{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:41:56Z","timestamp":1771332116761,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670289","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"3212-3226","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Arke: Scalable and Byzantine Fault Tolerant Privacy-Preserving Contact Discovery"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0472-1697","authenticated-orcid":false,"given":"Nicolas","family":"Mohnblatt","sequence":"first","affiliation":[{"name":"Geometry Research, Netanya, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5337-4741","authenticated-orcid":false,"given":"Alberto","family":"Sonnino","sequence":"additional","affiliation":[{"name":"Mysten Labs &amp; University College London, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2816-8432","authenticated-orcid":false,"given":"Kobi","family":"Gurkan","sequence":"additional","affiliation":[{"name":"Geometry Research, Netanya, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2202-1879","authenticated-orcid":false,"given":"Philipp","family":"Jovanovic","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. Telegram: A New Era of Messaging. https:\/\/telegram.org."},{"key":"e_1_3_2_1_2_1","unstructured":"2023. The Bridge Between your Business and Web3. https:\/\/chain.com."},{"key":"e_1_3_2_1_3_1","unstructured":"2023. Linera. https:\/\/linera.io."},{"key":"e_1_3_2_1_4_1","unstructured":"Apple. 2024. iCloud Private Relay. https:\/\/support.apple.com\/en-us\/102602."},{"key":"e_1_3_2_1_5_1","unstructured":"Arbitrum. 2023. Secure Scaling for Ethereum. https:\/\/arbitrum.io."},{"key":"e_1_3_2_1_6_1","unstructured":"arkworks contributors. 2022. arkworks zkSNARK ecosystem. https:\/\/arkworks.rs"},{"key":"e_1_3_2_1_7_1","unstructured":"JP Aumasson and Luis Merino. 2016. SGX Secure Enclaves in Practice Security and Crypto Review. BlackHat."},{"key":"e_1_3_2_1_8_1","unstructured":"Jean-Philippe Aumasson Samuel Neves Zooko Wilcox-O?Hearn and Christian Winnerlein. 2016. BLAKE2X. Online. https:\/\/www.blake2.net\/blake2x.pdf"},{"key":"e_1_3_2_1_9_1","unstructured":"Avalanche. 2023. Avalanche. https:\/\/www.avax.network."},{"key":"e_1_3_2_1_10_1","volume-title":"Yan Ji, Jonas Lindstr\u00f8m, Deepak Maram, Ben Riva, Arnab Roy, Mahdi Sedaghat, and Joy Wang.","author":"Baldimtsi Foteini","year":"2024","unstructured":"Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Yan Ji, Jonas Lindstr\u00f8m, Deepak Maram, Ben Riva, Arnab Roy, Mahdi Sedaghat, and Joy Wang. 2024. zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials. arXiv preprint arXiv:2401.11735 (2024)."},{"key":"e_1_3_2_1_11_1","volume-title":"Performance evaluation of the quorum blockchain platform. ArXiv Preprint","author":"Baliga Arati","year":"2018","unstructured":"Arati Baliga, I Subhod, Pandurang Kamat, and Siddhartha Chatterjee. 2018. Performance evaluation of the quorum blockchain platform. ArXiv Preprint (2018)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPICS.OPODIS.2021.7"},{"key":"e_1_3_2_1_13_1","unstructured":"Mathieu Baudet Avery Ching Andrey Chursin George Danezis Fran\u00e7ois Garillot Zekun Li Dahlia Malkhi Oded Naor Dmitri Perelman and Alberto Sonnino. 2019. State machine replication in the Libra Blockchain."},{"key":"e_1_3_2_1_14_1","volume-title":"Sui Lutris: A Blockchain Combining Broadcast and Consensus. ArXiv Preprint.","author":"Blackshear Same","year":"2023","unstructured":"Same Blackshear, Andrey Chursin, George Danezis, Anastasios Kichidis, Lefteris Kokoris-Kogias, Xun Li, Mark Logan, Ashok Menon, Todd Nowacki, Alberto Sonnino, Brandon Williams, and Lu Zhang. 2023. Sui Lutris: A Blockchain Combining Broadcast and Consensus. ArXiv Preprint."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540--36288--6_3"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Dan Boneh and Matt Franklin. 2001. Identity-based encryption from the Weil pairing. In Crypto.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Dan Boneh Ben Lynn and Hovav Shacham. 2001. Short signatures from the Weil pairing. In AsiaCrypt.","DOI":"10.1007\/3-540-45682-1_30"},{"key":"e_1_3_2_1_18_1","unstructured":"Ethan Buchman. 2016. Tendermint: Byzantine fault tolerance in the age of blockchains. Ph.D. Dissertation."},{"key":"e_1_3_2_1_19_1","unstructured":"Christian Cachin. 2016. Architecture of the hyperledger blockchain fabric. In DCCL."},{"key":"e_1_3_2_1_20_1","volume-title":"Introduction to reliable and secure distributed programming","author":"Cachin Christian","unstructured":"Christian Cachin, Rachid Guerraoui, and Lu\u00eds Rodrigues. 2011. Introduction to reliable and secure distributed programming. Springer."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Jan Camenisch Susan Hohenberger Markulf Kohlweiss Anna Lysyanskaya and Mira Meyerovich. 2006. How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication. In CCS.","DOI":"10.1145\/1180405.1180431"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_1_23_1","unstructured":"Laura Ceci. 2023. Monthly global unique WhatsApp users. https:\/\/www.statista. com\/statistics\/1306022\/whatsapp-global-unique-users."},{"key":"e_1_3_2_1_24_1","volume-title":"Distefano: Decentralized infrastructure for sharing trusted encrypted facts and nothing more. ePrint Archive.","author":"Celi Sof\u00eda","year":"2023","unstructured":"Sof\u00eda Celi, Alex Davidson, Hamed Haddadi, Gon\u00e7alo Pestana, and Joe Rowell. 2023. Distefano: Decentralized infrastructure for sharing trusted encrypted facts and nothing more. ePrint Archive."},{"key":"e_1_3_2_1_25_1","volume-title":"DIDO: Data Provenance from Restricted TLS 1.3 Websites. ePrint","author":"Chan Kwan Yin","year":"2023","unstructured":"Kwan Yin Chan, Handong Cui, and Tsz Hon Yuen. 2023. DIDO: Data Provenance from Restricted TLS 1.3 Websites. ePrint (2023)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2021.1911876"},{"key":"e_1_3_2_1_27_1","volume-title":"Removing Escrowfrom Identity-Based Encryption: New Security Notions and Key Management Techniques. In International workshop on public key cryptography.","author":"Chow Sherman SM","year":"2009","unstructured":"Sherman SM Chow. 2009. Removing Escrowfrom Identity-Based Encryption: New Security Notions and Key Management Techniques. In International workshop on public key cryptography."},{"key":"e_1_3_2_1_28_1","unstructured":"Graeme Connell. 2022. Technology Deep Dive: Building a Faster ORAM Layer for Enclaves. https:\/\/signal.org\/blog\/building-faster-oram\/."},{"key":"e_1_3_2_1_29_1","unstructured":"Corda. 2016. https:\/\/corda.net."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--21554--4_9"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"George Danezis Lefteris Kokoris-Kogias Alberto Sonnino and Alexander Spiegelman. 2022. Narwhal and Tusk: a DAG-based mempool and efficient BFT consensus. In EuroSys.","DOI":"10.1145\/3492321.3519594"},{"key":"e_1_3_2_1_33_1","unstructured":"Shaun Davenport. 2014. SGX: the good the bad and the downright ugly. https:\/\/www.virusbulletin.com\/virusbulletin\/2014\/01\/sgx-good-bad-anddownright- ugly."},{"key":"e_1_3_2_1_34_1","volume-title":"Privacy Pass: Bypassing Internet Challenges Anonymously. In PoPETS.","author":"Davidson Alex","year":"2018","unstructured":"Alex Davidson, Ian Goldberg, Nick Sullivan, George Tankersley, and Filippo Valsorda. 2018. Privacy Pass: Bypassing Internet Challenges Anonymously. In PoPETS."},{"key":"e_1_3_2_1_35_1","volume-title":"PIR-PSI: scaling private contact discovery. ePrint","author":"Demmler Daniel","year":"2018","unstructured":"Daniel Demmler, Peter Rindal, Mike Rosulek, and Ni Trieu. 2018. PIR-PSI: scaling private contact discovery. ePrint (2018)."},{"key":"e_1_3_2_1_36_1","unstructured":"Claudia Diaz Harry Halpin and Aggelos Kiayias. 2021. The Nym Network. (2021)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2005.03.024"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","unstructured":"M J Dworkin. 2007. Recommendation for block cipher modes of operation: GaloisCounter Mode (GCM) and GMAC. https:\/\/doi.org\/10.6028\/nist.sp.800--38d","DOI":"10.6028\/nist.sp.800--38d"},{"key":"e_1_3_2_1_39_1","unstructured":"OpenId Foundation. 2024. Certified OpenID Connect Implementations. https:\/\/openid.net\/developers\/certified-openid-connect-implementations\/."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--84245--1_14"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Rosario Gennaro Stanislaw Jarecki Hugo Krawczyk and Tal Rabin. 1999. Secure distributed key generation for discrete-log based cryptosystems. In EuroCrypt.","DOI":"10.1007\/3-540-48910-X_21"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Jens Groth. 2016. On the size of pairing-based non-interactive arguments. In EuroCrypt.","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Kobi Gurkan Philipp Jovanovic Mary Maller Sarah Meiklejohn Gilad Stern and Alin Tomescu. 2021. Aggregatable distributed key generation. In EuroCrypt.","DOI":"10.1007\/978-3-030-77870-5_6"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Christoph Hagen Christian Weinert Christoph Sendner Alexandra Dmitrienko and Thomas Schneider. 2020. All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers. ePrint Archive.","DOI":"10.14722\/ndss.2021.23159"},{"key":"e_1_3_2_1_45_1","unstructured":"Runchao Han Gary Shapiro Vincent Gramoli and Xiwei Xu. 2019. On the performance of distributed ledgers for internet of things. In Internet of Things."},{"key":"e_1_3_2_1_46_1","volume-title":"Scaling Mobile Private Contact Discovery to Billions of Users. ePrint","author":"Hetz Laura","year":"2023","unstructured":"Laura Hetz, Thomas Schneider, and Christian Weinert. 2023. Scaling Mobile Private Contact Discovery to Billions of Users. ePrint (2023)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808138.2808142"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--65411--5_13"},{"key":"e_1_3_2_1_49_1","unstructured":"Daniel Kales Christian Rechberger Thomas Schneider Matthias Senker and Christian Weinert. 2019. Mobile Private Contact Discovery at Scale. In USENIX."},{"key":"e_1_3_2_1_50_1","volume-title":"Private set intersection for unequal set sizes with mobile applications. ePrint","author":"Kiss \u00c1gnes","year":"2017","unstructured":"\u00c1gnes Kiss, Jian Liu, Thomas Schneider, N Asokan, and Benny Pinkas. 2017. Private set intersection for unequal set sizes with mobile applications. ePrint (2017)."},{"key":"e_1_3_2_1_51_1","volume-title":"Pudding: Private User Discovery in Anonymity Networks. ArXiv Preprint","author":"Kocaogullar Ceren","year":"2023","unstructured":"Ceren Kocaogullar, Daniel Hugenroth, Martin Kleppmann, and Alastair R Beresford. 2023. Pudding: Private User Discovery in Anonymity Networks. ArXiv Preprint (2023)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978381"},{"key":"e_1_3_2_1_53_1","unstructured":"J\u00f6rn Ku\u00dfmaul Matthew Akram and Anselme Tueno. 2023. Unbalanced Private Set Intersection from Homomorphic Encryption and Nested Cuckoo Hashing. IACR Cryptol. ePrint Arch. (2023) 1670. https:\/\/eprint.iacr.org\/2023\/1670"},{"key":"e_1_3_2_1_54_1","volume-title":"Janus: Fast Privacy-Preserving Data Provenance For TLS 1.3. ePrint","author":"Lauinger Jan","year":"2023","unstructured":"Jan Lauinger, Jens Ernstberger, Andreas Finkenzeller, and Sebastian Steinhorst. 2023. Janus: Fast Privacy-Preserving Data Provenance For TLS 1.3. ePrint (2023)."},{"key":"e_1_3_2_1_55_1","unstructured":"Moxie Marlinspike. 2014. The Difficulty of Private Contact Discovery."},{"key":"e_1_3_2_1_56_1","volume-title":"Technology Preview: Private Contact Discovery for Signal. https:\/\/signal.org\/blog\/private-contact-discovery.","author":"Marlinspike Moxie","year":"2017","unstructured":"Moxie Marlinspike. 2017. Technology Preview: Private Contact Discovery for Signal. https:\/\/signal.org\/blog\/private-contact-discovery."},{"key":"e_1_3_2_1_57_1","volume-title":"Sui: Build without Boundaries. https:\/\/sui.io.","author":"Labs Mysten","year":"2022","unstructured":"Mysten Labs. 2022. Sui: Build without Boundaries. https:\/\/sui.io."},{"key":"e_1_3_2_1_58_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system."},{"key":"e_1_3_2_1_59_1","volume-title":"Manar Abu Talib, and Ali Bou Nassif","author":"Nasir Qassim","year":"2018","unstructured":"Qassim Nasir, Ilham A Qasse, Manar Abu Talib, and Ali Bou Nassif. 2018. Performance analysis of hyperledger fabric platforms. Security and Communication Networks 2018 (2018)."},{"key":"e_1_3_2_1_60_1","unstructured":"Optimism. 2023. Ethereum Scaled. https:\/\/www.optimism.io."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","unstructured":"Kenneth G Paterson and Sriramkrishnan Srinivasan. 2009. On the relations between non-interactive key distribution identity-based encryption and trapdoor discrete log groups. In Designs Codes and Cryptography.","DOI":"10.1007\/s10623-009-9278-y"},{"key":"e_1_3_2_1_62_1","unstructured":"Torben Pryds Pedersen. 1991. A threshold cryptosystem without a trusted party. In EuroCrypt."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--26954--8_13"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","unstructured":"Benny Pinkas Mike Rosulek Ni Trieu and Avishay Yanai. 2020. PSI from PaXoS: Fast Malicious Private Set Intersection. In Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques Zagreb Croatia May 10--14 2020 Proceedings Part II (Lecture Notes in Computer Science Vol. 12106) Anne Canteaut and Yuval Ishai (Eds.). Springer 739--767. https:\/\/doi.org\/10.1007\/978--3-030--45724--2_25","DOI":"10.1007\/978--3-030--45724--2_25"},{"key":"e_1_3_2_1_65_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Pinkas Benny","year":"2014","unstructured":"Benny Pinkas, Thomas Schneider, and Michael Zohner. 2014. Faster Private Set Intersection Based on OT Extension. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20--22, 2014, Kevin Fu and Jaeyeon Jung (Eds.). USENIX Association, 797--812. https:\/\/www.usenix.org\/conference\/ usenixsecurity14\/technical-sessions\/presentation\/pinkas"},{"key":"e_1_3_2_1_66_1","unstructured":"Tor Project. 2024. Tor Performance Metrics. https:\/\/metrics.torproject.org\/ onionperf-latencies.html."},{"key":"e_1_3_2_1_67_1","unstructured":"Tor Project. 2024. Tor Performance Metrics. https:\/\/metrics.torproject.org\/ onionperf-buildtimes.html."},{"key":"e_1_3_2_1_68_1","unstructured":"R3. 2020. Sizing and Performance. https:\/\/docs.corda.r3.com\/sizing-andperformance. html"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134044"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--77886--6_31"},{"key":"e_1_3_2_1_71_1","volume-title":"The 2000 Symposium on Cryptography and Information Security. 26--28","author":"Sakai R","year":"2000","unstructured":"R Sakai, K Ohgishi, and M Kasahara. 2000. Cryptosystems based on pairing. In The 2000 Symposium on Cryptography and Information Security. 26--28."},{"key":"e_1_3_2_1_72_1","volume-title":"Signal: Speak Freely. https:\/\/signal.org.","year":"2022","unstructured":"Signal. 2022. Signal: Speak Freely. https:\/\/signal.org."},{"key":"e_1_3_2_1_73_1","volume-title":"11Th international conference on parallel and distributed systems (ICPADS'05)","volume":"2","author":"Chow Sherman SM","year":"2005","unstructured":"Ai-fen Sui, Sherman SM Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, CF Chong, KH Pun, and HW Chan. 2005. Separable and anonymous identity-based key issuing. In 11Th international conference on parallel and distributed systems (ICPADS'05), Vol. 2. IEEE, 275--279."},{"key":"e_1_3_2_1_74_1","unstructured":"Yunqing Sun Jonathan Katz Mariana Raykova Phillipp Schoppmann and Xiao Wang. 2024. Large-Scale Private Set Intersection in the Client-Server Setting. IACR Cryptol. ePrint Arch. (2024) 570. https:\/\/eprint.iacr.org\/2024\/570"},{"key":"e_1_3_2_1_75_1","unstructured":"Telegram. 2022. Telegram Privacy Policy. https:\/\/telegram.org\/privacy."},{"key":"e_1_3_2_1_76_1","unstructured":"TLSNotary. 2023. TLSNotary [source code]. https:\/\/github.com\/tlsnotary\/tlsn."},{"key":"e_1_3_2_1_77_1","unstructured":"Tor. 2023. Tor Project. https:\/\/www.torproject.org."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28486-1_1"},{"key":"e_1_3_2_1_79_1","unstructured":"WhatsApp LLC. 2022. WhatsApp: Simple Secure Reliable messaging. https: \/\/www.whatsapp.com."},{"key":"e_1_3_2_1_80_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper.","author":"GavinWood","year":"2014","unstructured":"GavinWood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper."},{"key":"e_1_3_2_1_81_1","volume-title":"Lightweight Authentication of Web Data via Garble-Then-Prove. ePrint","author":"Xie Xiang","year":"2023","unstructured":"Xiang Xie, Kang Yang, Xiao Wang, and Yu Yu. 2023. Lightweight Authentication of Web Data via Garble-Then-Prove. ePrint (2023)."},{"key":"e_1_3_2_1_82_1","volume-title":"Guy Golan Gueta, and Ittai Abraham","author":"Yin Maofan","year":"2019","unstructured":"Maofan Yin, Dahlia Malkhi, Michael K Reiter, Guy Golan Gueta, and Ittai Abraham. 2019. Hotstuff: Bft consensus with linearity and responsiveness. In PODC."},{"key":"e_1_3_2_1_83_1","volume-title":"Deco: Liberating web data using decentralized oracles for TLS. In CCS.","author":"Zhang Fan","year":"2020","unstructured":"Fan Zhang, Deepak Maram, Harjasleen Malvai, Steven Goldfeder, and Ari Juels. 2020. Deco: Liberating web data using decentralized oracles for TLS. In CCS."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670289","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:08:49Z","timestamp":1755842929000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670289"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":83,"alternative-id":["10.1145\/3658644.3670289","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670289","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}