.1102201. 10.1145\/1102199.1102201 L. Sassaman, B. Cohen, and N. Mathewson. 2005. The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (WPES '05). 1--9. https:\/\/doi.org\/10.1145\/1102199.1102201."},{"key":"e_1_3_2_1_32_1","volume-title":"Pretty Bad Privacy: Pitfalls of DNS Encryption. Workshop on Privacy in the Electronic Society, WPES","author":"Shulman H.","year":"2015","unstructured":"H. Shulman . 2015 . Pretty Bad Privacy: Pitfalls of DNS Encryption. Workshop on Privacy in the Electronic Society, WPES 2014. H. Shulman. 2015. Pretty Bad Privacy: Pitfalls of DNS Encryption. Workshop on Privacy in the Electronic Society, WPES 2014."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"E. Stefanov M. Van Dijk E. Shi C. Fletcher L. Ren X. Yu and S. Devadas. 2013. Path oram: An extremely simple oblivious ram protocol Computer & communications security (ACM CCS). ACM 299--310.  E. Stefanov M. Van Dijk E. Shi C. Fletcher L. Ren X. Yu and S. Devadas. 2013. Path oram: An extremely simple oblivious ram protocol Computer & communications security (ACM CCS). ACM 299--310.","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0035"},{"volume-title":"Vuvuzela: Scalable private messaging resistant to traffic analysis Proceedings of the 25th Symposium on Operating Systems Principles. ACM, 137--152","author":"Den Hooff Jelle Van","key":"e_1_3_2_1_35_1","unstructured":"Jelle Van Den Hooff , David Lazar , Matei Zaharia , and Nickolai Zeldovich 2015. Vuvuzela: Scalable private messaging resistant to traffic analysis Proceedings of the 25th Symposium on Operating Systems Principles. ACM, 137--152 . Jelle Van Den Hooff, David Lazar, Matei Zaharia, and Nickolai Zeldovich 2015. Vuvuzela: Scalable private messaging resistant to traffic analysis Proceedings of the 25th Symposium on Operating Systems Principles. ACM, 137--152."},{"key":"e_1_3_2_1_36_1","volume-title":"https:\/\/en.wikipedia.org\/wiki\/Yo_(app). (April","author":"Yo","year":"2016","unstructured":"Wikipedia. 2016. Yo (app). https:\/\/en.wikipedia.org\/wiki\/Yo_(app). (April 2016 ). Wikipedia. 2016. Yo (app). https:\/\/en.wikipedia.org\/wiki\/Yo_(app). (April 2016)."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 on Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139550.3139566","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139550.3139566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:14:02Z","timestamp":1750212842000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139550.3139566"}},"subtitle":["A Private Notification Service"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":37,"alternative-id":["10.1145\/3139550.3139566","10.1145\/3139550"],"URL":"https:\/\/doi.org\/10.1145\/3139550.3139566","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}