{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T02:24:58Z","timestamp":1766888698473,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1540217","CNS-1562485"],"award-info":[{"award-number":["CNS-1540217","CNS-1562485"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243800","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"2011-2027","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Mitigating Risk while Complying with Data Retention Laws"],"prefix":"10.1145","author":[{"given":"Luis","family":"Vargas","sequence":"first","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Gyan","family":"Hazarika","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Rachel","family":"Culpepper","sequence":"additional","affiliation":[{"name":"University of Richmond, Richmond, VA, USA"}]},{"given":"Kevin R.B.","family":"Butler","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Thomas","family":"Shrimpton","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Doug","family":"Szajda","sequence":"additional","affiliation":[{"name":"University of Richmond, Richmond, VA, USA"}]},{"given":"Patrick","family":"Traynor","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"PUBLIC LAW 104--191 - Health Insurance Portability and Accountability Act of","author":"104th Congress of the United States of America. 1996.","year":"1996","unstructured":"104th Congress of the United States of America. 1996. PUBLIC LAW 104--191 - Health Insurance Portability and Accountability Act of 1996 . https:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-104publ191\/html\/PLAW-104publ191.htm. (1996). 104th Congress of the United States of America. 1996. PUBLIC LAW 104--191 - Health Insurance Portability and Accountability Act of 1996. https:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-104publ191\/html\/PLAW-104publ191.htm. (1996)."},{"key":"e_1_3_2_2_2_1","volume-title":"PUBLIC LAW 107--204 - Sarbanes Oxley Act of","author":"107th Congress of the United States of America. 2002.","year":"2002","unstructured":"107th Congress of the United States of America. 2002. PUBLIC LAW 107--204 - Sarbanes Oxley Act of 2002 . http:\/\/www.sec.gov\/about\/laws\/soa2002.pdf. (2002). 107th Congress of the United States of America. 2002. PUBLIC LAW 107--204 - Sarbanes Oxley Act of 2002. http:\/\/www.sec.gov\/about\/laws\/soa2002.pdf. (2002)."},{"key":"e_1_3_2_2_3_1","volume-title":"To Provide Full Insurance For Public Unit Deposits Of $100,000 Per Account, To Establish A National Commission On Electronic Fund Transfers, And For Other Purposes","author":"93rd Congress of the United States of America. 1974.","year":"1974","unstructured":"93rd Congress of the United States of America. 1974. PUBLIC LAW 93--495 - An Act To Increase Deposit Insurance From $20,000 To $40,000 , To Provide Full Insurance For Public Unit Deposits Of $100,000 Per Account, To Establish A National Commission On Electronic Fund Transfers, And For Other Purposes ; Equal Credit Opportunity Act; Fair Credit Billing Act . http:\/\/purl.fdlp.gov\/GPO\/gpo51530. ( 1974 ). 93rd Congress of the United States of America. 1974. PUBLIC LAW 93--495 - An Act To Increase Deposit Insurance From $20,000 To $40,000, To Provide Full Insurance For Public Unit Deposits Of $100,000 Per Account, To Establish A National Commission On Electronic Fund Transfers, And For Other Purposes; Equal Credit Opportunity Act; Fair Credit Billing Act. http:\/\/purl.fdlp.gov\/GPO\/gpo51530. (1974)."},{"key":"e_1_3_2_2_4_1","volume-title":"PUBLIC LAW 94--200 - Home Mortgage Disclosure Act of","author":"94th Congress of the United States of America. 2011.","year":"1975","unstructured":"94th Congress of the United States of America. 2011. PUBLIC LAW 94--200 - Home Mortgage Disclosure Act of 1975 . https:\/\/www.gpo.gov\/fdsys\/pkg\/USCODE-2011-title12\/pdf\/USCODE-2011-title12-chap29.pdf. (2011). 94th Congress of the United States of America. 2011. PUBLIC LAW 94--200 - Home Mortgage Disclosure Act of 1975. https:\/\/www.gpo.gov\/fdsys\/pkg\/USCODE-2011-title12\/pdf\/USCODE-2011-title12-chap29.pdf. (2011)."},{"key":"e_1_3_2_2_5_1","first-page":"3","article-title":"The Risks of Key Recovery, Key Escrow, and Trusted Third-party Encryption","volume":"2","author":"Abelson Hal","year":"1997","unstructured":"Hal Abelson , Ross Anderson , Steven M. Bellovin , Josh Benalob , Matt Blaze , Whitfield Diffie , John Gilmore , Peter G. Neumann , Ronald L. Rivest , Jeffrey I. Schiller , and Bruce Schneier . 1997 . The Risks of Key Recovery, Key Escrow, and Trusted Third-party Encryption . World Wide Web J. , Vol. 2 , 3 (June 1997), 241--257. Hal Abelson, Ross Anderson, Steven M. Bellovin, Josh Benalob, Matt Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, and Bruce Schneier. 1997. The Risks of Key Recovery, Key Escrow, and Trusted Third-party Encryption. World Wide Web J., Vol. 2, 3 (June 1997), 241--257.","journal-title":"World Wide Web J."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134104"},{"volume-title":"Deterministic and Efficiently Searchable Encryption","author":"Bellare Mihir","key":"e_1_3_2_2_7_1","unstructured":"Mihir Bellare , Alexandra Boldyreva , and Adam O'Neill . 2007. Deterministic and Efficiently Searchable Encryption . Springer Berlin Heidelberg , Berlin, Heidelberg , 535--552. Mihir Bellare, Alexandra Boldyreva, and Adam O'Neill. 2007. Deterministic and Efficiently Searchable Encryption .Springer Berlin Heidelberg, Berlin, Heidelberg, 535--552."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266439"},{"key":"e_1_3_2_2_10_1","volume-title":"Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Advances in Cryptology?ASIACRYPT 2000","author":"Bellare Mihir","year":"2000","unstructured":"Mihir Bellare and Chanathip Namprempre . 2000. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Advances in Cryptology?ASIACRYPT 2000 ( 2000 ), 531--545. Mihir Bellare and Chanathip Namprempre. 2000. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Advances in Cryptology?ASIACRYPT 2000 (2000), 531--545."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/293910.293151"},{"key":"e_1_3_2_2_12_1","volume-title":"Egalitarian Computing. In Proceedings of the USENIX Security Symposium (SECURITY).","author":"Biryukov Alex","year":"2016","unstructured":"Alex Biryukov and Dmitry Khovratovich . 2016 . Egalitarian Computing. In Proceedings of the USENIX Security Symposium (SECURITY). Alex Biryukov and Dmitry Khovratovich. 2016. Egalitarian Computing. In Proceedings of the USENIX Security Symposium (SECURITY)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/0215025"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/646765.704125"},{"key":"e_1_3_2_2_15_1","unstructured":"S. Bowe. 2016. pay-to-sudoku. https:\/\/github.com\/zcash\/pay-to-sudoku. (2016).  S. Bowe. 2016. pay-to-sudoku. https:\/\/github.com\/zcash\/pay-to-sudoku. (2016)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134060"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11602897_25"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11909033_12"},{"key":"e_1_3_2_2_19_1","volume-title":"personal communication. (July","author":"Chambers Hank","year":"2018","unstructured":"Hank Chambers . 2018. personal communication. (July 2018 ). Professor of Law, University of Richmond. Hank Chambers. 2018. personal communication. (July 2018). Professor of Law, University of Richmond."},{"key":"e_1_3_2_2_20_1","volume-title":"Wu chi Feng, and Antoine Luu.","author":"Feng Wu","year":"2005","unstructured":"Wu chang Feng , Ed Kaiser , Wu chi Feng, and Antoine Luu. 2005 . Design and Implementation of Network Puzzles . (2005). Wu chang Feng, Ed Kaiser, Wu chi Feng, and Antoine Luu. 2005. Design and Implementation of Network Puzzles. (2005)."},{"volume-title":"Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '92)","author":"Chaum David","key":"e_1_3_2_2_21_1","unstructured":"David Chaum and Torben P. Pedersen . 1993. Wallet Databases with Observers . In Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '92) . Springer-Verlag, London, UK, UK, 89--105. David Chaum and Torben P. Pedersen. 1993. Wallet Databases with Observers. In Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '92). Springer-Verlag, London, UK, UK, 89--105."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11889663_17"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1330332.1330336"},{"key":"e_1_3_2_2_24_1","unstructured":"R. Chirgwin. 2018. Equifax reveals full horror of that monstrous cyber-heist of its servers. https:\/\/www.theregister.co.uk\/2018\/05\/08\/equifax_breach_may_2018\/. (2018).  R. Chirgwin. 2018. Equifax reveals full horror of that monstrous cyber-heist of its servers. https:\/\/www.theregister.co.uk\/2018\/05\/08\/equifax_breach_may_2018\/. (2018)."},{"key":"e_1_3_2_2_25_1","volume-title":"Proceedings of the 10th Conference on USENIX Security Symposium -","volume":"10","author":"Dean Drew","year":"2001","unstructured":"Drew Dean and Adam Stubblefield . 2001 . Using Client Puzzles to Protect TLS . In Proceedings of the 10th Conference on USENIX Security Symposium - Volume 10 (SSYM'01). USENIX Association, Berkeley, CA, USA, 1--1. Drew Dean and Adam Stubblefield. 2001. Using Client Puzzles to Protect TLS. In Proceedings of the 10th Conference on USENIX Security Symposium - Volume 10 (SSYM'01). USENIX Association, Berkeley, CA, USA, 1--1."},{"volume-title":"Advances in Cryptology -- EUROCRYPT '99","author":"Crescenzo Giovanni Di","key":"e_1_3_2_2_26_1","unstructured":"Giovanni Di Crescenzo , Rafail Ostrovsky , and Sivaramakrishnan Rajagopalan . 1999. Conditional Oblivious Transfer and Timed-Release Encryption . In Advances in Cryptology -- EUROCRYPT '99 , Jacques Stern (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 74--89. Giovanni Di Crescenzo, Rafail Ostrovsky, and Sivaramakrishnan Rajagopalan. 1999. Conditional Oblivious Transfer and Timed-Release Encryption. In Advances in Cryptology -- EUROCRYPT '99, Jacques Stern (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 74--89."},{"key":"e_1_3_2_2_27_1","volume-title":"personal communication. (July","author":"Douglas John G.","year":"2018","unstructured":"John G. Douglas . 2018. personal communication. (July 2018 ). Professor of Law (and former Dean), University of Richmond , former Chief of the Criminal Division of the United States Attorney's Office in Richmond, Virginia. John G. Douglas. 2018. personal communication. (July 2018). Professor of Law (and former Dean), University of Richmond, former Chief of the Criminal Division of the United States Attorney's Office in Richmond, Virginia."},{"key":"e_1_3_2_2_28_1","unstructured":"C Dwork and M Noar. 1992. Pricing Via Processing or Combating Junk Mail. In Advances in Cryptology (CRYPTO).   C Dwork and M Noar. 1992. Pricing Via Processing or Combating Junk Mail. In Advances in Cryptology (CRYPTO)."},{"volume-title":"A Structure Preserving Database Encryption Scheme","author":"Elovici Yuval","key":"e_1_3_2_2_29_1","unstructured":"Yuval Elovici , Ronen Waisenberg , Erez Shmueli , and Ehud Gudes . 2004. A Structure Preserving Database Encryption Scheme . Springer Berlin Heidelberg , Berlin, Heidelberg , 28--40. Yuval Elovici, Ronen Waisenberg, Erez Shmueli, and Ehud Gudes. 2004. A Structure Preserving Database Encryption Scheme .Springer Berlin Heidelberg, Berlin, Heidelberg, 28--40."},{"key":"e_1_3_2_2_30_1","volume-title":"personal communication. (Dec","author":"Erickson Jessica","year":"2017","unstructured":"Jessica Erickson . 2017. personal communication. (Dec 2017 ). Professor of Law, University of Richmond. Jessica Erickson. 2017. personal communication. (Dec 2017). Professor of Law, University of Richmond."},{"key":"e_1_3_2_2_31_1","volume-title":"Electronically Stored Information, and Tangible Things, or Entering onto Land, for Inspection and Other Purposes (most recently ammended","author":"Federal Court Rules Committee","year":"2015","unstructured":"Federal Court Rules Committee . 1938. Federal Rules of Civil Procedure Rule 34: Producing Documents , Electronically Stored Information, and Tangible Things, or Entering onto Land, for Inspection and Other Purposes (most recently ammended April , 2015 ). (1938). Federal Court Rules Committee. 1938. Federal Rules of Civil Procedure Rule 34: Producing Documents, Electronically Stored Information, and Tangible Things, or Entering onto Land, for Inspection and Other Purposes (most recently ammended April, 2015). (1938)."},{"volume-title":"How To Prove Yourself: Practical Solutions to Identification and Signature Problems","author":"Fiat Amos","key":"e_1_3_2_2_32_1","unstructured":"Amos Fiat and Adi Shamir . 1987. How To Prove Yourself: Practical Solutions to Identification and Signature Problems . Springer Berlin Heidelberg , Berlin, Heidelberg , 186--194. Amos Fiat and Adi Shamir. 1987. How To Prove Yourself: Practical Solutions to Identification and Signature Problems .Springer Berlin Heidelberg, Berlin, Heidelberg, 186--194."},{"key":"e_1_3_2_2_33_1","volume-title":"Garay and Markus Jakobsson","author":"Juan","year":"2003","unstructured":"Juan A. Garay and Markus Jakobsson . 2003 . Timed Release of Standard Digital Signatures .Springer Berlin Heidelberg, Berlin, Heidelberg , 168--182. Juan A. Garay and Markus Jakobsson. 2003. Timed Release of Standard Digital Signatures .Springer Berlin Heidelberg, Berlin, Heidelberg, 168--182."},{"key":"e_1_3_2_2_34_1","volume-title":"New directions for self-destructing data systems","author":"Geambasu Roxana","year":"2010","unstructured":"Roxana Geambasu , Tadayoshi Kohno , Arvind Krishnamurthy , Amit Levy , Henry Levy , Paul Gardner , and Vinnie Moscaritolo . 2010. New directions for self-destructing data systems . University of Washington , Tech. Rep ( 2010 ). Roxana Geambasu, Tadayoshi Kohno, Arvind Krishnamurthy, Amit Levy, Henry Levy, Paul Gardner, and Vinnie Moscaritolo. 2010. New directions for self-destructing data systems. University of Washington, Tech. Rep (2010)."},{"key":"e_1_3_2_2_35_1","volume-title":"USENIX Security Symposium. 299--316","author":"Geambasu Roxana","year":"2009","unstructured":"Roxana Geambasu , Tadayoshi Kohno , Amit A Levy , and Henry M Levy . 2009 . Vanish: Increasing Data Privacy with Self-Destructing Data .. In USENIX Security Symposium. 299--316 . Roxana Geambasu, Tadayoshi Kohno, Amit A Levy, and Henry M Levy. 2009. Vanish: Increasing Data Privacy with Self-Destructing Data.. In USENIX Security Symposium. 299--316."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"e_1_3_2_2_37_1","volume-title":"Executive Department, Department of Fair Employment and Housing","author":"Government of the State of California. 1980. California Consitution; Government Code","year":"1980","unstructured":"Government of the State of California. 1980. California Consitution; Government Code , Government of the State of California , Executive Department, Department of Fair Employment and Housing , Chapter 6, Section 12946. http:\/\/leginfo.legislature.ca.gov\/faces\/codes_displaySection.xhtml?lawCode=GOV\u00a7ionNum=12946. ( 1980 ). Government of the State of California. 1980. California Consitution; Government Code, Government of the State of California, Executive Department, Department of Fair Employment and Housing, Chapter 6, Section 12946. http:\/\/leginfo.legislature.ca.gov\/faces\/codes_displaySection.xhtml?lawCode=GOV\u00a7ionNum=12946. (1980)."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_2_39_1","unstructured":"William Greenwood. 2016. Verizon claims $1 billion discount from Yahoo for data breach. http:\/\/thetechnews.com\/2016\/10\/07\/verizon-claims-1-billion-discount-yahoo-data-breach\/. (2016).  William Greenwood. 2016. Verizon claims $1 billion discount from Yahoo for data breach. http:\/\/thetechnews.com\/2016\/10\/07\/verizon-claims-1-billion-discount-yahoo-data-breach\/. (2016)."},{"key":"e_1_3_2_2_40_1","volume-title":"Infoworld. (June 16","author":"Grimes Roger A.","year":"2015","unstructured":"Roger A. Grimes . 2015 . Your 'Offline' Storage May be Putting You at Risk . Infoworld. (June 16 , 2015). http:\/\/www.infoworld.com\/article\/2935613\/data-security\/your-offline-storage-may-be-putting-you-at-risk.html Roger A. Grimes. 2015. Your 'Offline' Storage May be Putting You at Risk. Infoworld. (June 16, 2015). http:\/\/www.infoworld.com\/article\/2935613\/data-security\/your-offline-storage-may-be-putting-you-at-risk.html"},{"volume-title":"Lest We Remember: Cold Boot Attacks on Encryption Keys. In USENIX Security Symposium (SECURITY).","author":"Halderman J. A.","key":"e_1_3_2_2_41_1","unstructured":"J. A. Halderman , S. D. Schoen , N. Heninger , W. Clarkson , W. Paul , J. A. Calandrino , A. J. Feldman , J. Appelbaum , and E. W. Felten . 2008 . Lest We Remember: Cold Boot Attacks on Encryption Keys. In USENIX Security Symposium (SECURITY). J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. 2008. Lest We Remember: Cold Boot Attacks on Encryption Keys. In USENIX Security Symposium (SECURITY)."},{"key":"e_1_3_2_2_42_1","unstructured":"Elizabeth A. Harris. 2013. For Target's Shoppers a New Holiday To-Do List. http:\/\/www.nytimes.com\/2013\/12\/20\/business\/for-targets-shoppers-a-new-holiday-to-do-list.html. (December 2013).  Elizabeth A. Harris. 2013. For Target's Shoppers a New Holiday To-Do List. http:\/\/www.nytimes.com\/2013\/12\/20\/business\/for-targets-shoppers-a-new-holiday-to-do-list.html. (December 2013)."},{"key":"e_1_3_2_2_43_1","unstructured":"D. Hristu-varsakelis K. Chalkias and G. Stephanides. 2008. A versatile secure protocol for anonymous timed-release encryption. In In Journal of Information Assurance and Security 2 (2008. Dynamic Publishers Inc 80--88.  D. Hristu-varsakelis K. Chalkias and G. Stephanides. 2008. A versatile secure protocol for anonymous timed-release encryption. In In Journal of Information Assurance and Security 2 (2008. Dynamic Publishers Inc 80--88."},{"key":"e_1_3_2_2_44_1","volume-title":"Proceedings of the Network and Distributed Systems Security (NDSS) Symposium.","author":"Juels Ari","year":"1999","unstructured":"Ari Juels and John Brainard . 1999 . Client Puzzle: A Cryptographic Defense Against Connection Depletion Attacks . In Proceedings of the Network and Distributed Systems Security (NDSS) Symposium. Ari Juels and John Brainard. 1999. Client Puzzle: A Cryptographic Defense Against Connection Depletion Attacks. In Proceedings of the Network and Distributed Systems Security (NDSS) Symposium."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"J. Katz and Y. Lindell. 2014. Introduction to Modern Cryptography (2nd Edition) .Chapman & Hall\/CRC Press.   J. Katz and Y. Lindell. 2014. Introduction to Modern Cryptography (2nd Edition) .Chapman & Hall\/CRC Press.","DOI":"10.1201\/b17668"},{"key":"e_1_3_2_2_46_1","volume-title":"Computerworld. (June 22","author":"Krik Jeremy","year":"2015","unstructured":"Jeremy Krik . 2015 . How Encryption Keys Could be Stolen By Your Lunch . Computerworld. (June 22 , 2015). http:\/\/www.computerworld.com\/article\/2938753\/security\/how-encryption-keys-could-be-stolen-by-your-lunch.html Jeremy Krik. 2015. How Encryption Keys Could be Stolen By Your Lunch. Computerworld. (June 22, 2015). http:\/\/www.computerworld.com\/article\/2938753\/security\/how-encryption-keys-could-be-stolen-by-your-lunch.html"},{"key":"e_1_3_2_2_47_1","volume-title":"Proceedings of the Workshop on the Economics of Information Security.","author":"Laurie Ben","year":"2004","unstructured":"Ben Laurie and Richard Clayton . 2004 . Proof of Work Proves Not to Work . In Proceedings of the Workshop on the Economics of Information Security. Ben Laurie and Richard Clayton. 2004. Proof of Work Proves Not to Work. In Proceedings of the Workshop on the Economics of Information Security."},{"key":"e_1_3_2_2_48_1","unstructured":"James Manyika Michael Chui Brad Brown Jacques Bughin Richard Dobbs Charles Roxburgh and Angela Hung Byers. 2011. Big data: The next frontier for innovation competition and productivity. http:\/\/www.mckinsey.com\/business-functions\/digital-mckinsey\/our-insights\/big-data-the-next-frontier-for-innovation. (June 2011).  James Manyika Michael Chui Brad Brown Jacques Bughin Richard Dobbs Charles Roxburgh and Angela Hung Byers. 2011. Big data: The next frontier for innovation competition and productivity. http:\/\/www.mckinsey.com\/business-functions\/digital-mckinsey\/our-insights\/big-data-the-next-frontier-for-innovation. (June 2011)."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011235607071"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72367-9_21"},{"key":"e_1_3_2_2_51_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System . http:\/\/www.bitcoin.org\/bitcoin.pdf. (2008). Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. http:\/\/www.bitcoin.org\/bitcoin.pdf. (2008)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_15"},{"key":"e_1_3_2_2_53_1","volume-title":"New Approaches to Timed-Release Cryptography. (10","author":"Osipkov Ivan","year":"2004","unstructured":"Ivan Osipkov , Yongdae Kim , and Jung Hee Cheon . 2004. New Approaches to Timed-Release Cryptography. (10 2004 ). Ivan Osipkov, Yongdae Kim, and Jung Hee Cheon. 2004. New Approaches to Timed-Release Cryptography. (10 2004)."},{"key":"e_1_3_2_2_54_1","unstructured":"Damien Paletta. 2015. Wall Street Journal - OPM Breach Was Enormous FBI Director Says. http:\/\/www.wsj.com\/articles\/breach-was-enormous-fbi-director-says-1436395157. (2015).  Damien Paletta. 2015. Wall Street Journal - OPM Breach Was Enormous FBI Director Says. http:\/\/www.wsj.com\/articles\/breach-was-enormous-fbi-director-says-1436395157. (2015)."},{"key":"e_1_3_2_2_55_1","unstructured":"Radia Perlman. 2005. The ephemerizer: Making data disappear. (2005).   Radia Perlman. 2005. The ephemerizer: Making data disappear. (2005)."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2004.11044320"},{"key":"e_1_3_2_2_57_1","volume-title":"Proceedings of the USENIX Security Symposium (USENIX).","author":"Provos Niels","year":"1999","unstructured":"Niels Provos and David Mazieres . 1999 . A Future-Adaptable Password Scheme . In Proceedings of the USENIX Security Symposium (USENIX). Niels Provos and David Mazieres. 1999. A Future-Adaptable Password Scheme. In Proceedings of the USENIX Security Symposium (USENIX)."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31448-3_15"},{"key":"e_1_3_2_2_60_1","volume-title":"Infoworld. (September 30","author":"Rashid Fahmida","year":"2015","unstructured":"Fahmida Rashid . 2015 . Got 'Em! Researchers Steal Keys from Amazon Cloud . Infoworld. (September 30 , 2015). http:\/\/www.infoworld.com\/article\/2987109\/cloud-security\/researchers-steal-crypto-keys-from-amazon-cloud.html Fahmida Rashid. 2015. Got 'Em! Researchers Steal Keys from Amazon Cloud. Infoworld. (September 30, 2015). http:\/\/www.infoworld.com\/article\/2987109\/cloud-security\/researchers-steal-crypto-keys-from-amazon-cloud.html"},{"key":"e_1_3_2_2_61_1","unstructured":"R. L. Rivest A. Shamir and D. A. Wagner. 1996. Time-lock Puzzles and Timed-release Crypto. Technical Report. Massachusetts Institute of Technology Cambridge MA USA.   R. L. Rivest A. Shamir and D. A. Wagner. 1996. Time-lock Puzzles and Timed-release Crypto. Technical Report. Massachusetts Institute of Technology Cambridge MA USA."},{"key":"e_1_3_2_2_62_1","volume-title":"Bloomberg Technology. (April 15","author":"Robertson Jordan","year":"2014","unstructured":"Jordan Robertson . 2014 . Heartbleed Hackers Steal Encryption Keys in Threat Test . Bloomberg Technology. (April 15 , 2014). https:\/\/techcrunch.com\/2015\/02\/19\/the-nsa-reportedly-stole-millions-of-sim-encryption-keys-to-gather-private-data\/ Jordan Robertson. 2014. Heartbleed Hackers Steal Encryption Keys in Threat Test. Bloomberg Technology. (April 15, 2014). https:\/\/techcrunch.com\/2015\/02\/19\/the-nsa-reportedly-stole-millions-of-sim-encryption-keys-to-gather-private-data\/"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_2_64_1","volume-title":"The Intercept. (February 19","author":"Scahill Jeremy","year":"2015","unstructured":"Jeremy Scahill and Josh Begley . 2015 . The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle . The Intercept. (February 19 , 2015). https:\/\/theintercept.com\/2015\/02\/19\/great-sim-heist\/ Jeremy Scahill and Josh Begley. 2015. The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle. The Intercept. (February 19, 2015). https:\/\/theintercept.com\/2015\/02\/19\/great-sim-heist\/"},{"key":"e_1_3_2_2_65_1","volume-title":"Final Rule: Retention of Records Relevant to Audits and Reviews. 17 CFR Part 210, RIN 3235-AI74. (January","author":"Securities and Exchange Commission","year":"2003","unstructured":"Securities and Exchange Commission . 2003 . Final Rule: Retention of Records Relevant to Audits and Reviews. 17 CFR Part 210, RIN 3235-AI74. (January 2003). https:\/\/www.sec.gov\/rules\/final\/33--8180.htm Securities and Exchange Commission. 2003. Final Rule: Retention of Records Relevant to Audits and Reviews. 17 CFR Part 210, RIN 3235-AI74. (January 2003). https:\/\/www.sec.gov\/rules\/final\/33--8180.htm"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815933.1815940"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884426"},{"key":"e_1_3_2_2_69_1","volume-title":"Congressional Research Service","volume":"11","author":"Stevens Gina","year":"2014","unstructured":"Gina Stevens . 2014 . The Federal Trade Commission's Regulation of Data Security Under Its Unfair or Deceptive Acts or Practices (UDAP) Authority . Congressional Research Service , Vol. 11 (2014). Gina Stevens. 2014. The Federal Trade Commission's Regulation of Data Security Under Its Unfair or Deceptive Acts or Practices (UDAP) Authority. Congressional Research Service, Vol. 11 (2014)."},{"key":"e_1_3_2_2_70_1","volume-title":"2007 USENIX Annual Technical Conference. USENIX Association.","author":"Storer Mark W","year":"2008","unstructured":"Mark W Storer , Kevin M Greenan , Ethan L Miller , and Kaladhar Voruganti . 2008 . POTSHARDS: secure long-term storage without encryption . In 2007 USENIX Annual Technical Conference. USENIX Association. Mark W Storer, Kevin M Greenan, Ethan L Miller, and Kaladhar Voruganti. 2008. POTSHARDS: secure long-term storage without encryption. In 2007 USENIX Annual Technical Conference. USENIX Association."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103780.1103793"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.5555\/794198.795090"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.12"},{"key":"e_1_3_2_2_74_1","volume-title":"Federal Taxation Committee","author":"The Massachusetts Society of Certified Public Accountants","year":"2004","unstructured":"The Massachusetts Society of Certified Public Accountants : Federal Taxation Committee . 2004 . The Record Retention Guide . https:\/\/www.cpa.net\/resources\/retengde.pdf. (2004). The Massachusetts Society of Certified Public Accountants: Federal Taxation Committee. 2004. The Record Retention Guide. https:\/\/www.cpa.net\/resources\/retengde.pdf. (2004)."},{"key":"e_1_3_2_2_75_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (S&P).","author":"Wang XiaoFeng","year":"2003","unstructured":"XiaoFeng Wang and Mike Reiter . 2003 . Defending Against Denial-of-Service Attacks with Puzzle Auctions . In Proceedings of the IEEE Symposium on Security and Privacy (S&P). XiaoFeng Wang and Mike Reiter. 2003. Defending Against Denial-of-Service Attacks with Puzzle Auctions. In Proceedings of the IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01931269"},{"key":"e_1_3_2_2_77_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium.","author":"Wolchok Scott","year":"2010","unstructured":"Scott Wolchok , Owen S. Hofmann , Nadia Heninger , Edward W. Felten , J. Alex Halderman , Christopher J. Rossbach , Brent Waters , and Emmett Witchel . 2010 . Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs . In Proceedings of the Network and Distributed System Security Symposium. Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett Witchel. 2010. Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs. In Proceedings of the Network and Distributed System Security Symposium."},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.863969"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243800","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243800","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:18Z","timestamp":1750212498000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243800"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":76,"alternative-id":["10.1145\/3243734.3243800","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243800","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}