{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:12:58Z","timestamp":1767183178665,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,2,1]]},"DOI":"10.23919\/date51398.2021.9473968","type":"proceedings-article","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T22:11:46Z","timestamp":1629843106000},"page":"1282-1287","source":"Crossref","is-referenced-by-count":5,"title":["Real-time Private Membership Test using Homomorphic Encryption"],"prefix":"10.23919","author":[{"given":"Eduardo","family":"Chielle","sequence":"first","affiliation":[]},{"given":"Homer","family":"Gamil","sequence":"additional","affiliation":[]},{"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Microsoft SEAL (release 3 3 2)","year":"2019","key":"ref10"},{"key":"ref11","article-title":"Ho-momorphic encryption security standard","author":"albrecht","year":"2018","journal-title":"HomomorphicEncryption org Toronto Canada"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2569062"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802212"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref17","first-page":"142","article-title":"Sgxpectre: Stealing intel secrets from sgx enclaves via speculative execution","author":"chen","year":"0","journal-title":"2019 IEEE European Symposium on Security and Privacy (EuroS&P)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2287186"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053006"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2019.05.002"},{"journal-title":"Automatically updated moderated and optimized lists for blocking ads trackers malware and other garbage","year":"2020","key":"ref6"},{"journal-title":"Blacklist domains for squid-cache","year":"2020","author":"studio","key":"ref5"},{"key":"ref8","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"fan","year":"2012","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.414"},{"key":"ref1","first-page":"131","article-title":"Cryptographically secure bloom-filters","volume":"2","author":"nojima","year":"2009","journal-title":"Trans Data Privacy"},{"key":"ref9","article-title":"E3: A framework for compiling c++ programs with encrypted operands","author":"chielle","year":"2018","journal-title":"Cryptology EPrint Archive Report 2011\/108"}],"event":{"name":"2021 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2021,2,1]]},"location":"Grenoble, France","end":{"date-parts":[[2021,2,5]]}},"container-title":["2021 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9473901\/9473226\/09473968.pdf?arnumber=9473968","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T23:09:32Z","timestamp":1643411372000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9473968\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,1]]},"references-count":18,"URL":"https:\/\/doi.org\/10.23919\/date51398.2021.9473968","relation":{},"subject":[],"published":{"date-parts":[[2021,2,1]]}}}