{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:12:55Z","timestamp":1730301175733,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.56","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"447-451","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-Enhanced Keyword Search in Clouds"],"prefix":"10.1109","author":[{"given":"Miao","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Man Ho","family":"Au","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"song","year":"2000","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.34"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.11.726"},{"journal-title":"Sequences of games A tool for taming complexity in security proofs","year":"2004","author":"shoup","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.55"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533108"},{"key":"3","first-page":"506","article-title":"Public key encryption with keyword search","author":"boneh","year":"2004","journal-title":"Eurocrypt"},{"key":"2","first-page":"1249","article-title":"Public key encryption with keyword search revisited","author":"baek","year":"2008","journal-title":"ICCSA"},{"key":"1","first-page":"217","article-title":"On the integration of public key data encryption and public key encryption with keyword search","author":"baek","year":"2006","journal-title":"ISC"},{"journal-title":"Secure Indexes","year":"2003","author":"jin goh","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"6","first-page":"442","article-title":"Privacy preserving keyword searches on remote encrypted data","author":"chang","year":"2005","journal-title":"ACNS"},{"key":"5","first-page":"75","article-title":"Off-line keyword guessing attacks on recent keyword search schemes over encrypted data","volume":"4165","author":"byun","year":"0","journal-title":"SDM 2006 LNCS"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680873.pdf?arnumber=6680873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:50:53Z","timestamp":1490230253000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.56","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}