{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:09Z","timestamp":1755882609854,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670879","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Robust and Homomorphic Covert Channels in Streams of Numeric Data"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0303-6140","authenticated-orcid":false,"given":"J\u00f6rg","family":"Keller","sequence":"first","affiliation":[{"name":"Faculty of Mathematics and Computer Science, FernUniversit\u00e4t in Hagen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9364-1282","authenticated-orcid":false,"given":"Carina","family":"He\u00dfeling","sequence":"additional","affiliation":[{"name":"Faculty of Mathematics and Computer Science, FernuUniversitaet Hagen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1913-5912","authenticated-orcid":false,"given":"Steffen","family":"Wendzel","sequence":"additional","affiliation":[{"name":"Center for Technology and Transfer, Worms University of Applied Sciences, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Frederik Armknecht Colin Boyd Christopher Carr Kristian Gj\u00f8steen Angela J\u00e4schke Christian\u00a0A. Reuter and Martin Strand. 2015. A Guide to Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. (2015) 1192. http:\/\/eprint.iacr.org\/2015\/1192"},{"key":"e_1_3_2_1_2_1","volume-title":"Ken Borgendale, and Rahul Gupta.","author":"Banks Andrew","year":"2019","unstructured":"Andrew Banks, Ed Briggs, Ken Borgendale, and Rahul Gupta. 2019. MQTT V5.0. OASIS Std.. https:\/\/docs.oasis-open.org\/mqtt\/mqtt\/v5.0\/os\/mqtt-v5.0-os.pdf"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199505"},{"volume-title":"Steganography in Digital Media","author":"Fridrich Jessica","key":"e_1_3_2_1_4_1","unstructured":"Jessica Fridrich. 2009. Steganography in Digital Media. Cambridge University Press, Cambridge, UK."},{"volume-title":"A fully homomorphic encryption scheme. Ph.\u00a0D. Dissertation","author":"Gentry Craig","key":"e_1_3_2_1_5_1","unstructured":"Craig Gentry. 2009. A fully homomorphic encryption scheme. Ph.\u00a0D. Dissertation. Stanford University."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3528580.3532844"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_34"},{"key":"e_1_3_2_1_8_1","volume-title":"Computer Arithmetic Algorithms","author":"Koren Israel","unstructured":"Israel Koren. 2001. Computer Arithmetic Algorithms (2nd ed.). Taylor & Francis, Milton Park, UK.","edition":"2"},{"key":"e_1_3_2_1_9_1","unstructured":"Serge Lang. 2002. Algebra (rev. 3rd ed.). Springer Science+Business New York."},{"key":"e_1_3_2_1_10_1","volume-title":"Error Control Coding. Fundamentals and applications","author":"Lin Shu","unstructured":"Shu Lin and Daniel\u00a0J. Costello. 2004. Error Control Coding. Fundamentals and applications (2nd ed.). Prentice Hall, Upper Saddle River NJ.","edition":"2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0119"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119081715"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5868-1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1637932"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.36227\/techrxiv.20215373"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684195"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670879","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:55:41Z","timestamp":1755881741000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670879"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":16,"alternative-id":["10.1145\/3664476.3670879","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670879","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}