{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:26:27Z","timestamp":1730319987765,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,10]],"date-time":"2018-06-10T00:00:00Z","timestamp":1528588800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS0538"],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,10]]},"DOI":"10.1145\/3210240.3223569","type":"proceedings-article","created":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T08:36:06Z","timestamp":1530866166000},"page":"508-510","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Leveraging Secure Multiparty Computation in the Internet of Things"],"prefix":"10.1145","author":[{"given":"Marcel","family":"von Maltitz","sequence":"first","affiliation":[{"name":"Chair of Network Architectures and Services, Department of Informatics, Technical University of Munich"}]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[{"name":"Chair of Network Architectures and Services, Department of Informatics, Technical University of Munich"}]}],"member":"320","published-online":{"date-parts":[[2018,6,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"e_1_3_2_1_2_1","first-page":"281","article-title":"Practical Secure Aggregation for Privacy Preserving Machine Learning","volume":"2017","author":"Bonawitz Keith","year":"2017","unstructured":"Keith Bonawitz , Vladimir Ivanov , Ben Kreuter , Antonio Marcedone , H Brendan McMahan , Sarvar Patel , Daniel Ramage , Aaron Segal , and Karn Seth . 2017 . Practical Secure Aggregation for Privacy Preserving Machine Learning . IACR Cryptology ePrint Archive 2017 (2017), 281 . Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, and Karn Seth. 2017. Practical Secure Aggregation for Privacy Preserving Machine Learning. IACR Cryptology ePrint Archive 2017 (2017), 281.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_3_1","unstructured":"Ran Canetti. 1999. Security and Composition of Multi-party Cryptographic Protocols. (1999). Ran Canetti. 1999. Security and Composition of Multi-party Cryptographic Protocols. (1999)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/874063.875553"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62214"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"S. Cheshire and M. Krochmal. 2013. DNS-Based Service Discovery. RFC 6763 (Proposed Standard). http:\/\/www.ietf.org\/rfc\/rfc6763.txt S. Cheshire and M. Krochmal. 2013. DNS-Based Service Discovery. RFC 6763 (Proposed Standard). http:\/\/www.ietf.org\/rfc\/rfc6763.txt","DOI":"10.17487\/rfc6763"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"S. Cheshire and M. Krochmal. 2013. Multicast DNS. RFC 6762 (Proposed Standard). http:\/\/www.ietf.org\/rfc\/rfc6762.txt S. Cheshire and M. Krochmal. 2013. Multicast DNS. RFC 6762 (Proposed Standard). http:\/\/www.ietf.org\/rfc\/rfc6762.txt","DOI":"10.17487\/rfc6762"},{"key":"e_1_3_2_1_8_1","volume-title":"Ivan Bjerre Damgard, and Jesper Buus Nielsen","author":"Cramer Ronald","year":"2015","unstructured":"Ronald Cramer , Ivan Bjerre Damgard, and Jesper Buus Nielsen . 2015 . Secure Multiparty Computation and Secret Sharing. Cambridge University Press , New York, NY, USA. 373 pages. Ronald Cramer, Ivan Bjerre Damgard, and Jesper Buus Nielsen. 2015. Secure Multiparty Computation and Secret Sharing. Cambridge University Press, New York, NY, USA. 373 pages."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.13"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978357"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11623-009-0072-9"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406322"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"}],"event":{"name":"MobiSys '18: The 16th Annual International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Munich Germany","acronym":"MobiSys '18"},"container-title":["Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3210240.3223569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T23:53:54Z","timestamp":1673222034000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3210240.3223569"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,10]]},"references-count":15,"alternative-id":["10.1145\/3210240.3223569","10.1145\/3210240"],"URL":"https:\/\/doi.org\/10.1145\/3210240.3223569","relation":{},"subject":[],"published":{"date-parts":[[2018,6,10]]},"assertion":[{"value":"2018-06-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}