{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:47Z","timestamp":1750220327054,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T00:00:00Z","timestamp":1657497600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,11]]},"DOI":"10.1145\/3490148.3538562","type":"proceedings-article","created":{"date-parts":[[2022,7,10]],"date-time":"2022-07-10T22:10:15Z","timestamp":1657491015000},"page":"103-105","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Brief Announcement: Composable Dynamic Secure Emulation"],"prefix":"10.1145","author":[{"given":"Pierre","family":"Civit","sequence":"first","affiliation":[{"name":"Sorbonne Universit\u00e9, CNRS, LIP6, Paris, France"}]},{"given":"Maria","family":"Potop-Butucaru","sequence":"additional","affiliation":[{"name":"Sorbonne Universit\u00e9, CNRS, LIP6, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2022,7,11]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1016\/j.ic.2016.03.008"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/3402457"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1016\/j.jcss.2017.09.007"},{"key":"e_1_3_2_1_4_1","volume-title":"Compositional Security for Task-PIOAs. In 20th IEEE Computer Security Foundations Symposium, CSF 2007","author":"Canetti Ran","year":"2007","unstructured":"Ran Canetti , Ling Cheung , Dilsun Kirli Kaynar , Nancy A. Lynch , and Olivier Pereira . 2007 a . Compositional Security for Task-PIOAs. In 20th IEEE Computer Security Foundations Symposium, CSF 2007 , 6--8 July 2007, Venice, Italy. IEEE Computer Society, 125--139. https:\/\/doi.org\/10.1109\/CSF. 2007.15 10.1109\/CSF.2007.15 Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, and Olivier Pereira. 2007 a. Compositional Security for Task-PIOAs. In 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6--8 July 2007, Venice, Italy. IEEE Computer Society, 125--139. https:\/\/doi.org\/10.1109\/CSF.2007.15"},{"unstructured":"Ran Canetti Ling Cheung Nancy A. Lynch and Olivier Pereira. 2007 b. On the Role of Scheduling in Simulation-Based Security. IACR Cryptol. ePrint Arch. (2007) 102. http:\/\/eprint.iacr.org\/2007\/102  Ran Canetti Ling Cheung Nancy A. Lynch and Olivier Pereira. 2007 b. On the Role of Scheduling in Simulation-Based Security. IACR Cryptol. ePrint Arch. (2007) 102. http:\/\/eprint.iacr.org\/2007\/102","key":"e_1_3_2_1_5_1"},{"unstructured":"Pierre Civit and Maria Potop-Butucaru. 2021. Probabilistic Dynamic Input Output Automata. IACR Cryptol. ePrint Arch. (2021) 798. https:\/\/eprint.iacr.org\/2021\/798  Pierre Civit and Maria Potop-Butucaru. 2021. Probabilistic Dynamic Input Output Automata. IACR Cryptol. ePrint Arch. (2021) 798. https:\/\/eprint.iacr.org\/2021\/798","key":"e_1_3_2_1_6_1"},{"unstructured":"Pierre Civit and Maria Potop-Butucaru. 2022. Composable Dynamic Secure Emulation. IACR Cryptol. ePrint Arch. (2022) 326. https:\/\/eprint.iacr.org\/2022\/326  Pierre Civit and Maria Potop-Butucaru. 2022. Composable Dynamic Secure Emulation. IACR Cryptol. ePrint Arch. (2022) 326. https:\/\/eprint.iacr.org\/2022\/326","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1007\/978-3-662-46803-6_10"}],"event":{"sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory","SIGARCH ACM Special Interest Group on Computer Architecture","EATCS European Association for Theoretical Computer Science"],"acronym":"SPAA '22","name":"SPAA '22: 34th ACM Symposium on Parallelism in Algorithms and Architectures","location":"Philadelphia PA USA"},"container-title":["Proceedings of the 34th ACM Symposium on Parallelism in Algorithms and Architectures"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3490148.3538562","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3490148.3538562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:08Z","timestamp":1750191128000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3490148.3538562"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,11]]},"references-count":8,"alternative-id":["10.1145\/3490148.3538562","10.1145\/3490148"],"URL":"https:\/\/doi.org\/10.1145\/3490148.3538562","relation":{},"subject":[],"published":{"date-parts":[[2022,7,11]]},"assertion":[{"value":"2022-07-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}