{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T08:08:02Z","timestamp":1767773282291,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"BMBF","award":["16KIS0581"],"award-info":[{"award-number":["16KIS0581"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176327","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"342-353","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Forgetting with Puzzles"],"prefix":"10.1145","author":[{"given":"Ghous","family":"Amjad","sequence":"first","affiliation":[{"name":"Brown University &amp; NYUAD, Providence, RI, USA"}]},{"given":"Muhammad Shujaat","family":"Mirza","sequence":"additional","affiliation":[{"name":"NYUAD, Abu Dhabi, Uae"}]},{"given":"Christina","family":"P\u00f6pper","sequence":"additional","affiliation":[{"name":"NYUAD, Abu Dhabi, Uae"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"unstructured":"Adam Back. 2002. Hashcash -- A Denial of Service Counter-Measure. (2002). http:\/\/www.hashcash.org\/papers\/hashcash.pdf  Adam Back. 2002. Hashcash -- A Denial of Service Counter-Measure. (2002). http:\/\/www.hashcash.org\/papers\/hashcash.pdf","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 6th USENIX Security Symposium","author":"Boneh Dan","year":"1996","unstructured":"Dan Boneh and Richard J. Lipton . {n. d.}. A Revocable Backup System . In Proceedings of the 6th USENIX Security Symposium , San Jose, CA, USA, July 22--25 , 1996 . Dan Boneh and Richard J. Lipton. {n. d.}. A Revocable Backup System. In Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22--25, 1996."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/ICNP.2011.6089048"},{"volume-title":"Data never sleeps 5.0. https:\/\/www.domo.com\/learn\/data-never-sleeps-5. (June","year":"2017","unstructured":"Domo. 2017. Data never sleeps 5.0. https:\/\/www.domo.com\/learn\/data-never-sleeps-5. (June . 2017 ). https:\/\/www.domo.com\/learn\/data-never-sleeps-5 Domo. 2017. Data never sleeps 5.0. https:\/\/www.domo.com\/learn\/data-never-sleeps-5. (June. 2017). https:\/\/www.domo.com\/learn\/data-never-sleeps-5","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1007\/11767480_7"},{"volume-title":"Vanish: Increasing Data Privacy with Self-destructing Data Proceedings of the 18th Conference on USENIX Security Symposium. USENIX Association","author":"Geambasu Roxana","unstructured":"Roxana Geambasu , Tadayoshi Kohno , Amit A. Levy , and Henry M. Levy . 2009 . Vanish: Increasing Data Privacy with Self-destructing Data Proceedings of the 18th Conference on USENIX Security Symposium. USENIX Association , Berkeley, CA, USA, 299--316. Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, and Henry M. Levy. 2009. Vanish: Increasing Data Privacy with Self-destructing Data Proceedings of the 18th Conference on USENIX Security Symposium. USENIX Association, Berkeley, CA, USA, 299--316.","key":"e_1_3_2_1_7_1"},{"volume-title":"Focusing on Applications of Cryptography","author":"Gutmann Peter","unstructured":"Peter Gutmann . 1996. Secure deletion of data from magnetic and solid-state memory Proceedings of the 6th USENIX Security Symposium , Focusing on Applications of Cryptography . USENIX Association , Berkeley, CA, USA , 77--90. Peter Gutmann. 1996. Secure deletion of data from magnetic and solid-state memory Proceedings of the 6th USENIX Security Symposium, Focusing on Applications of Cryptography. USENIX Association, Berkeley, CA, USA, 77--90.","key":"e_1_3_2_1_8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1007\/978-3-642-02384-2_22"},{"volume-title":"Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks Proceedings of the Network and Distributed System Security Symposium, NDSS.","author":"Juels Ari","unstructured":"Ari Juels and John G. Brainard . 1999 . Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks Proceedings of the Network and Distributed System Security Symposium, NDSS. Ari Juels and John G. Brainard. 1999. Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks Proceedings of the Network and Distributed System Security Symposium, NDSS.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","volume-title":"Low-Cost Client Puzzles Based on Modular Exponentiation Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS). 679--697","author":"Karame Ghassan","year":"2010","unstructured":"Ghassan Karame and Srdjan Capkun . 2010 . Low-Cost Client Puzzles Based on Modular Exponentiation Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS). 679--697 . Ghassan Karame and Srdjan Capkun. 2010. Low-Cost Client Puzzles Based on Modular Exponentiation Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS). 679--697."},{"key":"e_1_3_2_1_12_1","first-page":"27","article-title":"An Efficient Secure Deletion Scheme for Flash File Systems","volume":"26","author":"Lee Jaeheung","year":"2010","unstructured":"Jaeheung Lee , Sangho Yi , Junyoung Heo , Hyungbae Park , Sung Y. Shin , and Yookun Cho . 2010 . An Efficient Secure Deletion Scheme for Flash File Systems . Journal of Information Science and Engineering , Vol. 26 , 1 (2010), 27 -- 38 . http:\/\/www.iis.sinica.edu.tw\/page\/jise\/2010\/201001_03.html Jaeheung Lee, Sangho Yi, Junyoung Heo, Hyungbae Park, Sung Y. Shin, and Yookun Cho. 2010. An Efficient Secure Deletion Scheme for Flash File Systems. Journal of Information Science and Engineering, Vol. 26, 1 (2010), 27--38. http:\/\/www.iis.sinica.edu.tw\/page\/jise\/2010\/201001_03.html","journal-title":"Journal of Information Science and Engineering"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/2382536.2382548"},{"key":"e_1_3_2_1_14_1","volume-title":"Why Haven't CPU Clock Speeds Increased in the Last Few Years? (Nov","author":"Mattsson P\u00e4r Persson","year":"2013","unstructured":"P\u00e4r Persson Mattsson . 2013. Why Haven't CPU Clock Speeds Increased in the Last Few Years? (Nov . 2013 ). https:\/\/www.comsol.com\/blogs\/havent-cpu-clock-speeds-increased-last-years\/ P\u00e4r Persson Mattsson. 2013. Why Haven't CPU Clock Speeds Increased in the Last Few Years? (Nov. 2013). https:\/\/www.comsol.com\/blogs\/havent-cpu-clock-speeds-increased-last-years\/"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.5555\/2049955"},{"key":"e_1_3_2_1_16_1","volume-title":"Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data. In Twelfth Symposium on Usable Privacy and Security, SOUPS 2016","author":"Mondal Mainack","year":"2016","unstructured":"Mainack Mondal , Johnnatan Messias , Saptarshi Ghosh , Krishna P. Gummadi , and Aniket Kate . 2016 . Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data. In Twelfth Symposium on Usable Privacy and Security, SOUPS 2016 , Denver, CO, USA , June 22-24, 2016. 287--299. Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, and Aniket Kate. 2016. Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data. In Twelfth Symposium on Usable Privacy and Security, SOUPS 2016, Denver, CO, USA, June 22-24, 2016. 287--299."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/SP.2013.28"},{"volume-title":"Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory Proceedings of the 21th USENIX Security Symposium. 333--348","author":"Reardon Joel","unstructured":"Joel Reardon , Srdjan Capkun , and David A. Basin . 2012 . Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory Proceedings of the 21th USENIX Security Symposium. 333--348 . Joel Reardon, Srdjan Capkun, and David A. Basin. 2012. Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory Proceedings of the 21th USENIX Security Symposium. 333--348.","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/2381966.2381976"},{"key":"e_1_3_2_1_20_1","volume-title":"Wagner","author":"Rivest L.","year":"1996","unstructured":"Ronald. L. Rivest , Adi Shamir , and David A . Wagner . 1996 . Time-lock Puzzles and Timed-release Crypto. Technical Report. Cambridge, MA, USA. Ronald. L. Rivest, Adi Shamir, and David A. Wagner. 1996. Time-lock Puzzles and Timed-release Crypto. Technical Report. Cambridge, MA, USA."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/2500468.2500474"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CODASPY '18","name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","location":"Tempe AZ USA"},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176327","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176327"}},"subtitle":["Using Cryptographic Puzzles to support Digital Forgetting"],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":20,"alternative-id":["10.1145\/3176258.3176327","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176327","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}