{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T17:26:27Z","timestamp":1763141187551,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T00:00:00Z","timestamp":1554681600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,8]]},"DOI":"10.1145\/3297280.3297310","type":"proceedings-article","created":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T12:18:47Z","timestamp":1556713127000},"page":"284-291","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Don't hesitate to share!"],"prefix":"10.1145","author":[{"given":"Subir","family":"Halder","sequence":"first","affiliation":[{"name":"University of Padua, Italy"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padua, Italy"}]}],"member":"320","published-online":{"date-parts":[[2019,4,8]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"A. Acar H. Aksu A.S. Uluagac and M. Conti. 2018. A Survey on Homomorphic Encryption Schemes: Theory and Implementation. Comput. Surveys 51 4 (2018) article no. 79. 10.1145\/3214303","key":"e_1_3_2_1_1_1","DOI":"10.1145\/3214303"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/COMST.2015.2444095"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/3055031.3055080"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"e_1_3_2_1_5_1","first-page":"131A","article-title":"Transitions: Recommendation for Transitioning the use of Cryptographic Algorithms and Key Lengths","volume":"800","author":"Barker E.","year":"2011","unstructured":"E. Barker and A. Roginsky. 2011. Transitions: Recommendation for Transitioning the use of Cryptographic Algorithms and Key Lengths. In NIST Special Publication, Vol. 800. 131A.","journal-title":"NIST Special Publication"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/978-3-642-38980-1_7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1007\/978-3-540-30576-7_18"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/IEMBS.2010.5628067"},{"unstructured":"W. Ding Z. Yan and R. Deng. 2018. Privacy-Preserving Data Processing with Flexible Access Control. IEEE Transactions on Dependable and Secure Computing ( 2018).","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/TIT.2006.871582"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/LCN.2004.38"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1007\/978-3-642-12179-1_28"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/2984511.2984563"},{"unstructured":"Halevi S. and Shoup V. 2018. HElib Library. online accessed November 06 2017. (2018). https:\/\/www.github.com\/shaih\/HElib.","key":"e_1_3_2_1_14_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/1866307.1866358"},{"unstructured":"Keybase. 2018. Publicly Auditable Proofs of Identity. online accessed April 18. (2018). https:\/\/www.keybase.io\/.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/3098243.3098252"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1016\/j.future.2013.06.029"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/IPSN.2008.47"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/2213977.2214086"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.5555\/1756123.1756146"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/2043556.2043566"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/3131672.3131697"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/2809695.2809723"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.5555\/882494.884426"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.5555\/1786014.1786040"},{"unstructured":"Texas Instrument. 2017. SensorTag. online accessed December 17. (2017). http:\/\/www.ti.com\/lit\/ds\/symlink\/cc2650.pdf.","key":"e_1_3_2_1_27_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/3055031.3055079"}],"event":{"sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"acronym":"SAC '19","name":"SAC '19: The 34th ACM\/SIGAPP Symposium on Applied Computing","location":"Limassol Cyprus"},"container-title":["Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297310","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297280.3297310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:14Z","timestamp":1750208534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297310"}},"subtitle":["a novel IoT data protection scheme based on BGN cryptosystem"],"short-title":[],"issued":{"date-parts":[[2019,4,8]]},"references-count":28,"alternative-id":["10.1145\/3297280.3297310","10.1145\/3297280"],"URL":"https:\/\/doi.org\/10.1145\/3297280.3297310","relation":{},"subject":[],"published":{"date-parts":[[2019,4,8]]},"assertion":[{"value":"2019-04-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}