{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:35Z","timestamp":1750220735166,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,30]],"date-time":"2020-03-30T00:00:00Z","timestamp":1585526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,30]]},"DOI":"10.1145\/3341105.3373947","type":"proceedings-article","created":{"date-parts":[[2020,3,29]],"date-time":"2020-03-29T12:13:52Z","timestamp":1585484032000},"page":"250-258","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Privacy preserving cooperative computation for personalized web search applications"],"prefix":"10.1145","author":[{"given":"Nesrine","family":"Kaaniche","sequence":"first","affiliation":[{"name":"University of Sheffield, Sheffield, United Kingdom"}]},{"given":"Souha","family":"Masmoudi","sequence":"additional","affiliation":[{"name":"Telecom SudParis, Institut Polytechnique de Paris, Evry, France"}]},{"given":"Souha","family":"Znina","sequence":"additional","affiliation":[{"name":"Telecom SudParis, Institut Polytechnique de Paris, Evry, France"}]},{"given":"Maryline","family":"Laurent","sequence":"additional","affiliation":[{"name":"Telecom SudParis, Institut Polytechnique de Paris, Evry, France"}]},{"given":"Levent","family":"Demir","sequence":"additional","affiliation":[{"name":"Qwant Research, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2020,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. Data store for Qwant Masq. https:\/\/github.com\/QwantResearch\/masq-app\/.  2019. Data store for Qwant Masq. https:\/\/github.com\/QwantResearch\/masq-app\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2019. Qwant web browser. https:\/\/www.qwant.com\/?l=en.  2019. Qwant web browser. https:\/\/www.qwant.com\/?l=en."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.05.009"},{"key":"e_1_3_2_1_4_1","first-page":"801","article-title":"Blind Web Search: How far are we from a privacy preserving search engine","volume":"2016","author":"\u00c7etin Gizem S","year":"2016","unstructured":"Gizem S \u00c7etin , Wei Dai , Yarkin Dor\u00f6z , William J Martin , and Berk Sunar . 2016 . Blind Web Search: How far are we from a privacy preserving search engine ? IACR Cryptology ePrint Archive 2016 (2016), 801 . Gizem S \u00c7etin, Wei Dai, Yarkin Dor\u00f6z, William J Martin, and Berk Sunar. 2016. Blind Web Search: How far are we from a privacy preserving search engine? IACR Cryptology ePrint Archive 2016 (2016), 801.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_5_1","first-page":"19","article-title":"A survey of query log privacy-enhancing techniques from a policy perspective","volume":"2","author":"Cooper Alissa","year":"2008","unstructured":"Alissa Cooper . 2008 . A survey of query log privacy-enhancing techniques from a policy perspective . ACM Transactions on the Web (TWEB) 2 , 4 (2008), 19 . Alissa Cooper. 2008. A survey of query log privacy-enhancing techniques from a policy perspective. ACM Transactions on the Web (TWEB) 2, 4 (2008), 19.","journal-title":"ACM Transactions on the Web (TWEB)"},{"key":"e_1_3_2_1_6_1","volume-title":"Muhammad Rizwan Asghar, and Giovanni Russello.","author":"Cui Shujie","year":"2018","unstructured":"Shujie Cui , Sana Belguith , Pramodya De Alwis , Muhammad Rizwan Asghar, and Giovanni Russello. 2018 . Malicious entities are in vain: Preserving privacy in publish and subscribe systems. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). IEEE , 1624--1627. Shujie Cui, Sana Belguith, Pramodya De Alwis, Muhammad Rizwan Asghar, and Giovanni Russello. 2018. Malicious entities are in vain: Preserving privacy in publish and subscribe systems. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). IEEE, 1624--1627."},{"key":"e_1_3_2_1_7_1","volume-title":"Muhammad Rizwan Asghar, and Giovanni Russello.","author":"Cui Shujie","year":"2019","unstructured":"Shujie Cui , Sana Belguith , Pramodya De Alwis , Muhammad Rizwan Asghar, and Giovanni Russello. 2019 . Collusion defender: preserving subscribers' privacy in publish and subscribe systems. IEEE Transactions on Dependable and Secure Computing ( 2019). Shujie Cui, Sana Belguith, Pramodya De Alwis, Muhammad Rizwan Asghar, and Giovanni Russello. 2019. Collusion defender: preserving subscribers' privacy in publish and subscribe systems. IEEE Transactions on Dependable and Secure Computing (2019)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2364616"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/5992.919270"},{"key":"e_1_3_2_1_10_1","first-page":"169","article-title":"Fully homomorphic encryption using ideal lattices","volume":"9","author":"Craig Gentry","year":"2009","unstructured":"Craig Gentry et al. 2009 . Fully homomorphic encryption using ideal lattices .. In Stoc , Vol. 9. 169 -- 178 . Craig Gentry et al. 2009. Fully homomorphic encryption using ideal lattices.. In Stoc, Vol. 9. 169--178.","journal-title":"Stoc"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_14"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.07.006"},{"key":"e_1_3_2_1_13_1","volume-title":"Decentralized Search on Decentralized Web. arXiv preprint arXiv:1809.00939","author":"Lai Ziliang","year":"2018","unstructured":"Ziliang Lai , Chris Liu , Eric Lo , Ben Kao , and Siu-Ming Yiu . 2018. Decentralized Search on Decentralized Web. arXiv preprint arXiv:1809.00939 ( 2018 ). Ziliang Lai, Chris Liu, Eric Lo, Ben Kao, and Siu-Ming Yiu. 2018. Decentralized Search on Decentralized Web. arXiv preprint arXiv:1809.00939 (2018)."},{"key":"e_1_3_2_1_14_1","volume-title":"How retailers can keep up with consumers","author":"MacKenzie Ian","year":"2013","unstructured":"Ian MacKenzie , Chris Meyer , and Steve Noble . 2013. How retailers can keep up with consumers . McKinsey & Company ( 2013 ). Ian MacKenzie, Chris Meyer, and Steve Noble. 2013. How retailers can keep up with consumers. McKinsey & Company (2013)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940296"},{"volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"P\u00e0mies-Estrems David","key":"e_1_3_2_1_16_1","unstructured":"David P\u00e0mies-Estrems , Nesrine Kaaniche , Maryline Laurent , Jordi Castell\u00e0-Roca , and Joaquin Garcia-Alfaro . 2018. Lifelogging protection scheme for internet-based personal assistants . In Data Privacy Management, Cryptocurrencies and Blockchain Technology . Springer , 431--440. David P\u00e0mies-Estrems, Nesrine Kaaniche, Maryline Laurent, Jordi Castell\u00e0-Roca, and Joaquin Garcia-Alfaro. 2018. Lifelogging protection scheme for internet-based personal assistants. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 431--440."},{"key":"e_1_3_2_1_17_1","volume-title":"CYCLOSA: Decentralizing Private Web Search Through SGX-Based Browser Extensions. IEEE 38th International Conference on Distributed Computing Systems","author":"Pires Rafael","year":"2018","unstructured":"Rafael Pires , David Goltzsche , Sonia Ben Mokhtar , Sara Bouchenak , Antoine Boutet , Pascal Felber , R\u00fcdiger Kapitza , Marcelo Pasin , and Valerio Schiavoni . 2018 . CYCLOSA: Decentralizing Private Web Search Through SGX-Based Browser Extensions. IEEE 38th International Conference on Distributed Computing Systems (2018), 467--477. Rafael Pires, David Goltzsche, Sonia Ben Mokhtar, Sara Bouchenak, Antoine Boutet, Pascal Felber, R\u00fcdiger Kapitza, Marcelo Pasin, and Valerio Schiavoni. 2018. CYCLOSA: Decentralizing Private Web Search Through SGX-Based Browser Extensions. IEEE 38th International Conference on Distributed Computing Systems (2018), 467--477."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.109"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.09.003"},{"key":"e_1_3_2_1_20_1","volume-title":"Supporting privacy protection in personalized web search","author":"Shou Lidan","year":"2012","unstructured":"Lidan Shou , He Bai , Ke Chen , and Gang Chen . 2012. Supporting privacy protection in personalized web search . IEEE transactions on knowledge and data engineering 26, 2 ( 2012 ), 453--467. Lidan Shou, He Bai, Ke Chen, and Gang Chen. 2012. Supporting privacy protection in personalized web search. IEEE transactions on knowledge and data engineering 26, 2 (2012), 453--467."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2931896"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2848977"}],"event":{"name":"SAC '20: The 35th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Brno Czech Republic","acronym":"SAC '20"},"container-title":["Proceedings of the 35th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341105.3373947","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341105.3373947","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:29Z","timestamp":1750199909000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341105.3373947"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,30]]},"references-count":22,"alternative-id":["10.1145\/3341105.3373947","10.1145\/3341105"],"URL":"https:\/\/doi.org\/10.1145\/3341105.3373947","relation":{},"subject":[],"published":{"date-parts":[[2020,3,30]]},"assertion":[{"value":"2020-03-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}