{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T20:40:03Z","timestamp":1755981603861,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,12]],"date-time":"2023-11-12T00:00:00Z","timestamp":1699747200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/W032473\/1"],"award-info":[{"award-number":["EP\/W032473\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,12]]},"DOI":"10.1145\/3628354.3629532","type":"proceedings-article","created":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T18:11:20Z","timestamp":1704219080000},"page":"2-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Preserving Privacy of Vulnerable Users across Heterogeneous Sensitive Sensor Data Streams using Smart Contracts"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4559-2364","authenticated-orcid":false,"given":"Nidhi","family":"Desai","sequence":"first","affiliation":[{"name":"University of Surrey, Surrey, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1286-0596","authenticated-orcid":false,"given":"Damiano Di Francesco","family":"Maesa","sequence":"additional","affiliation":[{"name":"University of Pisa, Pisa, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4053-0386","authenticated-orcid":false,"given":"Nishanth","family":"Sastry","sequence":"additional","affiliation":[{"name":"University of Surrey, Surrey, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8365-6993","authenticated-orcid":false,"given":"Steve","family":"Schneider","sequence":"additional","affiliation":[{"name":"University of Surrey, Surrey, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8179-8215","authenticated-orcid":false,"given":"Laura","family":"Ricci","sequence":"additional","affiliation":[{"name":"University of Pisa, Pisa, Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,1,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-018-0113-4"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428152"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78086-9_1"},{"key":"e_1_3_2_1_4_1","volume-title":"Retrieved","author":"Dahl Morten","year":"2023","unstructured":"Morten Dahl. 2023. Homomorphic Encryption in the EVM. Retrieved September 18, 2023 from https:\/\/www.youtube.com\/watch?v=eivfVykPP8U"},{"key":"e_1_3_2_1_5_1","unstructured":"Leo de Castro Rashmi Agrawal Rabia Yazicigil Anantha Chandrakasan Vinod Vaikuntanathan Chiraag Juvekar and Ajay Joshi. 2021. Does fully homomorphic encryption need compute acceleration? arXiv:2112.06396"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19020326"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","unstructured":"Thierry Edoh. 2019. Internet of Things in Emergency Medical Care and Services. In Medical Internet of Things (m-IoT) Hamed Farhadi (Ed.). IntechOpen Rijeka Chapter 1. https:\/\/doi.org\/10.5772\/intechopen.76974","DOI":"10.5772\/intechopen.76974"},{"key":"e_1_3_2_1_8_1","volume-title":"Retrieved","author":"GDPR","year":"2020","unstructured":"GDPR 2020. General Data Protection Regulation. Retrieved August 26, 2023 from https:\/\/gdpr.eu"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.01.028"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24455"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311957.3359431"},{"key":"e_1_3_2_1_13_1","volume-title":"Retrieved","author":"Hindi Rand","year":"2023","unstructured":"Rand Hindi. 2023. Private Smart Contracts Using Homomorphic Encryption. Retrieved September 18, 2023 from https:\/\/www.zama.ai\/post\/private-smart-contracts-using-homomorphic-encryption"},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_1_14_1","unstructured":"IoT2019 2019. The 9 most important applications of the Internet of Things (IoT). Retrieved August 25, 2023 from https:\/\/www.fracttal.com\/en\/blog\/the-9-most-important-applications-of-the-internet-of-things#:~:text=The%209%20most%20important%20applications%20of%20the%20Internet,...%208%208.%20Water%20supply.%20...%20More%20items"},{"volume-title":"Retrieved","year":"2022","key":"e_1_3_2_1_15_1","unstructured":"IoT2022 2022. What is the Internet of Things? Retrieved August 25, 2023 from https:\/\/www.mckinsey.com\/featured-insights\/mckinsey-explainers\/what-is-the-internet-of-things"},{"volume-title":"Retrieved","year":"2022","key":"e_1_3_2_1_16_1","unstructured":"IoT20221 2022. Advantages of Internet of Things: 10 Benefits You Should Know [2023]. Retrieved August 25, 2023 from https:\/\/sumatosoft.com\/blog\/advantages-of-internet-of-things-10-benefits-you-should-know"},{"volume-title":"Retrieved","year":"2023","key":"e_1_3_2_1_17_1","unstructured":"IoT2023 2023. Internet of Things (IoT) Market size worth USD 6075.70 Million, Globally, by 2030 at 19.91Research\u00ae. Retrieved August 25, 2023 from https:\/\/www.prnewswire.co.uk\/news-releases\/internet-of-things-iot-market-size-worth-usd-6075-70-million-globally-by-2030-at-19-91-cagr-verified-market-research-301904439.html"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375878"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100179"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3107846"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3100873"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.03.011"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-82786-1_15"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3008906"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.07.140"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100312"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.12.279"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3098795"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3105527"},{"key":"e_1_3_2_1_30_1","unstructured":"Ronald L Rivest Len Adleman Michael L Dertouzos et al. 1978. On data banks and privacy homomorphisms. Foundations of secure computation 4 11 (1978) 169--180."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00027"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3070544"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.027"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3064691"},{"key":"e_1_3_2_1_36_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 (2014), 1--32."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3158270"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3051323"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555559"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3185327"}],"event":{"name":"SenSys '23: The 21st ACM Conference on Embedded Networked Sensor Systems","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Istanbul Turkiye","acronym":"SenSys '23"},"container-title":["Proceedings of the Fifth ACM International Workshop on Blockchain-enabled Networked Sensor Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628354.3629532","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3628354.3629532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T20:26:56Z","timestamp":1755980816000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628354.3629532"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,12]]},"references-count":40,"alternative-id":["10.1145\/3628354.3629532","10.1145\/3628354"],"URL":"https:\/\/doi.org\/10.1145\/3628354.3629532","relation":{},"subject":[],"published":{"date-parts":[[2023,11,12]]},"assertion":[{"value":"2024-01-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}