{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:13Z","timestamp":1750221073393,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3265723.3265726","type":"proceedings-article","created":{"date-parts":[[2018,9,21]],"date-time":"2018-09-21T12:42:08Z","timestamp":1537533728000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["CryptZip"],"prefix":"10.1145","author":[{"given":"Yiwen","family":"Shao","sequence":"first","affiliation":[{"name":"SKL Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Sa","family":"Wang","sequence":"additional","affiliation":[{"name":"SKL Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yungang","family":"Bao","sequence":"additional","affiliation":[{"name":"SKL Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2015. CryptDB. https:\/\/css.csail.mit.edu\/cryptdb\/. (2015).  2015. CryptDB. https:\/\/css.csail.mit.edu\/cryptdb\/. (2015)."},{"key":"e_1_3_2_1_2_1","unstructured":"2018. Backup and Recovery. (2018). https:\/\/dev.mysql.com\/doc\/refman\/5.7\/en\/backup-and-recovery.html  2018. Backup and Recovery. (2018). https:\/\/dev.mysql.com\/doc\/refman\/5.7\/en\/backup-and-recovery.html"},{"volume-title":"https:\/\/www.percona.com\/software\/mysql-database\/percona-xtrabackup","year":"2018","key":"e_1_3_2_1_3_1","unstructured":"2018. Xtrabackup. ( 2018 ). https:\/\/www.percona.com\/software\/mysql-database\/percona-xtrabackup 2018. Xtrabackup. (2018). https:\/\/www.percona.com\/software\/mysql-database\/percona-xtrabackup"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033036.2033080"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2590701.2590705"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35362-8_15"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.154"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_13_1","volume-title":"School of Computing Science","author":"Hosseini Mohammad","year":"2012","unstructured":"Mohammad Hosseini . 2012. A survey of data compression algorithms and their applications. Network Systems Laboratory , School of Computing Science , Simon Fraser University , BC , Canada ( 2012 ). Mohammad Hosseini. 2012. A survey of data compression algorithms and their applications. Network Systems Laboratory, School of Computing Science, Simon Fraser University, BC, Canada (2012)."},{"key":"e_1_3_2_1_14_1","first-page":"1","article-title":"Intel\u00ae Software Guard Extensions: EPID Provisioning and Attestation Services","volume":"1","author":"Johnson Simon","year":"2016","unstructured":"Simon Johnson , Vinnie Scarlata , Carlos Rozas , Ernie Brickell , and Frank Mckeen . 2016 . Intel\u00ae Software Guard Extensions: EPID Provisioning and Attestation Services . White Paper 1 (2016), 1 -- 10 . Simon Johnson, Vinnie Scarlata, Carlos Rozas, Ernie Brickell, and Frank Mckeen. 2016. Intel\u00ae Software Guard Extensions: EPID Provisioning and Attestation Services. White Paper 1 (2016), 1--10.","journal-title":"White Paper"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_3_2_1_16_1","volume-title":"Apr","author":"Kaplan David","year":"2016","unstructured":"David Kaplan , Jeremy Powell , and Tom Woller . 2016. AMD memory encryption. White paper , Apr ( 2016 ). David Kaplan, Jeremy Powell, and Tom Woller. 2016. AMD memory encryption. White paper, Apr (2016)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2512491"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39256-6_13"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45204-8_2"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1462735.1462739"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_22_1","unstructured":"Antonis Papadimitriou Ranjita Bhagwan Nishanth Chandran Ramachandran Ramjee Andreas Haeberlen Harmeet Singh Abhishek Modi and Saikrishna Badrinarayanan. 2016. Big Data Analytics over Encrypted Datasets with Seabed.. In OSDI. 587--602.   Antonis Papadimitriou Ranjita Bhagwan Nishanth Chandran Ramachandran Ramjee Andreas Haeberlen Harmeet Singh Abhishek Modi and Saikrishna Badrinarayanan. 2016. Big Data Analytics over Encrypted Datasets with Seabed.. In OSDI. 587--602."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technology","author":"Rijmen Vincent","year":"2001","unstructured":"Vincent Rijmen and Joan Daemen . 2001 . Advanced encryption standard . Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technology (2001), 19--22. Vincent Rijmen and Joan Daemen. 2001. Advanced encryption standard. Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technology (2001), 19--22."},{"key":"e_1_3_2_1_26_1","volume-title":"On data banks and privacy homomorphisms. Foundations of secure computation 4, 11","author":"Rivest Ronald L","year":"1978","unstructured":"Ronald L Rivest , Len Adleman , and Michael L Dertouzos . 1978. On data banks and privacy homomorphisms. Foundations of secure computation 4, 11 ( 1978 ), 169--180. Ronald L Rivest, Len Adleman, and Michael L Dertouzos. 1978. On data banks and privacy homomorphisms. Foundations of secure computation 4, 11 (1978), 169--180."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884426"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"}],"event":{"name":"APSys '18: 9th Asia-Pacific Workshop on Systems","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Jeju Island Republic of Korea","acronym":"APSys '18"},"container-title":["Proceedings of the 9th Asia-Pacific Workshop on Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3265723.3265726","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3265723.3265726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:28Z","timestamp":1750208248000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3265723.3265726"}},"subtitle":["Squeezing out the Redundancy in Homomorphically Encrypted Backup Data"],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":28,"alternative-id":["10.1145\/3265723.3265726","10.1145\/3265723"],"URL":"https:\/\/doi.org\/10.1145\/3265723.3265726","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}