{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:41:59Z","timestamp":1762508519863,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":85,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T00:00:00Z","timestamp":1623196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA and SPAWAR","award":["N66001-15-C-4067"],"award-info":[{"award-number":["N66001-15-C-4067"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2016393, 2029853"],"award-info":[{"award-number":["2016393, 2029853"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,9]]},"DOI":"10.1145\/3448016.3457306","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T17:22:30Z","timestamp":1624036950000},"page":"1892-1905","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["DP-Sync: Hiding Update Patterns in Secure Outsourced Databases with Differential Privacy"],"prefix":"10.1145","author":[{"given":"Chenghong","family":"Wang","sequence":"first","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Johes","family":"Bater","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Kartik","family":"Nayak","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Ashwin","family":"Machanavajjhala","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,18]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0042"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_3_2_2_3_1","unstructured":"Joshua Allen Bolin Ding Janardhan Kulkarni Harsha Nori Olga Ohrimenko and Sergey Yekhanin. 2019. An algorithmic framework for differentially private data analysis on trusted processors. In Advances in Neural Information Processing Systems. 13657--13668.  Joshua Allen Bolin Ding Janardhan Kulkarni Harsha Nori Olga Ohrimenko and Sergey Yekhanin. 2019. An algorithmic framework for differentially private data analysis on trusted processors. In Advances in Neural Information Processing Systems. 13657--13668."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301417.3312496"},{"key":"e_1_3_2_2_5_1","unstructured":"Arvind Arasu Spyros Blanas Ken Eguro Raghav Kaushik Donald Kossmann Ravishankar Ramamurthy and Ramarathnam Venkatesan. 2013. Orthogonal Security with Cipherbase. In CIDR.  Arvind Arasu Spyros Blanas Ken Eguro Raghav Kaushik Donald Kossmann Ravishankar Ramamurthy and Ramarathnam Venkatesan. 2013. Orthogonal Security with Cipherbase. In CIDR."},{"key":"e_1_3_2_2_6_1","unstructured":"Arvind Arasu and Raghav Kaushik. 2013. Oblivious query processing. arXivpreprint arXiv:1312.4012(2013).  Arvind Arasu and Raghav Kaushik. 2013. Oblivious query processing. arXivpreprint arXiv:1312.4012(2013)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17656-3_8"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.14778\/3055330.3055334"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.14778\/3291264.3291274"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_30"},{"key":"e_1_3_2_2_11_1","first-page":"1175","article-title":"Revisiting Leakage Abuse Attacks","volume":"2019","author":"Blackstone Laura","year":"2019","unstructured":"Laura Blackstone , Seny Kamara , and Tarik Moataz . 2019 . Revisiting Leakage Abuse Attacks . IACR Cryptol. ePrint Arch. 2019 (2019), 1175 . Laura Blackstone, Seny Kamara, and Tarik Moataz. 2019. Revisiting Leakage Abuse Attacks. IACR Cryptol. ePrint Arch.2019 (2019), 1175.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033036.2033080"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2448496.2448530"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"volume-title":"Theory of cryptography conference","author":"Boneh Dan","key":"e_1_3_2_2_16_1","unstructured":"Dan Boneh , Eu-Jin Goh , and Kobbi Nissim . 2005. Evaluating 2-DNF formulas on cipher texts . In Theory of cryptography conference . Springer , 325--341. Dan Boneh, Eu-Jin Goh, and Kobbi Nissim. 2005. Evaluating 2-DNF formulas on cipher texts. In Theory of cryptography conference. Springer, 325--341."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133980"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Sebastian Burckhardt. 2014. Principles of eventual consistency. (2014).  Sebastian Burckhardt. 2014. Principles of eventual consistency. (2014).","DOI":"10.1561\/9781601988591"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.132"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_33"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486381"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134102"},{"key":"e_1_3_2_2_25_1","volume-title":"Cryptc: Crypto-assisted differential privacy on untrusted servers. SIGMOD.","author":"Chowdhury Amrita Roy","year":"2019","unstructured":"Amrita Roy Chowdhury , Chenghong Wang , Xi He , Ashwin Machanavajjhala , and Somesh Jha . 2019 . Cryptc: Crypto-assisted differential privacy on untrusted servers. SIGMOD. Amrita Roy Chowdhury, Chenghong Wang, Xi He, Ashwin Machanavajjhala, and Somesh Jha. 2019. Cryptc: Crypto-assisted differential privacy on untrusted servers. SIGMOD."},{"key":"e_1_3_2_2_26_1","volume-title":"Obladi: Oblivious Serializable Transactions in the Cloud. In 13th USENIX Symposium on Operating Systems Design and Implementation(OSDI 18)","author":"Crooks Natacha","year":"2018","unstructured":"Natacha Crooks , Matthew Burke , Ethan Cecchetti , Sitar Harel , Rachit Agarwal ,and Lorenzo Alvisi . 2018 . Obladi: Oblivious Serializable Transactions in the Cloud. In 13th USENIX Symposium on Operating Systems Design and Implementation(OSDI 18) . USENIX Association, Carlsbad, CA, 727--743. https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/crooks Natacha Crooks, Matthew Burke, Ethan Cecchetti, Sitar Harel, Rachit Agarwal,and Lorenzo Alvisi. 2018. Obladi: Oblivious Serializable Transactions in the Cloud. In 13th USENIX Symposium on Operating Systems Design and Implementation(OSDI 18). USENIX Association, Carlsbad, CA, 727--743. https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/crooks"},{"key":"e_1_3_2_2_27_1","volume-title":"Steven D Galbraith, and Giovanni Russello.","author":"Cui Shujie","year":"2019","unstructured":"Shujie Cui , Xiangfu Song , Muhammad Rizwan Asghar , Steven D Galbraith, and Giovanni Russello. 2019 . Privacy-preserving searchable databases with controllable leakage. arXiv preprint arXiv:1909.11624(2019). Shujie Cui, Xiangfu Song, Muhammad Rizwan Asghar, Steven D Galbraith, and Giovanni Russello. 2019. Privacy-preserving searchable databases with controllable leakage. arXiv preprint arXiv:1909.11624(2019)."},{"key":"e_1_3_2_2_28_1","unstructured":"Rachel Cummings Sara Krehbiel Kevin A Lai and Uthaipon Tantipongpipat. 2018. Differential privacy for growing databases. In Advances in Neural Information Processing Systems. 8864--8873.  Rachel Cummings Sara Krehbiel Kevin A Lai and Uthaipon Tantipongpipat. 2018. Differential privacy for growing databases. In Advances in Neural Information Processing Systems. 8864--8873."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2590701.2590705"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2452376.2452397"},{"key":"e_1_3_2_2_31_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Demertzis Ioannis","year":"2020","unstructured":"Ioannis Demertzis , Dimitrios Papadopoulos , Charalampos Papamanthou , and Saurabh Shintre . 2020 . SEAL : Attack Mitigation for Encrypted Databases via Adjustable Leakage . In 29th USENIX Security Symposium (USENIX Security 20) . Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Saurabh Shintre. 2020. SEAL : Attack Mitigation for Encrypted Databases via Adjustable Leakage. In 29th USENIX Security Symposium (USENIX Security 20)."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1873601.1873617"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806787"},{"key":"e_1_3_2_2_34_1","volume-title":"Oblidb: Oblivious query processing using hardware enclaves. arXiv preprint arXiv:1710.00458(2017).","author":"Eskandarian Saba","year":"2017","unstructured":"Saba Eskandarian and Matei Zaharia . 2017 . Oblidb: Oblivious query processing using hardware enclaves. arXiv preprint arXiv:1710.00458(2017). Saba Eskandarian and Matei Zaharia. 2017. Oblidb: Oblivious query processing using hardware enclaves. arXiv preprint arXiv:1710.00458(2017)."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61176-1_22"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243833"},{"volume-title":"Foundations of cryptography","author":"Goldreich Oded","key":"e_1_3_2_2_38_1","unstructured":"Oded Goldreich . 2009. Foundations of cryptography : volume 2 , basic applications. Cambridge university press . Oded Goldreich. 2009. Foundations of cryptography: volume 2, basic applications. Cambridge university press."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243864"},{"volume-title":"2019 IEEE Symposium on Security and Privacy (SP). IEEE, 1067--1083","author":"Grubbs Paul","key":"e_1_3_2_2_40_1","unstructured":"Paul Grubbs , Marie-Sarah Lacharit\u00e9 , Brice Minaud , and Kenneth G Paterson .2019. Learning to reconstruct: Statistical learning theory and encrypted database attacks . In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 1067--1083 . Paul Grubbs, Marie-Sarah Lacharit\u00e9, Brice Minaud, and Kenneth G Paterson.2019. Learning to reconstruct: Statistical learning theory and encrypted database attacks. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 1067--1083."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363210"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660297"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134030"},{"key":"e_1_3_2_2_45_1","volume-title":"Secure multidimensional range queries over outsourced data.The VLDB Journal 21, 3","author":"Hore Bijit","year":"2012","unstructured":"Bijit Hore , Sharad Mehrotra , Mustafa Canim , and Murat Kantarcioglu . 2012. Secure multidimensional range queries over outsourced data.The VLDB Journal 21, 3 ( 2012 ), 333--358. Bijit Hore, Sharad Mehrotra, Mustafa Canim, and Murat Kantarcioglu. 2012. Secure multidimensional range queries over outsourced data.The VLDB Journal 21, 3 (2012), 333--358."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/1316689.1316752"},{"volume-title":"Cryptographers' Track at the RSA Conference","author":"Ishai Yuval","key":"e_1_3_2_2_47_1","unstructured":"Yuval Ishai , Eyal Kushilevitz , Steve Lu , and Rafail Ostrovsky . 2016. Private large-scale databases with distributed searchable symmetric encryption . In Cryptographers' Track at the RSA Conference . Springer , 90--107. Yuval Ishai, Eyal Kushilevitz, Steve Lu, and Rafail Ostrovsky. 2016. Private large-scale databases with distributed searchable symmetric encryption. In Cryptographers' Track at the RSA Conference. Springer, 90--107."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3187009.3177733"},{"key":"e_1_3_2_2_49_1","volume-title":"International conference on machine learning.1376--1385","author":"Kairouz Peter","year":"2015","unstructured":"Peter Kairouz , Sewoong Oh , and Pramod Viswanath . 2015 . The composition theorem for differential privacy . In International conference on machine learning.1376--1385 . Peter Kairouz, Sewoong Oh, and Pramod Viswanath. 2015. The composition theorem for differential privacy. In International conference on machine learning.1376--1385."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03326-2_6"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17656-3_7"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978386"},{"key":"e_1_3_2_2_54_1","unstructured":"Georgios Kellaris George Kollios Kobbi Nissim and Adam O'Neill. 2017. Accessing data while preserving privacy. arXiv preprint arXiv:1706.01552(2017).  Georgios Kellaris George Kollios Kobbi Nissim and Adam O'Neill. 2017. Accessing data while preserving privacy. arXiv preprint arXiv:1706.01552(2017)."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989345"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2514689"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342274"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00002"},{"key":"e_1_3_2_2_59_1","unstructured":"Kim Laine. 2017. Simple encrypted arithmetic library 2.3. 1. Microsoft Research https:\/\/www.microsoft.com\/en-us\/research\/uploads\/prod\/2017\/11\/sealmanual-2--3--1.pdf(2017).  Kim Laine. 2017. Simple encrypted arithmetic library 2.3. 1. Microsoft Research https:\/\/www.microsoft.com\/en-us\/research\/uploads\/prod\/2017\/11\/sealmanual-2--3--1.pdf(2017)."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359639"},{"key":"e_1_3_2_2_61_1","first-page":"21","article-title":"Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples","volume":"16","author":"Liu Changchang","year":"2016","unstructured":"Changchang Liu , Supriyo Chakraborty , and Prateek Mittal . 2016 . Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples . In NDSS , Vol. 16. 21 -- 24 . Changchang Liu, Supriyo Chakraborty, and Prateek Mittal. 2016. Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples. In NDSS, Vol. 16. 21--24.","journal-title":"NDSS"},{"key":"e_1_3_2_2_62_1","unstructured":"Yanbin Lu. 2012. Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud. In NDSS.  Yanbin Lu. 2012. Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud. In NDSS."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30215-3_2"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243851"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.47"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_23"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354213"},{"key":"e_1_3_2_2_68_1","first-page":"591","article-title":"Arx: A Strongly Encrypted Database System","volume":"2016","author":"Poddar Rishabh","year":"2016","unstructured":"Rishabh Poddar , Tobias Boelter , and Raluca Ada Popa . 2016 . Arx: A Strongly Encrypted Database System . IACR Cryptol. ePrint Arch. 2016 (2016), 591 . Rishabh Poddar, Tobias Boelter, and Raluca Ada Popa. 2016. Arx: A Strongly Encrypted Database System. IACR Cryptol. ePrint Arch. 2016 (2016), 591.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"crossref","unstructured":"Rishabh Poddar Stephanie Wang Jianan Lu and Raluca Ada Popa. 2020. Practical Volume-Based Attacks on Encrypted Databases. arXiv preprint arXiv:2008.06627(2020).  Rishabh Poddar Stephanie Wang Jianan Lu and Raluca Ada Popa. 2020. Practical Volume-Based Attacks on Encrypted Databases. arXiv preprint arXiv:2008.06627(2020).","DOI":"10.1109\/EuroSP48549.2020.00030"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2330667.2330691"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00025"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11203-9_23"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_27"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064025"},{"key":"e_1_3_2_2_76_1","first-page":"72","article-title":"Practical Dynamic Searchable Encryption with Small Leakage","volume":"71","author":"Stefanov Emil","year":"2014","unstructured":"Emil Stefanov , Charalampos Papamanthou , and Elaine Shi . 2014 . Practical Dynamic Searchable Encryption with Small Leakage . In NDSS , Vol. 71. 72 -- 75 . Emil Stefanov, Charalampos Papamanthou, and Elaine Shi. 2014. Practical Dynamic Searchable Encryption with Small Leakage. In NDSS, Vol. 71. 72--75.","journal-title":"NDSS"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243782"},{"key":"e_1_3_2_2_78_1","volume-title":"Limousine Commission, et al","author":"Taxi NYC","year":"2020","unstructured":"NYC Taxi , Limousine Commission, et al . 2020 . NYC Yellow Taxi Trip Records . https:\/\/www1.nyc.gov\/site\/tlc\/about\/tlc-trip-record-data.page NYC Taxi, Limousine Commission, et al. 2020. NYC Yellow Taxi Trip Records. https:\/\/www1.nyc.gov\/site\/tlc\/about\/tlc-trip-record-data.page"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0052"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0032"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00062"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813640"},{"key":"e_1_3_2_2_83_1","unstructured":"Min Xu Antonis Papadimitriou Andreas Haeberlen and Ariel Feldman. [n.d.]. Hermetic: Privacy-preserving distributed analytics without (most) side channels. External Links: Link Cited by([n. d.]).  Min Xu Antonis Papadimitriou Andreas Haeberlen and Ariel Feldman. [n.d.]. Hermetic: Privacy-preserving distributed analytics without (most) side channels. External Links: Link Cited by([n. d.])."},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"crossref","unstructured":"Xiaokuan Zhang Jihun Hamm Michael K Reiter and Yinqian Zhang. 2019. Statistical Privacy for Streaming Traffic. In NDSS.  Xiaokuan Zhang Jihun Hamm Michael K Reiter and Yinqian Zhang. 2019. Statistical Privacy for Streaming Traffic. In NDSS.","DOI":"10.14722\/ndss.2019.23210"},{"key":"e_1_3_2_2_85_1","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro G Beekman , Raluca Ada Popa , Joseph E Gonzalez , and Ion Stoica . 2017 . Opaque: An oblivious and encrypted distributed analytics platform . In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17) . 283--298. Wenting Zheng, Ankur Dave, Jethro G Beekman, Raluca Ada Popa, Joseph E Gonzalez, and Ion Stoica. 2017. Opaque: An oblivious and encrypted distributed analytics platform. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). 283--298."}],"event":{"name":"SIGMOD\/PODS '21: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"Virtual Event China","acronym":"SIGMOD\/PODS '21"},"container-title":["Proceedings of the 2021 International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3457306","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448016.3457306","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448016.3457306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:03Z","timestamp":1750195503000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3457306"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,9]]},"references-count":85,"alternative-id":["10.1145\/3448016.3457306","10.1145\/3448016"],"URL":"https:\/\/doi.org\/10.1145\/3448016.3457306","relation":{},"subject":[],"published":{"date-parts":[[2021,6,9]]},"assertion":[{"value":"2021-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}