{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T12:09:42Z","timestamp":1762862982622,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Division of Computing and Communication Foundations","award":["1442966"],"award-info":[{"award-number":["1442966"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176308","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"53-63","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-Preserving Certification of Sustainability Metrics"],"prefix":"10.1145","author":[{"given":"Cetin","family":"Sahin","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Brandon","family":"Kuczenski","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Omer","family":"Egecioglu","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Amr","family":"El Abbadi","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"9","article-title":"Building a High-performance","volume":"31","author":"Smith Sean W.","year":"1999","unstructured":"Sean W. Smith and Steve Weingart ( Eds .). . 1999 . Building a High-performance , Programmable Secure Coprocessor. Comput. Netw. , Vol. 31 , 9 (April. 1999), 831--860. www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/santos Sean W. Smith and Steve Weingart (Eds.). . 1999. Building a High-performance, Programmable Secure Coprocessor. Comput. Netw., Vol. 31, 9 (April. 1999), 831--860. www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/santos","journal-title":"Programmable Secure Coprocessor. Comput. Netw."},{"key":"e_1_3_2_1_2_1","unstructured":"Bruce Schneier. 2009. Homomorphic Encryption Breakthrough. (2009). http:\/\/www.schneier.com\/blog\/archives\/2009\/07\/homomorphic_enc.html 2009.  Bruce Schneier. 2009. Homomorphic Encryption Breakthrough. (2009). http:\/\/www.schneier.com\/blog\/archives\/2009\/07\/homomorphic_enc.html 2009."},{"volume-title":"Comparing encrypted data","author":"Veugen Thijs","key":"e_1_3_2_1_4_1","unstructured":"Thijs Veugen . 2011. Comparing encrypted data . Multimedia Signal Processing Group, Delft University of Technology , The Netherlands and TNO Information and Communication Technology, Delft, Tech. Rep (2011). Thijs Veugen. 2011. Comparing encrypted data. Multimedia Signal Processing Group, Delft University of Technology, The Netherlands and TNO Information and Communication Technology, Delft, Tech. Rep (2011)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1039\/b905558d"},{"key":"e_1_3_2_1_8_1","volume-title":"FOCS","volume":"82","author":"Chi-Chih Yao Andrew","year":"1982","unstructured":"Andrew Chi-Chih Yao . 1982 . Protocols for secure computations . In FOCS , Vol. Vol. 82 . 160--164. Andrew Chi-Chih Yao. 1982. Protocols for secure computations. In FOCS, Vol. Vol. 82. 160--164."}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Tempe AZ USA","acronym":"CODASPY '18"},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176308","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176308","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:50Z","timestamp":1750273490000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176308"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":6,"alternative-id":["10.1145\/3176258.3176308","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176308","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}