{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:33:48Z","timestamp":1729622028745,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/3pgcic.2011.61","type":"proceedings-article","created":{"date-parts":[[2011,12,22]],"date-time":"2011-12-22T18:08:20Z","timestamp":1324577300000},"page":"200-206","source":"Crossref","is-referenced-by-count":6,"title":["Improving Query Delay in Private Web Search"],"prefix":"10.1109","author":[{"given":"Cristina","family":"Romero-Tris","sequence":"first","affiliation":[]},{"given":"A.","family":"Viejo","sequence":"additional","affiliation":[]},{"given":"J.","family":"Castella-Roca","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/978-3-540-48000-6_21","article-title":"Mix-networks on permutation networks","volume":"1716","author":"abe","year":"1999","journal-title":"Lecture Notes in Computer Science"},{"key":"18","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/3-540-47721-7_17","article-title":"All-or-nothing disclosure of secrets","volume":"263","author":"brassard","year":"1986","journal-title":"Lecture Notes in Computer Science"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_7"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_13"},{"key":"14","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","article-title":"Threshold cryptosystems\", Advances in Cryptology - CRYPTO'89","volume":"335","author":"desmedt","year":"1990","journal-title":"Lecture Notes in Computer Science"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.11.003"},{"key":"3","article-title":"Google Resists U.S. Subpoena of Search Data","author":"hafner","year":"2006","journal-title":"New York Times"},{"key":"2","article-title":"A Face is Exposed for AOL Searcher No. 4417749","author":"barbaro","year":"2006","journal-title":"New York Times"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280695"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.05.009"},{"key":"7","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-642-14527-8_2","article-title":"On the privacy of web search based on query obfuscation: A case study of TrackMeNot","author":"peddinti","year":"2010","journal-title":"Proceedings of the 10th International Conference on Privacy Enhancing Technologies - PETS'10"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1655188.1655204"},{"journal-title":"TrackMeNot","year":"2011","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1108\/14684520910985693"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314351"},{"key":"8","first-page":"21","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"Proceedings of the 13th conference on USENIX Security Symposium"}],"event":{"name":"2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","start":{"date-parts":[[2011,10,26]]},"location":"Barcelona","end":{"date-parts":[[2011,10,28]]}},"container-title":["2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6099686\/6103130\/06103159.pdf?arnumber=6103159","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T11:43:32Z","timestamp":1497959012000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6103159\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/3pgcic.2011.61","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}