{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:02Z","timestamp":1750220882833,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3340500","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Privacy-Enhancing Fall Detection from Remote Sensor Data Using Multi-Party Computation"],"prefix":"10.1145","author":[{"given":"Pradip","family":"Mainali","sequence":"first","affiliation":[{"name":"OneSpan, Brussels, Belgium"}]},{"given":"Carlton","family":"Shepherd","sequence":"additional","affiliation":[{"name":"OneSpan, Cambridge, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"volume-title":"Fall classification by machine learning using mobile phones. PloS one 7, 5","year":"2012","author":"Albert Mark V","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon. 2019. Amazon EC2 T2 instances. https:\/\/aws.amazon.com\/ec2\/instance-types\/t2\/.  Amazon. 2019. Amazon EC2 T2 instances. https:\/\/aws.amazon.com\/ec2\/instance-types\/t2\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.09.014"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2012.6234271"},{"key":"e_1_3_2_1_6_1","unstructured":"Ping Chen. 2012. Secure Multiparty Computation for Privacy Preserving Data Mining. Master's thesis. TU Eindhoven.  Ping Chen. 2012. Secure Multiparty Computation for Privacy Preserving Data Mining. Master's thesis. TU Eindhoven."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274736"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_10"},{"volume-title":"Design of large scale applications of secure multiparty computation: secure linear programming. Ph. D. dissertation","year":"2012","author":"de Hoogh Sebastiaan","key":"e_1_3_2_1_10_1"},{"volume-title":"International Conference on Financial Cryptography and Data Security. Springer.","author":"de Hoogh Sebastiaan","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/s141019806"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2011.65"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-74161-1_16"},{"volume-title":"Annual International Conference of the IEEE. IEEE, 252--255","year":"2012","author":"Edgcomb Alex","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1111\/jgs.15304"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.12.015"},{"volume-title":"Annual Norwegian Computer Science Conference.","year":"2007","author":"Gafurov Davrondzhon","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2007.380623"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.09.006"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2009.09.002"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2012.6374552"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2382568"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2014.09.005"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/s120912301"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"volume-title":"Fall detection and activity recognition with machine learning. Informatica 33, 2","year":"2009","author":"Lu\u0161trek Mitja","key":"e_1_3_2_1_27_1"},{"volume-title":"Smart, and Frederik Vercauteren","year":"2017","author":"Makri Eleftheria","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415569"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-012-0246-9"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18103363"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00391-012-0404-5"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2011.09.037"},{"volume-title":"Nicola Blago, Tullio Facchinetti, and Marco Piastra.","year":"2018","author":"Musci Mirto","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457163"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEngT.2012.6339316"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18041155"},{"volume-title":"Workshop on the Theory and Practice of MPC. https:\/\/github.com\/lschoe\/mpyc.","year":"2018","author":"Schoenmakers Berry","key":"e_1_3_2_1_39_1"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"volume-title":"Kristof Van Laerhoven, and Bernt Schiele","year":"2008","author":"Stikic Maja","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18041101"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.3390\/s121216920"},{"volume-title":"Nguyen Dinh Thuc, and Deokjai Choi.","year":"2012","author":"Thang Hoang Minh","key":"e_1_3_2_1_44_1"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.216"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18061811"},{"volume-title":"International Workshop on Sensing for App Phones. 31--35","year":"2010","author":"Yavuz Gokhan","key":"e_1_3_2_1_47_1"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31522-0_95"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.58"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340500","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3340500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340500"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":49,"alternative-id":["10.1145\/3339252.3340500","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3340500","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}