{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:15Z","timestamp":1750306035946,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T00:00:00Z","timestamp":1523232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"BWFG-LFF","award":["951.1525-2604\/17001"],"award-info":[{"award-number":["951.1525-2604\/17001"]}]},{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["16KIS0381K,16KIS0368"],"award-info":[{"award-number":["16KIS0381K,16KIS0368"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,9]]},"DOI":"10.1145\/3167132.3167415","type":"proceedings-article","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T13:54:10Z","timestamp":1530626050000},"page":"1179-1182","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["AppPETs"],"prefix":"10.1145","author":[{"given":"Erik","family":"Sy","sequence":"first","affiliation":[{"name":"University of Hamburg, Hamburg, Germany"}]},{"given":"Tobias","family":"Mueller","sequence":"additional","affiliation":[{"name":"University of Hamburg, Hamburg, Germany"}]},{"given":"Matthias","family":"Marx","sequence":"additional","affiliation":[{"name":"University of Hamburg, Hamburg, Germany"}]},{"given":"Dominik","family":"Herrmann","sequence":"additional","affiliation":[{"name":"University of Bamberg, Bamberg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,4,9]]},"reference":[{"volume-title":"USEC'14","author":"Balebako R.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.15"},{"volume-title":"Conference of the Independent Data Protection Authorities.","author":"Bock K.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"e_1_3_2_1_6_1","unstructured":"Ursache C.-V. 2017. CPAProxy: A thin Objective-C wrapper around Tor. https:\/\/github.com\/ursachec\/CPAProxy. (2017).  Ursache C.-V. 2017. CPAProxy: A thin Objective-C wrapper around Tor. https:\/\/github.com\/ursachec\/CPAProxy. (2017)."},{"key":"e_1_3_2_1_7_1","unstructured":"B. Chor O. Goldreich E. Kushilevitz and M. Sudan. 1995. Private Information Retrieval. In FOCS. IEEE Computer Society.   B. Chor O. Goldreich E. Kushilevitz and M. Sudan. 1995. Private Information Retrieval. In FOCS. IEEE Computer Society."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664168.2664181"},{"volume-title":"Tor: The Second-Generation Onion Router. In USENIX Security Symposium. USENIX.","author":"Dingledine R.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"T. Dugan and X. Zou. 2016. A Survey of Secure Multiparty Computation Protocols for Privacy Preserving Genetic Tests. In CHASE. IEEE.  T. Dugan and X. Zou. 2016. A Survey of Secure Multiparty Computation Protocols for Privacy Preserving Genetic Tests. In CHASE. IEEE.","DOI":"10.1109\/CHASE.2016.71"},{"key":"e_1_3_2_1_11_1","unstructured":"Guardian Project. 2017. OnionKit for Android. https:\/\/guardianproject.info\/code\/onionkit. (2017).  Guardian Project. 2017. OnionKit for Android. https:\/\/guardianproject.info\/code\/onionkit. (2017)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9517-1"},{"volume":"201","journal-title":"J. Lindqvist.","author":"Jain S.","key":"e_1_3_2_1_13_1"},{"volume-title":"PKC'07)","year":"2007","author":"Ostrovsky R.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2009.5235258"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"A. Sabouri I. Krontiris and K. Rannenberg. 2012. Attribute-based credentials for trust (ABC4Trust). In TrustBus. Springer.  A. Sabouri I. Krontiris and K. Rannenberg. 2012. Attribute-based credentials for trust (ABC4Trust). In TrustBus. Springer.","DOI":"10.1007\/978-3-642-32287-7_21"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568244"},{"volume-title":"Adnostic: Privacy Preserving Targeted Advertising","year":"2010","author":"Toubiana V.","key":"e_1_3_2_1_18_1"},{"volume-title":"Nord-Sec' 09","author":"Westermann B.","key":"e_1_3_2_1_19_1"}],"event":{"name":"SAC 2018: Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Pau France","acronym":"SAC 2018"},"container-title":["Proceedings of the 33rd Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167132.3167415","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3167132.3167415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:02:56Z","timestamp":1750215776000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167132.3167415"}},"subtitle":["a framework for privacy-preserving apps"],"short-title":[],"issued":{"date-parts":[[2018,4,9]]},"references-count":19,"alternative-id":["10.1145\/3167132.3167415","10.1145\/3167132"],"URL":"https:\/\/doi.org\/10.1145\/3167132.3167415","relation":{},"subject":[],"published":{"date-parts":[[2018,4,9]]},"assertion":[{"value":"2018-04-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}