{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:10:05Z","timestamp":1755900605175,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1145\/3734477.3736146","type":"proceedings-article","created":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T21:11:01Z","timestamp":1751058661000},"page":"290-291","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["POSTER: VeilPIR: A Lightweight Private Information Retrieval Protocol for Enhancing Data Privacy in IoT Ecosystems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2492-6935","authenticated-orcid":false,"given":"Saurav","family":"Ghosh","sequence":"first","affiliation":[{"name":"Southeast Missouri State University, Cape Girardeau, Missouri, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1299-7867","authenticated-orcid":false,"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax County, Virginia, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"15th USENIX Symposium on Operating Systems Design and Implementation (OSDI '21)","author":"Ahmad Ishtiyaque","year":"2021","unstructured":"Ishtiyaque Ahmad, Yuntian Yang, Divyakant Agrawal, Amr El Abbadi, and Trinabh Gupta. 2021. Addra: Metadata-Private Voice Communication over Fully Untrusted Infrastructure. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI '21). 313--329. https:\/\/www.usenix.org\/conference\/osdi21\/presentation\/ahmad Introduces the FastPIR protocol."},{"key":"e_1_3_2_1_2_1","volume-title":"Communication--Computation Trade-offs in PIR. In 30th USENIX Security Symposium.","author":"Ali Abrar","year":"2021","unstructured":"Abrar Ali, Tancrede Lepoint, Saba Patel, Mariana Raykova, Peter Schoppmann, Kevin Seth, and Keaton Yeo. 2021. Communication--Computation Trade-offs in PIR. In 30th USENIX Security Symposium."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00062"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492461"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-031-07085--3_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Craig Gentry. 2009. A Fully Homomorphic Encryption Scheme. Ph.D. Dissertation. Stanford University. https:\/\/crypto.stanford.edu\/gentry\/pubs\/FHE.pdf","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_8_1","volume-title":"One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval. In 32nd USENIX Security Symposium. 3889--3905","author":"Henzinger Andreas","year":"2023","unstructured":"Andreas Henzinger, Melody M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, and Vinod Vaikuntanathan. 2023. One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval. In 32nd USENIX Security Symposium. 3889--3905."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485381"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540--48910-X_16"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"}],"event":{"name":"WiSec 2025: 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Arlington VA USA","acronym":"WiSec 2025"},"container-title":["18th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3734477.3736146","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T21:45:54Z","timestamp":1755899154000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3734477.3736146"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":11,"alternative-id":["10.1145\/3734477.3736146","10.1145\/3734477"],"URL":"https:\/\/doi.org\/10.1145\/3734477.3736146","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]},"assertion":[{"value":"2025-06-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}