{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:12:30Z","timestamp":1730268750391,"version":"3.28.0"},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/inm.2015.7140497","type":"proceedings-article","created":{"date-parts":[[2015,7,6]],"date-time":"2015-07-06T17:19:27Z","timestamp":1436203167000},"page":"1365-1368","source":"Crossref","is-referenced-by-count":1,"title":["Fogging the cloud — Implementing and evaluating searchable encryption schemes in practice"],"prefix":"10.1109","author":[{"given":"Manuel","family":"Koschuch","sequence":"first","affiliation":[]},{"given":"Michael","family":"Hombauer","sequence":"additional","affiliation":[]},{"given":"Sigrid","family":"Schefer-Wenzl","sequence":"additional","affiliation":[]},{"given":"Ulrich","family":"Habock","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Hrdlicka","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"216","article-title":"Secure indexes","volume":"2003","author":"goh","year":"2003","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"ref6","first-page":"84","article-title":"Theory and Practice of Cryptography Solutions for Secure Information Systems","author":"tang","year":"2013","journal-title":"Search in Encrypted Data Theoretical Models and Practical Applications"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364125"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2003.1194035"},{"key":"ref2","article-title":"A fully homomorphic encryption scheme","author":"gentry","year":"2009","journal-title":"Crypto stanford edu\/craig"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"}],"event":{"name":"2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM)","start":{"date-parts":[[2015,5,11]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2015,5,15]]}},"container-title":["2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7121095\/7140257\/07140497.pdf?arnumber=7140497","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T14:13:24Z","timestamp":1490364804000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7140497\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/inm.2015.7140497","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}