{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:13Z","timestamp":1750306033688,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T00:00:00Z","timestamp":1512691200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,8]]},"DOI":"10.1145\/3171592.3171628","type":"proceedings-article","created":{"date-parts":[[2018,3,16]],"date-time":"2018-03-16T12:53:36Z","timestamp":1521204816000},"page":"125-134","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Grouper"],"prefix":"10.1145","author":[{"given":"Meng","family":"Li","sequence":"first","affiliation":[{"name":"Softlab, Department of Computer Secience, University of Tsukuba, Tsukuba, Ibaraki, Japan"}]},{"given":"Yasushi","family":"Shinjo","sequence":"additional","affiliation":[{"name":"Softlab, Department of Computer Secience, University of Tsukuba, Tsukuba, Ibaraki, Japan"}]}],"member":"320","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"300","volume-title":"18th USENIX Security Symposium","author":"Geambasu Roxana","year":"2009","unstructured":"Geambasu , Roxana and Kohno , Tadayoshi and Levy , Amit A and Levy , Henry M . Vanish : Increasing data privacy with self-destructing data . In 18th USENIX Security Symposium , pages 300 -- 315 , 2009 . Geambasu, Roxana and Kohno, Tadayoshi and Levy, Amit A and Levy, Henry M. Vanish: Increasing data privacy with self-destructing data. In 18th USENIX Security Symposium, pages 300--315, 2009."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.21"},{"key":"e_1_3_2_1_3_1","first-page":"1","volume-title":"Asia-Pacific Magnetic Recording Conference(APMRC)","author":"Zeng Lingfang","year":"2012","unstructured":"Zeng , Lingfang and Chen , Shibin and Wei , Qingsong and Feng , Dan . SeDas : A self-destructing data system based on active storage framework . In Asia-Pacific Magnetic Recording Conference(APMRC) , pages 1 -- 8 , 2012 . Zeng, Lingfang and Chen, Shibin and Wei, Qingsong and Feng, Dan. SeDas: A self-destructing data system based on active storage framework. In Asia-Pacific Magnetic Recording Conference(APMRC), pages 1--8, 2012."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2015.12"},{"key":"e_1_3_2_1_5_1","volume-title":"a modern Swift JSON synchronization to Core Data. Retrieved","author":"Elvis Nunez Sync","year":"2017","unstructured":"Elvis Nunez . Sync , a modern Swift JSON synchronization to Core Data. Retrieved Oct 3, 2017 from https:\/\/github.com\/SyncDB\/Sync. Elvis Nunez. Sync, a modern Swift JSON synchronization to Core Data. Retrieved Oct 3, 2017 from https:\/\/github.com\/SyncDB\/Sync."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080102"},{"key":"e_1_3_2_1_7_1","unstructured":"Azureus Software Inc. Azureus. Retrieved Aug 19 2017 from http:\/\/www.vuze.com.  Azureus Software Inc. Azureus. Retrieved Aug 19 2017 from http:\/\/www.vuze.com."},{"key":"e_1_3_2_1_8_1","volume-title":"17th Proceedings of the Network and Distributed System Security Symposium","author":"Wolchok Scott","year":"2010","unstructured":"Wolchok , Scott and Hofmann , Owen S and Heninger , Nadia and Felten , Edward W and Halderman , J Alex and Rossbach , Christopher J and Waters , Brent and Witchel , Emmett . Defeating Vanish with low-cost Sybil attacks against large DHTs . In 17th Proceedings of the Network and Distributed System Security Symposium , 2010 . Wolchok, Scott and Hofmann, Owen S and Heninger, Nadia and Felten, Edward W and Halderman, J Alex and Rossbach, Christopher J and Waters, Brent and Witchel, Emmett. Defeating Vanish with low-cost Sybil attacks against large DHTs. In 17th Proceedings of the Network and Distributed System Security Symposium, 2010."},{"key":"e_1_3_2_1_9_1","first-page":"157","volume-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"Popa Raluca Ada","year":"2014","unstructured":"Popa , Raluca Ada and Stark , Emily and Valdez , Steven and Helfer , Jonas and Zeldovich , Nickolai and Balakrishnan , Hari . Building Web applications on top of encrypted data using Mylar . In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14) , pages 157 -- 172 , 2014 . Popa, Raluca Ada and Stark, Emily and Valdez, Steven and Helfer, Jonas and Zeldovich, Nickolai and Balakrishnan, Hari. Building Web applications on top of encrypted data using Mylar. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14), pages 157--172, 2014."},{"key":"e_1_3_2_1_10_1","first-page":"188","volume-title":"12th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing","author":"Yasushi Shinjo Sweets","year":"2016","unstructured":"Rongchang Lai and Yasushi Shinjo . Sweets : A decentralized social networking service application using data synchronization on mobile devices . In 12th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing , pages 188 -- 198 , 2016 . Rongchang Lai and Yasushi Shinjo. Sweets: A decentralized social networking service application using data synchronization on mobile devices. In 12th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, pages 188--198, 2016."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535929"},{"key":"e_1_3_2_1_12_1","first-page":"337","volume-title":"Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI)","volume":"10","author":"Feldman Ariel J","year":"2010","unstructured":"Feldman , Ariel J and Zeller , William P and Freedman , Michael J and Felten , Edward W. SPORC : Group collaboration using untrusted cloud resources . In Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI) , volume 10 , pages 337 -- 350 , 2010 . Feldman, Ariel J and Zeller, William P and Freedman, Michael J and Felten, Edward W. SPORC: Group collaboration using untrusted cloud resources. In Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI), volume 10, pages 337--350, 2010."},{"key":"e_1_3_2_1_13_1","first-page":"487","volume-title":"International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services","author":"Smith Guillaume","year":"2013","unstructured":"Smith , Guillaume and Boreli , Roksana and Kaafar , Mohamed Ali . A layered secret sharing scheme for automated profile sharing in OSN Groups . In International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services , pages 487 -- 499 , 2013 . Smith, Guillaume and Boreli, Roksana and Kaafar, Mohamed Ali. A layered secret sharing scheme for automated profile sharing in OSN Groups. In International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, pages 487--499, 2013."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.06.120"},{"key":"e_1_3_2_1_15_1","volume-title":"Maarten. Distributed systems: principles and paradigms","author":"Tanenbaum","year":"2007","unstructured":"Tanenbaum , Andrew S and Van Steen , Maarten. Distributed systems: principles and paradigms . Prentice-Hall , 2007 . Tanenbaum, Andrew S and Van Steen, Maarten. Distributed systems: principles and paradigms. Prentice-Hall, 2007."},{"volume-title":"Netnews Architecture and Protocol. Retrieved","year":"2017","key":"e_1_3_2_1_16_1","unstructured":"Russ Allbery and Charles H . Lindsey . Netnews Architecture and Protocol. Retrieved Aug 19, 2017 from https:\/\/tools.ietf.org\/html\/rfc5537. Russ Allbery and Charles H. Lindsey. Netnews Architecture and Protocol. Retrieved Aug 19, 2017 from https:\/\/tools.ietf.org\/html\/rfc5537."},{"key":"e_1_3_2_1_17_1","unstructured":"Apple Inc. MultipeerConnectivity. Retrieved Oct 3 2017 from https:\/\/developer.apple.com\/ documentation\/multipeerconnectivity.  Apple Inc. MultipeerConnectivity. Retrieved Oct 3 2017 from https:\/\/developer.apple.com\/ documentation\/multipeerconnectivity."},{"key":"e_1_3_2_1_18_1","volume-title":"Core Data Programming Guide, Guides and Sample Code. Retrieved","author":"Apple Inc.","year":"2017","unstructured":"Apple Inc. Core Data Programming Guide, Guides and Sample Code. Retrieved Oct 3, 2017 from https:\/\/developer.apple.com\/library\/content\/ documentation\/Cocoa\/Conceptual\/CoreData\/. Apple Inc. Core Data Programming Guide, Guides and Sample Code. Retrieved Oct 3, 2017 from https:\/\/developer.apple.com\/library\/content\/ documentation\/Cocoa\/Conceptual\/CoreData\/."},{"key":"e_1_3_2_1_19_1","volume-title":"c-SSS, an implementation of Shamir's Secret Sharing. Retrieved","author":"Penney","year":"2017","unstructured":"Fletcher T. Penney . c-SSS, an implementation of Shamir's Secret Sharing. Retrieved Oct 3, 2017 from https:\/\/github.com\/fletcher\/c-sss. Fletcher T. Penney. c-SSS, an implementation of Shamir's Secret Sharing. Retrieved Oct 3, 2017 from https:\/\/github.com\/fletcher\/c-sss."},{"key":"e_1_3_2_1_20_1","volume-title":"OS X, watchOS, and tvOS. Retrieved","author":"AFNetworking Group","year":"2017","unstructured":"AFNetworking Group . AF Networking , a delightful networking framework for iOS , OS X, watchOS, and tvOS. Retrieved Oct 3, 2017 from http:\/\/afnetworking.com. AFNetworking Group. AFNetworking, a delightful networking framework for iOS, OS X, watchOS, and tvOS. Retrieved Oct 3, 2017 from http:\/\/afnetworking.com."},{"key":"e_1_3_2_1_21_1","unstructured":"The Apache Software Foundation. Tomcat. Retrieved Aug 19 2017 from http:\/\/tomcat.apache.org.  The Apache Software Foundation. Tomcat. Retrieved Aug 19 2017 from http:\/\/tomcat.apache.org."},{"key":"e_1_3_2_1_22_1","unstructured":"Pivotal Software Inc. Spring. Retrieved Aug 19 2017 from http:\/\/spring.io.  Pivotal Software Inc. Spring. Retrieved Aug 19 2017 from http:\/\/spring.io."},{"key":"e_1_3_2_1_23_1","unstructured":"Red Hat Software Inc. Hibernate. Retrieved Aug 19 2017 from http:\/\/hibernate.org.  Red Hat Software Inc. Hibernate. Retrieved Aug 19 2017 from http:\/\/hibernate.org."},{"key":"e_1_3_2_1_24_1","unstructured":"The Mental Faculty B.V. Ensembles. Retrieved Sep 28 2017 from http:\/\/www.ensembles.io.  The Mental Faculty B.V. Ensembles. Retrieved Sep 28 2017 from http:\/\/www.ensembles.io."},{"key":"e_1_3_2_1_25_1","unstructured":"No Thirst Software LLC. TICoreDataSync. Retrieved Sep 28 2017 from https:\/\/github.com\/nothirst\/TICoreDataSync.  No Thirst Software LLC. TICoreDataSync. Retrieved Sep 28 2017 from https:\/\/github.com\/nothirst\/TICoreDataSync."}],"event":{"name":"ICNCC 2017: 2017 VI International Conference on Network, Communication and Computing","acronym":"ICNCC 2017","location":"Kunming China"},"container-title":["Proceedings of the 2017 VI International Conference on Network, Communication and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3171592.3171628","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3171592.3171628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:02:53Z","timestamp":1750215773000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3171592.3171628"}},"subtitle":["A Framework for Developing Mobile Applications using a Secret Sharing Scheme and Untrusted Servers"],"short-title":[],"issued":{"date-parts":[[2017,12,8]]},"references-count":25,"alternative-id":["10.1145\/3171592.3171628","10.1145\/3171592"],"URL":"https:\/\/doi.org\/10.1145\/3171592.3171628","relation":{},"subject":[],"published":{"date-parts":[[2017,12,8]]},"assertion":[{"value":"2017-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}