{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:04:39Z","timestamp":1774915479768,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":92,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427248","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"510-525","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Privacy-Preserving Production Process Parameter Exchange"],"prefix":"10.1145","author":[{"given":"Jan","family":"Pennekamp","sequence":"first","affiliation":[{"name":"RWTH Aachen University, Germany"}]},{"given":"Erik","family":"Buchholz","sequence":"additional","affiliation":[{"name":"RWTH Aachen University"}]},{"given":"Yannik","family":"Lockner","sequence":"additional","affiliation":[{"name":"RWTH Aachen University"}]},{"given":"Markus","family":"Dahlmanns","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Germany"}]},{"given":"Tiandong","family":"Xi","sequence":"additional","affiliation":[{"name":"RWTH Aachen University"}]},{"given":"Marcel","family":"Fey","sequence":"additional","affiliation":[{"name":"RWTH Aachen University"}]},{"given":"Christian","family":"Brecher","sequence":"additional","affiliation":[{"name":"RWTH Aachen University"}]},{"given":"Christian","family":"Hopmann","sequence":"additional","affiliation":[{"name":"RWTH Aachen University"}]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Optimization of injection molding process parameters by a hybrid of artificial neural network and artificial bee colony algorithm. Revista Facultad de Ingenier\u00eda Universidad de Antioquia67","author":"Alvarado\u00a0Iniesta Alejandro","year":"2013"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516738"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237996"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2010.118"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2018.10.066"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_7"},{"key":"e_1_3_2_1_10_1","first-page":"526","article-title":"Sind Wechselwirkungen simulierbar? Prozessoptimierung beim Spritzgie\u00dfen mit statistischer Versuchsplanung","volume":"10","author":"Bourdon Rainer","year":"2010","journal-title":"Kunststoffe"},{"key":"e_1_3_2_1_11_1","first-page":"525","article-title":"Standardized optimization of process and quality by DOE methods \u2014 a short manual for injection molding in practice","volume":"8","author":"Bourdon Rainer","year":"2012","journal-title":"Journal of Plastics Technology"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2019.11.463"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16120-9_9"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-008-1843-4"},{"key":"e_1_3_2_1_16_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE \u201917)","author":"Chhetri Sujit\u00a0Rokka","year":"2017"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492461"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_12"},{"key":"e_1_3_2_1_19_1","unstructured":"Cisco. 2020. Cisco Annual Internet Report (2018\u20132023) White Paper. White Paper. Cisco.  Cisco. 2020. Cisco Annual Internet Report (2018\u20132023) White Paper. White Paper. Cisco."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888121"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31410-0_23"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2004.04.012"},{"key":"e_1_3_2_1_24_1","unstructured":"Emiliano De\u00a0Cristofaro Yanbin Lu and Gene Tsudik. 2010. Privacy-preserving Sharing of Sensitive Information. Cryptology ePrint Archive 2010\/471.  Emiliano De\u00a0Cristofaro Yanbin Lu and Gene Tsudik. 2010. Privacy-preserving Sharing of Sensitive Information. Cryptology ePrint Archive 2010\/471."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_13"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2016.08.030"},{"key":"e_1_3_2_1_27_1","unstructured":"Tim Dierks and Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246.  Tim Dierks and Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246."},{"key":"e_1_3_2_1_28_1","volume-title":"Encrypted data processing with Homomorphic Re-Encryption. Information Sciences 409\u2013410","author":"Ding Wenxiu","year":"2017"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3812.3818"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11465-018-0491-0"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359993.3366646"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2966402"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-019-04283-z"},{"key":"e_1_3_2_1_35_1","unstructured":"Tsuyoshi Hombashi. 2016. Tcconfig. https:\/\/github.com\/thombashi\/tcconfig.  Tsuyoshi Hombashi. 2016. Tcconfig. https:\/\/github.com\/thombashi\/tcconfig."},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 30th International Colloquium Plastics Technology.","author":"Hopmann Christian","year":"2020"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 76th SPE Annual Technical Conference and Tradeshow (ANTEC \u201918)","author":"Hopmann Christian","year":"2018"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.5121656"},{"key":"e_1_3_2_1_39_1","unstructured":"Van Jacobson Craig Leres and Steven McCanne. 1988. TCPDUMP\/LIBPCAP public repository. https:\/\/www.tcpdump.org\/.  Van Jacobson Craig Leres and Steven McCanne. 1988. TCPDUMP\/LIBPCAP public repository. https:\/\/www.tcpdump.org\/."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","volume-title":"Industrial Internet of Things and Cyber Manufacturing Systems","author":"Jeschke Sabina","DOI":"10.1007\/978-3-319-42559-7_1"},{"key":"e_1_3_2_1_41_1","series-title":"Suppl 5","volume-title":"Private genome analysis through homomorphic encryption. BMC Medical Informatics and Decision Making 15","author":"Kim Miran","year":"2015"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978381"},{"key":"e_1_3_2_1_43_1","first-page":"597","article-title":"Predictive model and optimization of processing parameters for plastic injection moulding","volume":"51","author":"Kramar Davorin","year":"2017","journal-title":"Materials and Technology"},{"key":"e_1_3_2_1_44_1","volume-title":"Smart manufacturing must embrace big data. Nature 544, 7648","author":"Kusiak Andrew","year":"2017"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2018.03.004"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2014.03.041"},{"key":"e_1_3_2_1_47_1","first-page":"49","article-title":"Optimization of plastic injection molding process by combination of artificial neural network and genetic algorithm","volume":"6","author":"Meiabadi Mohammad\u00a0Saleh","year":"2013","journal-title":"Journal of Optimization in Industrial Engineering"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2018.07.143"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24363"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 12th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA \u201901)","author":"Naor Moni","year":"2001"},{"key":"e_1_3_2_1_52_1","volume-title":"Injection Molding Handbook","author":"Osswald A.","edition":"2"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/GCIoT47977.2019.9058413"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2019.8780276"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338499.3357357"},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium (SEC \u201914)","author":"Pinkas Benny","year":"2014"},{"key":"e_1_3_2_1_58_1","unstructured":"PlasticsEurope. 2019. Gesch\u00e4ftsbericht 2018. Technical Report. PlasticsEurope Deutschland e.V.  PlasticsEurope. 2019. Gesch\u00e4ftsbericht 2018. Technical Report. PlasticsEurope Deutschland e.V."},{"key":"e_1_3_2_1_59_1","unstructured":"Sinha Prashant. 2016. pybloomfiltermmap3. https:\/\/github.com\/prashnts\/pybloomfiltermmap3.  Sinha Prashant. 2016. pybloomfiltermmap3. https:\/\/github.com\/prashnts\/pybloomfiltermmap3."},{"key":"e_1_3_2_1_60_1","unstructured":"Michael\u00a0O. Rabin. 2005. How To Exchange Secrets with Oblivious Transfer. Cryptology ePrint Archive 2005\/187.  Michael\u00a0O. Rabin. 2005. How To Exchange Secrets with Oblivious Transfer. Cryptology ePrint Archive 2005\/187."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM.2016.7797998"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2018.11.025"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. IETF RFC 8446.  Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. IETF RFC 8446.","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_1_64_1","unstructured":"Peter Rindal. 2016. libOTe: an efficient portable and easy to use Oblivious Transfer Library. https:\/\/github.com\/osu-crypto\/libOTe.  Peter Rindal. 2016. libOTe: an efficient portable and easy to use Oblivious Transfer Library. https:\/\/github.com\/osu-crypto\/libOTe."},{"key":"e_1_3_2_1_65_1","unstructured":"Peter Rindal. 2016. libPSI: A Private Set Intersection Library. https:\/\/github.com\/osu-crypto\/libPSI.  Peter Rindal. 2016. libPSI: A Private Set Intersection Library. https:\/\/github.com\/osu-crypto\/libPSI."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_9"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134044"},{"key":"e_1_3_2_1_68_1","unstructured":"Armin Ronacher. 2010. Flask. https:\/\/palletsprojects.com\/p\/flask\/.  Armin Ronacher. 2010. Flask. https:\/\/palletsprojects.com\/p\/flask\/."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"e_1_3_2_1_70_1","volume-title":"Using cascading Bloom filters to improve the memory usage for de Brujin graphs. Algorithms for Molecular Biology 9, 1","author":"Salikhov Kamil","year":"2014"},{"key":"e_1_3_2_1_71_1","unstructured":"Salvatore Sanfilippo. 2009. Redis. https:\/\/redis.io\/.  Salvatore Sanfilippo. 2009. Redis. https:\/\/redis.io\/."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.15282\/ijame.14.3.2017.3.0350"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-002-1374-3"},{"key":"e_1_3_2_1_76_1","volume-title":"Celery: Distributed Task Queue","author":"Solem Ask","year":"2009"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884426"},{"key":"e_1_3_2_1_78_1","series-title":"Suppl 2","volume-title":"Efficient and secure outsourcing of genomic data storage. BMC Medical Genomics 10","author":"Sousa Jo\u00e3o\u00a0S\u00e1","year":"2017"},{"key":"e_1_3_2_1_79_1","first-page":"1","article-title":"Optimisation of injection moulded parts by using ANN-PSO approach","volume":"15","author":"Spina Roberto","year":"2006","journal-title":"Journal of Achievements in Materials and Manufacturing Engineering"},{"key":"e_1_3_2_1_80_1","unstructured":"SQLite. 2000. SQLite. https:\/\/www.sqlite.org\/.  SQLite. 2000. SQLite. https:\/\/www.sqlite.org\/."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5978636"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2018.03.087"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-014-6366-6"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-014-0999-z"},{"key":"e_1_3_2_1_85_1","unstructured":"VDI Verein Deutscher Ingenieure e.V.2020. VDI \u2013 The Association of German Engineers. https:\/\/www.vdi.de\/en\/home.  VDI Verein Deutscher Ingenieure e.V.2020. VDI \u2013 The Association of German Engineers. https:\/\/www.vdi.de\/en\/home."},{"key":"e_1_3_2_1_86_1","unstructured":"VDMA e. V. (Mechanical Engineering Industry Association). 2015. The VDMA \u2013 VDMA. https:\/\/www.vdma.org\/en\/.  VDMA e. V. (Mechanical Engineering Industry Association). 2015. The VDMA \u2013 VDMA. https:\/\/www.vdma.org\/en\/."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-016-0043-6"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13678-8_4"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1243\/0954405011519097"},{"key":"e_1_3_2_1_91_1","unstructured":"zafaco GmbH. 2020. Jahresbericht 2018\/19. Technical Report. Breitbandmessung.  zafaco GmbH. 2020. Jahresbericht 2018\/19. Technical Report. Breitbandmessung."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-015-8135-6"},{"key":"e_1_3_2_1_93_1","series-title":"Suppl 5","volume-title":"FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption. BMC Medical Informatics and Decision Making 15","author":"Zhang Yuchen","year":"2015"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980802"},{"key":"e_1_3_2_1_95_1","series-title":"Suppl 2","volume-title":"BLOOM: BLoom filter based Oblivious Outsourced Matchings. BMC Medical Genomics 10","author":"Ziegeldorf Jan\u00a0Henrik","year":"2017"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427248","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427248"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":92,"alternative-id":["10.1145\/3427228.3427248","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427248","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}