{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:55:01Z","timestamp":1774454101370,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T00:00:00Z","timestamp":1561334400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61379144, 61572026, 61672195, and 61732022"],"award-info":[{"award-number":["61379144, 61572026, 61672195, and 61732022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Grants Council of Hong Kong","award":["CityU C1008-16G"],"award-info":[{"award-number":["CityU C1008-16G"]}]},{"name":"National Key R&D Program of China","award":["2017YFB0802300"],"award-info":[{"award-number":["2017YFB0802300"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,24]]},"DOI":"10.1145\/3326285.3329062","type":"proceedings-article","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T12:42:33Z","timestamp":1560516153000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["pRide"],"prefix":"10.1145","author":[{"given":"Yuchuan","family":"Luo","sequence":"first","affiliation":[{"name":"National University of Defense Technology, Changsha, Hunan, China"}]},{"given":"Xiaohua","family":"Jia","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Kowloon, Hong Kong SAR, China"}]},{"given":"Huayi","family":"Duan","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Kowloon, Hong Kong SAR, China"}]},{"given":"Cong","family":"Wang","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Kowloon, Hong Kong SAR, China"}]},{"given":"Ming","family":"Xu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, Hunan, China"}]},{"given":"Shaojing","family":"Fu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, Hunan, China"}]}],"member":"320","published-online":{"date-parts":[[2019,6,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"d.}. Murder case prompts China's Didi Chuxing to halt Hitch ridesharing. https:\/\/www.engadget.com\/2018\/05\/11\/didi-chuxing-ridesharing- murder-passenger-safety\/. Accessed","year":"2018","unstructured":"{n. d.}. Murder case prompts China's Didi Chuxing to halt Hitch ridesharing. https:\/\/www.engadget.com\/2018\/05\/11\/didi-chuxing-ridesharing- murder-passenger-safety\/. Accessed Jun 7, 2018 . {n. d.}. Murder case prompts China's Didi Chuxing to halt Hitch ridesharing. https:\/\/www.engadget.com\/2018\/05\/11\/didi-chuxing-ridesharing- murder-passenger-safety\/. Accessed Jun 7, 2018."},{"key":"e_1_3_2_1_2_1","volume-title":"Accessed","year":"2017","unstructured":"{n. d.}. Security on ARM TrustZone. https:\/\/www.arm.com\/products\/security-on-arm\/trustzone . Accessed November 23, 2017 . {n. d.}. Security on ARM TrustZone. https:\/\/www.arm.com\/products\/security-on-arm\/trustzone. Accessed November 23, 2017."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2008623.2008645"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of HASP.","author":"Anati Ittai","year":"2013","unstructured":"Ittai Anati , Shay Gueron , Simon Johnson , and Vincent Scarlata . 2013 . Innovative technology for CPU based attestation and sealing . In Proc. of HASP. Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing. In Proc. of HASP."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of USENIX OSDI.","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , Thomas Knauth , Andre Martin , Christian Priebe , Joshua Lind , Divya Muthukumaran , Dan O'Keeffe , Mark Still-well, 2016 . SCONE: Secure Linux Containers with Intel SGX . In Proc. of USENIX OSDI. Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark Still-well, et al. 2016. SCONE: Secure Linux Containers with Intel SGX. In Proc. of USENIX OSDI."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367531"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1468075.1468121"},{"key":"e_1_3_2_1_8_1","volume-title":"Software Grand Exposure: SGX Cache Attacks Are Practical. arXiv preprint arXiv:1702.07521","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. arXiv preprint arXiv:1702.07521 ( 2017 ). Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. arXiv preprint arXiv:1702.07521 (2017)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/795662.796270"},{"key":"e_1_3_2_1_10_1","first-page":"86","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016 . Intel SGX Explained . IACR Cryptology ePrint Archive 2016 (2016), 86 . Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive 2016 (2016), 86.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2590701.2590705"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"key":"e_1_3_2_1_13_1","volume-title":"LightBox: SGX-assisted Secure Network Functions at Near-native Speed. arXiv preprint arXiv:1706.06261","author":"Duan Huayi","year":"2017","unstructured":"Huayi Duan , Xingliang Yuan , and Cong Wang . 2017. LightBox: SGX-assisted Secure Network Functions at Near-native Speed. arXiv preprint arXiv:1706.06261 ( 2017 ). Huayi Duan, Xingliang Yuan, and Cong Wang. 2017. LightBox: SGX-assisted Secure Network Functions at Near-native Speed. arXiv preprint arXiv:1706.06261 (2017)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61176-1_22"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-010-0121-4"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488370"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1758156.1758167"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(08)60467-2"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.91"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535331_16"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813672"},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. of VLDB.","author":"Mokbel Mohamed F","year":"2006","unstructured":"Mohamed F Mokbel , Chi-Yin Chow , and Walid G Aref . 2006 . The new casper: Query processing for location services without compromising privacy . In Proc. of VLDB. Mohamed F Mokbel, Chi-Yin Chow, and Walid G Aref. 2006. The new casper: Query processing for location services without compromising privacy. In Proc. of VLDB."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0042"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813695"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. of USENIX Security.","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko , Felix Schuster , C\u00e9dric Fournet , Aastha Mehta , Sebastian Nowozin , Kapil Vaswani , and Manuel Costa . 2016 . Oblivious Multi-Party Machine Learning on Trusted Processors . In Proc. of USENIX Security. Olga Ohrimenko, Felix Schuster, C\u00e9dric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious Multi-Party Machine Learning on Trusted Processors. In Proc. of USENIX Security."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.87"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. of USENIX Security.","author":"Anh Pham Thi Van","year":"2017","unstructured":"Thi Van Anh Pham , Italo Ivan Dacosta Petrocelli , Guillaume Francois Maurice Endignoux , Juan Ram\u00f3n Troncoso-Pastoriza , K\u00e9vin Huguenin , and Jean-Pierre Hubaux . 2017 . ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service . In Proc. of USENIX Security. Thi Van Anh Pham, Italo Ivan Dacosta Petrocelli, Guillaume Francois Maurice Endignoux, Juan Ram\u00f3n Troncoso-Pastoriza, K\u00e9vin Huguenin, and Jean-Pierre Hubaux. 2017. ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service. In Proc. of USENIX Security."},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. of PETS.","author":"Anh Pham Thi Van","year":"2017","unstructured":"Thi Van Anh Pham , Italo Ivan Dacosta Petrocelli , Bastien Jacot-Guillarmod , K\u00e9vin Huguenin , Taha Hajar , Florian Tram\u00e8r , Virgil Gligor , and Jean-Pierre Hubaux . 2017 . PrivateRide: A Privacy-Enhanced Ride-Hailing Service . In Proc. of PETS. Thi Van Anh Pham, Italo Ivan Dacosta Petrocelli, Bastien Jacot-Guillarmod, K\u00e9vin Huguenin, Taha Hajar, Florian Tram\u00e8r, Virgil Gligor, and Jean-Pierre Hubaux. 2017. PrivateRide: A Privacy-Enhanced Ride-Hailing Service. In Proc. of PETS."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2569090"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_35_1","volume-title":"Proc. of USENIX NSDI.","author":"Wang Frank","year":"2017","unstructured":"Frank Wang , Catherine Yun , Shafi Goldwasser , Vinod Vaikuntanathan , and Matei Zaharia . 2017 . Splinter: Practical Private Queries on Public Data . In Proc. of USENIX NSDI. Frank Wang, Catherine Yun, Shafi Goldwasser, Vinod Vaikuntanathan, and Matei Zaharia. 2017. Splinter: Practical Private Queries on Public Data. In Proc. of USENIX NSDI."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_5"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030630"},{"key":"e_1_3_2_1_40_1","volume-title":"Proc. of USENIX NSDI.","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro G Beekman , Raluca Ada Popa , Joseph E Gonzalez , and Ion Stoica . 2017 . Opaque: An Oblivious and Encrypted Distributed Analytics Platform . In Proc. of USENIX NSDI. Wenting Zheng, Ankur Dave, Jethro G Beekman, Raluca Ada Popa, Joseph E Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In Proc. of USENIX NSDI."}],"event":{"name":"IWQoS '19: IEEE\/ACM International Symposium on Quality of Service","location":"Phoenix Arizona","acronym":"IWQoS '19"},"container-title":["Proceedings of the International Symposium on Quality of Service"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326285.3329062","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3326285.3329062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:00Z","timestamp":1750206360000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326285.3329062"}},"subtitle":["private ride request for online ride hailing service with secure hardware enclave"],"short-title":[],"issued":{"date-parts":[[2019,6,24]]},"references-count":40,"alternative-id":["10.1145\/3326285.3329062","10.1145\/3326285"],"URL":"https:\/\/doi.org\/10.1145\/3326285.3329062","relation":{},"subject":[],"published":{"date-parts":[[2019,6,24]]},"assertion":[{"value":"2019-06-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}