{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:35:37Z","timestamp":1767339337055,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T00:00:00Z","timestamp":1608249600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,18]]},"DOI":"10.1145\/3446569.3446586","type":"proceedings-article","created":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T19:41:44Z","timestamp":1616701304000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Multiparty Computation in Practice: Increasing Security of Documents in Enterprise Content Management Systems"],"prefix":"10.1145","author":[{"given":"Adam","family":"Ga\u0142\u0105zkiewicz","sequence":"first","affiliation":[{"name":"Poznan University of Economics and Business, Poland"}]},{"given":"Adam","family":"W\u00f3jtowicz","sequence":"additional","affiliation":[{"name":"Poznan University of Economics and Business, Poland"}]}],"member":"320","published-online":{"date-parts":[[2021,3,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3264419"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491533.2491553"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509980"},{"key":"e_1_3_2_1_4_1","volume-title":"Introducing \u2018The World's Billionaires Problem. Retrieved","author":"Schoenmakers Berry","year":"2020","unstructured":"Berry Schoenmakers . 2018. Introducing \u2018The World's Billionaires Problem. Retrieved November 1, 2020 from https:\/\/priviledge-project.eu\/news\/introducing-the-world-s-billionaires-problem Berry Schoenmakers. 2018. Introducing \u2018The World's Billionaires Problem. Retrieved November 1, 2020 from https:\/\/priviledge-project.eu\/news\/introducing-the-world-s-billionaires-problem"},{"key":"e_1_3_2_1_5_1","unstructured":"Antonio Marcedone Zikai Wen and E. Shi. 2015. Secure Dating with Four or Fewer Cards (A short note on teaching cryptography). Retrieved November 1 2020 from https:\/\/eprint.iacr.org\/2015\/1031.pdf  Antonio Marcedone Zikai Wen and E. Shi. 2015. Secure Dating with Four or Fewer Cards (A short note on teaching cryptography). Retrieved November 1 2020 from https:\/\/eprint.iacr.org\/2015\/1031.pdf"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214087"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818027"},{"key":"e_1_3_2_1_11_1","volume-title":"Nigel P Smart and Rebecca N Wright.","author":"Archer David W.","year":"2018","unstructured":"David W. Archer , Dan Bogdanov , Yehuda Lindell , Liina Kamm , Kurt Nielsen , Jakob Illeborg Pagter , Nigel P Smart and Rebecca N Wright. 2018 . From Keys to Databases\u2014Real-World Applications of Secure Multi-Party Computation,\u00a0 The Computer Journal 61, 12 (December 2018), 1749\u20131771,\u00a0https:\/\/doi.org\/10.1093\/comjnl\/bxy090 10.1093\/comjnl David W. Archer, Dan Bogdanov, Yehuda Lindell, Liina Kamm, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P Smart and Rebecca N Wright. 2018. From Keys to Databases\u2014Real-World Applications of Secure Multi-Party Computation,\u00a0 The Computer Journal 61, 12 (December 2018), 1749\u20131771,\u00a0https:\/\/doi.org\/10.1093\/comjnl\/bxy090"},{"volume-title":"2013 IEEE Int. Conf. Technologies for Homeland Security (HST), 93\u201398","author":"Scott","key":"e_1_3_2_1_12_1","unstructured":"Scott E. Coull and Erin Kenneally. 2013. Toward a comprehensive disclosure control framework for shared data . 2013 IEEE Int. Conf. Technologies for Homeland Security (HST), 93\u201398 . IEEE. Scott E. Coull and Erin Kenneally. 2013. Toward a comprehensive disclosure control framework for shared data. 2013 IEEE Int. Conf. Technologies for Homeland Security (HST), 93\u201398. IEEE."},{"volume-title":"How to securely perform computations on secret-shared data. Master's Thesis","author":"Bogdanov Dan","key":"e_1_3_2_1_13_1","unstructured":"Dan Bogdanov . 2007. How to securely perform computations on secret-shared data. Master's Thesis , Univ. of Tartu , Estonia Dan Bogdanov. 2007. How to securely perform computations on secret-shared data. Master's Thesis, Univ. of Tartu, Estonia"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_15"},{"volume-title":"A curated list of multi party computation resources and links. Retrieved","year":"2020","key":"e_1_3_2_1_17_1","unstructured":"Rdragos. 2020. A curated list of multi party computation resources and links. Retrieved November 1, 2020 from https:\/\/github.com\/rdragos\/awesome-mpc Rdragos. 2020. A curated list of multi party computation resources and links. Retrieved November 1, 2020 from https:\/\/github.com\/rdragos\/awesome-mpc"},{"volume-title":"The Fresco documentation. Retrieved","year":"2020","key":"e_1_3_2_1_18_1","unstructured":"Fresco. 2018. The Fresco documentation. Retrieved November 1, 2020 from https:\/\/fresco.readthedocs.io\/en\/latest\/ Fresco. 2018. The Fresco documentation. Retrieved November 1, 2020 from https:\/\/fresco.readthedocs.io\/en\/latest\/"},{"volume-title":"European Symposium on Research in Computer Security, 1\u201318","author":"Damg\u00e5rd Ivan","key":"e_1_3_2_1_19_1","unstructured":"Ivan Damg\u00e5rd , Marcel Keller , Enrique Larraia , Valerio Pastro , Peter Scholl and Nigel P. Smart . 2013. Practical covertly secure MPC for dishonest majority\u2013or: breaking the SPDZ limits . European Symposium on Research in Computer Security, 1\u201318 . Springer. Ivan Damg\u00e5rd, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl and Nigel P. Smart. 2013. Practical covertly secure MPC for dishonest majority\u2013or: breaking the SPDZ limits. European Symposium on Research in Computer Security, 1\u201318. Springer."},{"volume-title":"JavaScript library for building web-based applications that employ secure multi-party computation (MPC). Retrieved","year":"2020","key":"e_1_3_2_1_20_1","unstructured":"Multiparty. 2020. JavaScript library for building web-based applications that employ secure multi-party computation (MPC). Retrieved November 1, 2020 from https:\/\/github.com\/multiparty\/jiff Multiparty. 2020. JavaScript library for building web-based applications that employ secure multi-party computation (MPC). Retrieved November 1, 2020 from https:\/\/github.com\/multiparty\/jiff"},{"key":"e_1_3_2_1_21_1","volume-title":"the Virtual Ideal Functionality Framework. Retrieved","author":"Team VIFF","year":"2020","unstructured":"VIFF Team . 2010. VIFF , the Virtual Ideal Functionality Framework. Retrieved November 1, 2020 from http:\/\/viff.dk\/ VIFF Team. 2010. VIFF, the Virtual Ideal Functionality Framework. Retrieved November 1, 2020 from http:\/\/viff.dk\/"},{"volume-title":"Realizing Distributed RSA using Secure Multiparty Computations","author":"Mauland Atle","key":"e_1_3_2_1_22_1","unstructured":"Atle Mauland . 2009. Realizing Distributed RSA using Secure Multiparty Computations . Norwegian University of Science and Technology . Trondheim, Norway Atle Mauland. 2009. Realizing Distributed RSA using Secure Multiparty Computations. Norwegian University of Science and Technology. Trondheim, Norway"},{"volume-title":"Realizing Secure Multiparty","author":"H\u00e5vard Vegge","key":"e_1_3_2_1_23_1","unstructured":"H\u00e5vard Vegge 2009. Realizing Secure Multiparty . Norwegian University of Science and Technology . Trondheim, Norway H\u00e5vard Vegge 2009. Realizing Secure Multiparty. Norwegian University of Science and Technology. Trondheim, Norway"},{"volume-title":"mpc-rsa. Retrieved","year":"2020","key":"e_1_3_2_1_24_1","unstructured":"Damesca. mpc-rsa. Retrieved November 1, 2020 from https:\/\/github.com\/damesca\/mpc-rsa Damesca. mpc-rsa. Retrieved November 1, 2020 from https:\/\/github.com\/damesca\/mpc-rsa"}],"event":{"name":"ICSEB 2020: 2020 The 4th International Conference on Software and e-Business","acronym":"ICSEB 2020","location":"Osaka Japan"},"container-title":["2020 The 4th International Conference on Software and e-Business"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3446569.3446586","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3446569.3446586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:30Z","timestamp":1750193250000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3446569.3446586"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,18]]},"references-count":23,"alternative-id":["10.1145\/3446569.3446586","10.1145\/3446569"],"URL":"https:\/\/doi.org\/10.1145\/3446569.3446586","relation":{},"subject":[],"published":{"date-parts":[[2020,12,18]]},"assertion":[{"value":"2021-03-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}