{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T04:34:15Z","timestamp":1725856455939},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/iwqos.2017.7969108","type":"proceedings-article","created":{"date-parts":[[2017,7,7]],"date-time":"2017-07-07T14:35:28Z","timestamp":1499438128000},"page":"1-10","source":"Crossref","is-referenced-by-count":4,"title":["Efficient and generalized geometric range search on encrypted spatial data in the cloud"],"prefix":"10.1109","author":[{"family":"Yuchuan Luo","sequence":"first","affiliation":[]},{"family":"Shaojing Fu","sequence":"additional","affiliation":[]},{"given":"Dongsheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiaohua","family":"Jia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Efficient and privacy-preserving polygons spatial query framework for location-based services","author":"zhu","year":"2016","journal-title":"IEEE Internet of Things Journal"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660277"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"key":"ref32","first-page":"10","author":"hwang","year":"2003","journal-title":"Performance Evaluation of Main-memory R-tree Variants"},{"journal-title":"R-trees Theory and Applications","year":"2010","author":"manolopoulos","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/602259.602266"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.38"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943547"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-011-0245-7"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848153"},{"key":"ref40","first-page":"182","article-title":"Circular range search on encrypted spatial data","author":"wang","year":"0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78524-8_10"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.68"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218595"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/197405.197408"},{"journal-title":"Pattern Recognition and Machine Learning (Information Science and Statistics)","year":"2006","author":"bishop","key":"ref15"},{"key":"ref16","first-page":"794","article-title":"Circular range search on encrypted spatial data","author":"wang","year":"0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506145"},{"key":"ref18","first-page":"457","article-title":"Predicate privacy in encryption systems","author":"shen","year":"0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_2"},{"journal-title":"Geometry Revealed A Jacob's Ladder to Modern Higher Geometry","year":"2010","author":"berger","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.282"},{"key":"ref27","first-page":"314","article-title":"Secure and efficient range queries on outsourced databases using r-trces","author":"wang","year":"0"},{"key":"ref3","first-page":"442","article-title":"Privacy preserving keyword searches on remote encrypted data","author":"chang","year":"0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"journal-title":"The Grammar of Graphics","year":"2006","author":"wilkinson","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.23"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"ref2","first-page":"506","article-title":"Public key encryption with keyword search","author":"boneh","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"ref1","first-page":"31","article-title":"Secure conjunctive keyword search over encrypted data","author":"golle","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100289"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.47"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/22145.22163"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/BF02187685"}],"event":{"name":"2017 IEEE\/ACM 25th International Symposium on Quality of Service (IWQoS)","start":{"date-parts":[[2017,6,14]]},"location":"Vilanova i la Geltr\u00fa, Spain","end":{"date-parts":[[2017,6,16]]}},"container-title":["2017 IEEE\/ACM 25th International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7959754\/7969104\/07969108.pdf?arnumber=7969108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T23:34:34Z","timestamp":1506987274000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7969108\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/iwqos.2017.7969108","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}