{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T14:30:52Z","timestamp":1761921052554,"version":"3.41.0"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"9","license":[{"start":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T00:00:00Z","timestamp":1660867200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2022,9]]},"abstract":"<jats:p>Lessons from a pandemic.<\/jats:p>","DOI":"10.1145\/3524107","type":"journal-article","created":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T16:17:42Z","timestamp":1660925862000},"page":"48-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Deploying decentralized, privacy-preserving proximity tracing"],"prefix":"10.1145","volume":"65","author":[{"given":"Carmela","family":"Troncoso","sequence":"first","affiliation":[{"name":"EPFL, SWITZERLAND"}]},{"given":"Dan","family":"Bogdanov","sequence":"additional","affiliation":[{"name":"CYBERNETICA AS, ESTONIA"}]},{"given":"Edouard","family":"Bugnion","sequence":"additional","affiliation":[{"name":"EPFL, SWITZERLAND"}]},{"given":"Sylvain","family":"Chatel","sequence":"additional","affiliation":[{"name":"EPFL, SWITZERLAND"}]},{"given":"Cas","family":"Cremers","sequence":"additional","affiliation":[{"name":"CISPA HELMHOLTZ CENTER FOR INFORMATION SECURITY, GERMANY"}]},{"given":"Seda","family":"G\u00fcrses","sequence":"additional","affiliation":[{"name":"DELFT UNIVERSITY OF TECHNOLOGY, NETHERLANDS"}]},{"given":"Jean-Pierre","family":"Hubaux","sequence":"additional","affiliation":[{"name":"EPFL, SWITZERLAND"}]},{"given":"Dennis","family":"Jackson","sequence":"additional","affiliation":[{"name":"MOZILLA, U.K"}]},{"given":"James R.","family":"Larus","sequence":"additional","affiliation":[{"name":"EPFL, SWITZERLAND"}]},{"given":"Wouter","family":"Lueks","sequence":"additional","affiliation":[{"name":"EPFL, SWITZERLAND"}]},{"given":"Rui","family":"Oliveira","sequence":"additional","affiliation":[{"name":"UNIVERSITY OF MINHO AND INESC TEC, PORTUGAL"}]},{"given":"Mathias","family":"Payer","sequence":"additional","affiliation":[{"name":"EPFL, SWITZERLAND"}]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[{"name":"KU LEUVEN AND IMEC, BELGIUM"}]},{"given":"Apostolos","family":"Pyrgelis","sequence":"additional","affiliation":[{"name":"EPFL, SWITZERLAND"}]},{"given":"Marcel","family":"Salath\u00e9","sequence":"additional","affiliation":[{"name":"EPFL, SWITZERLAND"}]},{"given":"Theresa","family":"Stadler","sequence":"additional","affiliation":[{"name":"EPFL, SWITZERLAND"}]},{"given":"Michael","family":"Veale","sequence":"additional","affiliation":[{"name":"UNIVERSITY COLLEGE OF LONDON, U.K"}]}],"member":"320","published-online":{"date-parts":[[2022,8,19]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Towards defeating mass surveillance and SARS-CoV-2: The Pronto-C2 fully decentralized automatic contact tracing system. IACR Cryptology ePrint Archive","author":"Avitabile G.","year":"2020","unstructured":"Avitabile , G. , Botta , V. , Iovino , V. , and Visconti , I . Towards defeating mass surveillance and SARS-CoV-2: The Pronto-C2 fully decentralized automatic contact tracing system. IACR Cryptology ePrint Archive ( 2020 ), 493. https:\/\/eprint.iacr.org\/2020\/493. Avitabile, G., Botta, V., Iovino, V., and Visconti, I. Towards defeating mass surveillance and SARS-CoV-2: The Pronto-C2 fully decentralized automatic contact tracing system. IACR Cryptology ePrint Archive (2020), 493. https:\/\/eprint.iacr.org\/2020\/493."},{"key":"e_1_2_1_2_1","volume-title":"Kuwait and Norway contact tracing apps among most dangerous for privacy. Amnesty International","author":"Bahrain","year":"2020","unstructured":"Bahrain , Kuwait and Norway contact tracing apps among most dangerous for privacy. Amnesty International ( 2020 ), https:\/\/www.amnesty.org\/en\/latest\/news\/2020\/06\/bahrain-kuwait-norway-contact-tracing-apps-danger-for-privacy\/. Bahrain, Kuwait and Norway contact tracing apps among most dangerous for privacy. Amnesty International (2020), https:\/\/www.amnesty.org\/en\/latest\/news\/2020\/06\/bahrain-kuwait-norway-contact-tracing-apps-danger-for-privacy\/."},{"key":"e_1_2_1_3_1","volume-title":"et al. PanCast: Listening to Bluetooth beacons for epidemic risk mitigation. CoRR abs\/2011.08069 (November","author":"Barthe G.","year":"2020","unstructured":"Barthe , G. et al. PanCast: Listening to Bluetooth beacons for epidemic risk mitigation. CoRR abs\/2011.08069 (November 2020 ), https:\/\/arxiv.org\/abs\/2011.08069. Barthe, G. et al. PanCast: Listening to Bluetooth beacons for epidemic risk mitigation. CoRR abs\/2011.08069 (November 2020), https:\/\/arxiv.org\/abs\/2011.08069."},{"key":"e_1_2_1_4_1","unstructured":"Bay J. et al. BlueTrace: A privacy-preserving protocol for community-driven contact tracing across borders. (2020) https:\/\/bluetrace.io\/static\/bluetrace_whitepaper-938063656596c104632def383eb33b3c.pdf.  Bay J. et al. BlueTrace: A privacy-preserving protocol for community-driven contact tracing across borders. (2020) https:\/\/bluetrace.io\/static\/bluetrace_whitepaper-938063656596c104632def383eb33b3c.pdf."},{"key":"e_1_2_1_5_1","volume-title":"et al. Towards a common performance and effectiveness terminology for digital proximity tracing applications. CoRR abs\/2012.12927 (December","author":"Benzler J.","year":"2020","unstructured":"Benzler , J. et al. Towards a common performance and effectiveness terminology for digital proximity tracing applications. CoRR abs\/2012.12927 (December 2020 ), https:\/\/arxiv.org\/abs\/2012.12927. Benzler, J. et al. Towards a common performance and effectiveness terminology for digital proximity tracing applications. CoRR abs\/2012.12927 (December 2020), https:\/\/arxiv.org\/abs\/2012.12927."},{"key":"e_1_2_1_6_1","volume-title":"Risk scoring calculation for the current NHSx contact tracing app. CoRR abs\/2005.11057 (May","author":"Briers M.","year":"2020","unstructured":"Briers , M. , Charalambides , M. , and Holmes , C . Risk scoring calculation for the current NHSx contact tracing app. CoRR abs\/2005.11057 (May 2020 ), https:\/\/arxiv.org\/abs\/2005.11057. Briers, M., Charalambides, M., and Holmes, C. Risk scoring calculation for the current NHSx contact tracing app. CoRR abs\/2005.11057 (May 2020), https:\/\/arxiv.org\/abs\/2005.11057."},{"key":"e_1_2_1_7_1","volume-title":"et al. Privacy-preserving automated exposure notification. IACR Cryptology ePrint Archive","author":"Canetti R.","year":"2020","unstructured":"Canetti , R. et al. Privacy-preserving automated exposure notification. IACR Cryptology ePrint Archive ( 2020 ). Canetti, R. et al. Privacy-preserving automated exposure notification. IACR Cryptology ePrint Archive (2020)."},{"key":"e_1_2_1_8_1","volume-title":"Anonymous collocation discovery: Harnessing privacy to tame the coronavirus (March","author":"Canetti R.","year":"2020","unstructured":"Canetti , R. , Trachtenberg , A. , and Varia , M . Anonymous collocation discovery: Harnessing privacy to tame the coronavirus (March 2020 ), https:\/\/arxiv.org\/abs\/2003.13670. Canetti, R., Trachtenberg, A., and Varia, M. Anonymous collocation discovery: Harnessing privacy to tame the coronavirus (March 2020), https:\/\/arxiv.org\/abs\/2003.13670."},{"key":"e_1_2_1_9_1","volume-title":"et al. DESIRE: A third way for a European exposure notification system leveraging the best of centralized and decentralized systems. CoRR abs\/2008.01621 (August","author":"Castelluccia C.","year":"2020","unstructured":"Castelluccia , C. et al. DESIRE: A third way for a European exposure notification system leveraging the best of centralized and decentralized systems. CoRR abs\/2008.01621 (August 2020 ), https:\/\/arxiv.org\/abs\/2008.01621. Castelluccia, C. et al. DESIRE: A third way for a European exposure notification system leveraging the best of centralized and decentralized systems. CoRR abs\/2008.01621 (August 2020), https:\/\/arxiv.org\/abs\/2008.01621."},{"key":"e_1_2_1_10_1","volume-title":"et al. PACT: Privacy sensitive protocols and mechanisms for mobile contact tracing. CoRR abs\/2004.03544 (April","author":"Chan J.","year":"2020","unstructured":"Chan , J. et al. PACT: Privacy sensitive protocols and mechanisms for mobile contact tracing. CoRR abs\/2004.03544 (April 2020 ), https:\/\/arxiv.org\/abs\/2004.03544. Chan, J. et al. PACT: Privacy sensitive protocols and mechanisms for mobile contact tracing. CoRR abs\/2004.03544 (April 2020), https:\/\/arxiv.org\/abs\/2004.03544."},{"key":"e_1_2_1_11_1","volume-title":"Epidemiological motivation of the transmission risk level. (October","author":"Team","year":"2020","unstructured":"CWA Team . Epidemiological motivation of the transmission risk level. (October 2020 ), https:\/\/github.com\/corona-warn-app\/cwa-documentation\/blob\/main\/transmission_risk.pdf. CWA Team. Epidemiological motivation of the transmission risk level. (October 2020), https:\/\/github.com\/corona-warn-app\/cwa-documentation\/blob\/main\/transmission_risk.pdf."},{"key":"e_1_2_1_12_1","volume-title":"The SwissCovid digital proximity tracing app after one year: Were expectations fulfilled? Swiss Medical. Weekly (September","author":"Daniore P.","year":"2021","unstructured":"Daniore , P. , Ballouz , T. , Menges , D. , and von Wyl , V. The SwissCovid digital proximity tracing app after one year: Were expectations fulfilled? Swiss Medical. Weekly (September 2021 ). Daniore, P., Ballouz, T., Menges, D., and von Wyl, V. The SwissCovid digital proximity tracing app after one year: Were expectations fulfilled? Swiss Medical. Weekly (September 2021)."},{"key":"e_1_2_1_13_1","unstructured":"Data protection and information security architecture. PEPP-PT (Apr. 2020) https:\/\/github.com\/pepp-pt\/pepp-pt-documentation\/blob\/master\/10-data-protection\/PEPP-PT-data-protection-information-security-architecture-Germany.pdf.  Data protection and information security architecture. PEPP-PT (Apr. 2020) https:\/\/github.com\/pepp-pt\/pepp-pt-documentation\/blob\/master\/10-data-protection\/PEPP-PT-data-protection-information-security-architecture-Germany.pdf."},{"key":"e_1_2_1_14_1","volume-title":"Privacy and security risk evaluation of digital proximity tracing systems (April","author":"Team","year":"2020","unstructured":"DP-3T Team . Privacy and security risk evaluation of digital proximity tracing systems (April 2020 ), https:\/\/github.com\/DP-3T\/documents\/blob\/master\/Security%20analysis\/Privacy%20and%20Security%20Attacks%20on%20Digital%20Proximity%20Tracing%20Systems.pdf. DP-3T Team. Privacy and security risk evaluation of digital proximity tracing systems (April 2020), https:\/\/github.com\/DP-3T\/documents\/blob\/master\/Security%20analysis\/Privacy%20and%20Security%20Attacks%20on%20Digital%20Proximity%20Tracing%20Systems.pdf."},{"key":"e_1_2_1_15_1","volume-title":"Secure upload authorisation for digital proximity tracing (April","author":"Team","year":"2020","unstructured":"DP-3T Team . Secure upload authorisation for digital proximity tracing (April 2020 ), https:\/\/github.com\/DP-3T\/documents\/blob\/master\/DP3T%20-%20Upload%20Authorisation%20Analysis%20and%20Guidelines.pdf. DP-3T Team. Secure upload authorisation for digital proximity tracing (April 2020), https:\/\/github.com\/DP-3T\/documents\/blob\/master\/DP3T%20-%20Upload%20Authorisation%20Analysis%20and%20Guidelines.pdf."},{"key":"e_1_2_1_16_1","unstructured":"Ebbers W. Hooft L. van der Laan N. and Metting E. Evaluation CoronaMelder: An overview after 9 months. https:\/\/www.coronamelder.nl\/media\/Evaluatie_CoronaMelder_na_9_maanden_english.pdf.  Ebbers W. Hooft L. van der Laan N. and Metting E. Evaluation CoronaMelder: An overview after 9 months. https:\/\/www.coronamelder.nl\/media\/Evaluatie_CoronaMelder_na_9_maanden_english.pdf."},{"key":"e_1_2_1_17_1","volume-title":"A security architecture for contact tracing and warning apps. eHealth Network (April","author":"European Interoperability Certificate Governance","year":"2020","unstructured":"European Interoperability Certificate Governance . A security architecture for contact tracing and warning apps. eHealth Network (April 2020 ), https:\/\/health.ec.europa.eu\/publications\/european-interoperability-certificate-governance-security-architecture-contact-tracing-and-warning_en. European Interoperability Certificate Governance. A security architecture for contact tracing and warning apps. eHealth Network (April 2020), https:\/\/health.ec.europa.eu\/publications\/european-interoperability-certificate-governance-security-architecture-contact-tracing-and-warning_en."},{"key":"e_1_2_1_18_1","volume-title":"Google LLC and Apple Inc. (April","author":"Exposure","year":"2020","unstructured":"Exposure notification---Cryptography specification. Google LLC and Apple Inc. (April 2020 ), https:\/\/blog.google\/documents\/69\/Exposure_Notification_-_Cryptography_Specification_v1.2.1.pdf. Exposure notification---Cryptography specification. Google LLC and Apple Inc. (April 2020), https:\/\/blog.google\/documents\/69\/Exposure_Notification_-_Cryptography_Specification_v1.2.1.pdf."},{"key":"e_1_2_1_19_1","unstructured":"German restaurants object after police use COVID data for crime-fighting. Reuters (July 2020) https:\/\/www.reuters.com\/article\/us-health-coronavirus-germany-privacy-idUSKCN24W2K6.  German restaurants object after police use COVID data for crime-fighting. Reuters (July 2020) https:\/\/www.reuters.com\/article\/us-health-coronavirus-germany-privacy-idUSKCN24W2K6."},{"key":"e_1_2_1_20_1","volume-title":"et al. Sovereign smartphone: To enjoy freedom we have to control our phones. arXiv:2102.02743 (Feb","author":"Groschupp F.","year":"2021","unstructured":"Groschupp , F. et al. Sovereign smartphone: To enjoy freedom we have to control our phones. arXiv:2102.02743 (Feb . 2021 ). Groschupp, F. et al. Sovereign smartphone: To enjoy freedom we have to control our phones. arXiv:2102.02743 (Feb. 2021)."},{"key":"e_1_2_1_21_1","first-page":"11","article-title":"Americans' willingness to adopt a COVID-19 tracking app","volume":"25","author":"Hargittai E.","year":"2020","unstructured":"Hargittai , E. , Redmiles , E.M. , Vitak , J. , and Zimmer , M . Americans' willingness to adopt a COVID-19 tracking app . First Monday 25 , 11 ( Oct. 2020 ). Hargittai, E., Redmiles, E.M., Vitak, J., and Zimmer, M. Americans' willingness to adopt a COVID-19 tracking app. First Monday 25, 11 (Oct. 2020).","journal-title":"First Monday"},{"key":"e_1_2_1_23_1","volume-title":"Singapore reveals Covid privacy data available to police. BBC (Jan","author":"Illmer A.","year":"2021","unstructured":"Illmer , A. Singapore reveals Covid privacy data available to police. BBC (Jan . 2021 ), https:\/\/www.bbc.com\/news\/world-asia-55541001. Illmer, A. Singapore reveals Covid privacy data available to police. BBC (Jan. 2021), https:\/\/www.bbc.com\/news\/world-asia-55541001."},{"key":"e_1_2_1_24_1","volume-title":"et al. How good is good enough for COVID19 apps? The influence of benefits, accuracy, and privacy on willingness to adopt. arXiv:2005.04343 (May","author":"Kaptchuk G.","year":"2020","unstructured":"Kaptchuk , G. et al. How good is good enough for COVID19 apps? The influence of benefits, accuracy, and privacy on willingness to adopt. arXiv:2005.04343 (May 2020 ). Kaptchuk, G. et al. How good is good enough for COVID19 apps? The influence of benefits, accuracy, and privacy on willingness to adopt. arXiv:2005.04343 (May 2020)."},{"key":"e_1_2_1_25_1","volume-title":"More scary than coronavirus': South Korea's health alerts expose private lives. The Guardian (March","author":"Kim N.","year":"2020","unstructured":"Kim , N. ' More scary than coronavirus': South Korea's health alerts expose private lives. The Guardian (March 2020 ), https:\/\/www.theguardian.com\/world\/2020\/mar\/06\/more-scary-than-coronavirus-south-koreas-health-alerts-expose-private-lives. Kim, N. 'More scary than coronavirus': South Korea's health alerts expose private lives. The Guardian (March 2020), https:\/\/www.theguardian.com\/world\/2020\/mar\/06\/more-scary-than-coronavirus-south-koreas-health-alerts-expose-private-lives."},{"key":"e_1_2_1_26_1","volume-title":"Privacy engineering meets software engineering. On the challenges of engineering Privacy By Design. (July","author":"Kostova B.","year":"2020","unstructured":"Kostova , B. , G\u00fcrses , S. , and Troncoso , C . Privacy engineering meets software engineering. On the challenges of engineering Privacy By Design. (July 2020 ), arXiv:2007.08613. Kostova, B., G\u00fcrses, S., and Troncoso, C. Privacy engineering meets software engineering. On the challenges of engineering Privacy By Design. (July 2020), arXiv:2007.08613."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3431832.3431840"},{"key":"e_1_2_1_28_1","volume-title":"High level privacy and security design for NHS COVID-19 contact tracing app","author":"Levy I.","year":"2020","unstructured":"Levy , I. High level privacy and security design for NHS COVID-19 contact tracing app . National Cyber Security Centre , U.K. ( May 2020 ), https:\/\/www.ncsc.gov.uk\/files\/NHS-app-security-paper%20V0.1.pdf. Levy, I. High level privacy and security design for NHS COVID-19 contact tracing app. National Cyber Security Centre, U.K. (May 2020), https:\/\/www.ncsc.gov.uk\/files\/NHS-app-security-paper%20V0.1.pdf."},{"key":"e_1_2_1_29_1","volume-title":"et al. Inferring proximity from Bluetooth Low Energy RSSI with unscented Kalman smoothers. CoRR abs\/2007.05057 (July","author":"Lovett T.","year":"2020","unstructured":"Lovett , T. et al. Inferring proximity from Bluetooth Low Energy RSSI with unscented Kalman smoothers. CoRR abs\/2007.05057 (July 2020 ), https:\/\/arxiv.org\/abs\/2007.05057. Lovett, T. et al. Inferring proximity from Bluetooth Low Energy RSSI with unscented Kalman smoothers. CoRR abs\/2007.05057 (July 2020), https:\/\/arxiv.org\/abs\/2007.05057."},{"key":"e_1_2_1_30_1","volume-title":"Proceedings on Privacy Enhancing Techniques 2021","author":"Lueks W.","year":"2021","unstructured":"Lueks , W. et al. CrowdNotifier: Decentralized privacy-preserving presence tracing . In Proceedings on Privacy Enhancing Techniques 2021 , 4 ( July 2021 ), 350--368. Lueks, W. et al. CrowdNotifier: Decentralized privacy-preserving presence tracing. In Proceedings on Privacy Enhancing Techniques 2021, 4 (July 2021), 350--368."},{"key":"e_1_2_1_31_1","volume-title":"et al. The PACT Protocol technical specification. PACT (April","author":"Rivest R.L.","year":"2020","unstructured":"Rivest , R.L. et al. The PACT Protocol technical specification. PACT (April 2020 ), https:\/\/pact.mit.edu\/wp-content\/uploads\/2020\/11\/The-PACT-protocol-specification-2020.pdf. Rivest, R.L. et al. The PACT Protocol technical specification. PACT (April 2020), https:\/\/pact.mit.edu\/wp-content\/uploads\/2020\/11\/The-PACT-protocol-specification-2020.pdf."},{"key":"e_1_2_1_32_1","volume-title":"ROBust and privacy-presERving proximity Tracing. Inria PRIVATICS team and Fraunhofer AISEC (April","author":"ROBERT","year":"2020","unstructured":"ROBERT : ROBust and privacy-presERving proximity Tracing. Inria PRIVATICS team and Fraunhofer AISEC (April 2020 ), https:\/\/github.com\/ROBERT-proximity-tracing\/documents\/blob\/master\/previous_versions\/ROBERT-specification-EN-v1_0.pdf. ROBERT: ROBust and privacy-presERving proximity Tracing. Inria PRIVATICS team and Fraunhofer AISEC (April 2020), https:\/\/github.com\/ROBERT-proximity-tracing\/documents\/blob\/master\/previous_versions\/ROBERT-specification-EN-v1_0.pdf."},{"key":"e_1_2_1_33_1","first-page":"5153","article-title":"Early evidence of effectiveness of digital contact tracing for SARS-CoV-2","volume":"150","author":"Salath\u00e9 M.","year":"2020","unstructured":"Salath\u00e9 , M. . Early evidence of effectiveness of digital contact tracing for SARS-CoV-2 in Switzerland. Swiss Medical Weekly 150 , 2020 \/ 5153 (December 2020). Salath\u00e9, M. et al. Early evidence of effectiveness of digital contact tracing for SARS-CoV-2 in Switzerland. Swiss Medical Weekly 150, 2020\/5153 (December 2020).","journal-title":"Switzerland. Swiss Medical Weekly"},{"key":"e_1_2_1_34_1","volume-title":"Personal data stolen from Dutch coronavirus track-and-trace programme","author":"Sterling T.","year":"2021","unstructured":"Sterling , T. Personal data stolen from Dutch coronavirus track-and-trace programme . Reuters ( 2021 ), https:\/\/www.reuters.com\/article\/us-health-coronavirus-netherlands-datapr-idUSKBN29Y1H3. Sterling, T. Personal data stolen from Dutch coronavirus track-and-trace programme. Reuters (2021), https:\/\/www.reuters.com\/article\/us-health-coronavirus-netherlands-datapr-idUSKBN29Y1H3."},{"key":"e_1_2_1_35_1","unstructured":"SwissCovid Exposure Score Calculation. https:\/\/github.com\/admin-ch\/PT-System-Documents\/blob\/master\/SwissCovid-ExposureScore.pdf.  SwissCovid Exposure Score Calculation. https:\/\/github.com\/admin-ch\/PT-System-Documents\/blob\/master\/SwissCovid-ExposureScore.pdf."},{"key":"e_1_2_1_36_1","volume-title":"https:\/\/github.com\/TCNCoalition\/TCN","author":"Coalition TCN","year":"2020","unstructured":"TCN Coalition . TCN Protocol ( 2020 ), https:\/\/github.com\/TCNCoalition\/TCN . TCN Coalition. TCN Protocol (2020), https:\/\/github.com\/TCNCoalition\/TCN."},{"key":"e_1_2_1_37_1","first-page":"2","article-title":"Epione: Lightweight contact tracing with strong privacy","volume":"43","author":"Trieu N.","year":"2020","unstructured":"Trieu , N. . Epione: Lightweight contact tracing with strong privacy . IEEE Data Engineering Bulletin 43 , 2 ( 2020 ), 95--107. http:\/\/sites.computer.org\/debull\/A20june\/p95.pdf. Trieu, N. et al. Epione: Lightweight contact tracing with strong privacy. IEEE Data Engineering Bulletin 43, 2 (2020), 95--107. http:\/\/sites.computer.org\/debull\/A20june\/p95.pdf.","journal-title":"IEEE Data Engineering Bulletin"},{"key":"e_1_2_1_38_1","volume-title":"Decentralized privacy-preserving proximity tracing. CoRR abs\/2005.12273","author":"Troncoso C.","year":"2020","unstructured":"Troncoso , C. , Decentralized privacy-preserving proximity tracing. CoRR abs\/2005.12273 ( 2020 ), https:\/\/arxiv.org\/abs\/2005.12273. Troncoso, C., et al. Decentralized privacy-preserving proximity tracing. CoRR abs\/2005.12273 (2020), https:\/\/arxiv.org\/abs\/2005.12273."},{"key":"e_1_2_1_39_1","unstructured":"White N. Creepy bartender uses coronavirus contact tracing data to ask out a girl he gave a free drink to---as Australians are warned their personal information could be misused or stolen. Daily Mail Australia (July 2020) https:\/\/www.dailymail.co.uk\/news\/article-8516533\/Creepy-bartender-uses-coronavirus-contact-tracing-data-ask-girl.html.  White N. Creepy bartender uses coronavirus contact tracing data to ask out a girl he gave a free drink to---as Australians are warned their personal information could be misused or stolen. Daily Mail Australia (July 2020) https:\/\/www.dailymail.co.uk\/news\/article-8516533\/Creepy-bartender-uses-coronavirus-contact-tracing-data-ask-girl.html."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-021-03606-z"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63086-7_4"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524107","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3524107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:05Z","timestamp":1750188665000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,19]]},"references-count":40,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["10.1145\/3524107"],"URL":"https:\/\/doi.org\/10.1145\/3524107","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2022,8,19]]},"assertion":[{"value":"2022-08-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}