{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T08:31:08Z","timestamp":1724142668703},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Key Laboratory of Aerospace Information Security and the Trusted Computing Ministry of Education"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1460971","CNS 1439672","CNS 1301774","ECCS 1231461","ECCS 1128209","CNS 1138963"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572380","61772383","61702379","61772405"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012336","name":"Major State Basic Research Development Program of China","doi-asserted-by":"publisher","award":["2014CB340600"],"id":[{"id":"10.13039\/501100012336","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National High Technology Research and Development Program","award":["2014BAH41B00"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2020,11,1]]},"DOI":"10.1109\/tsc.2017.2765323","type":"journal-article","created":{"date-parts":[[2017,10,23]],"date-time":"2017-10-23T18:06:36Z","timestamp":1508781996000},"page":"1072-1085","source":"Crossref","is-referenced-by-count":26,"title":["EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-7212-5297","authenticated-orcid":false,"given":"Jing","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3472-419X","authenticated-orcid":false,"given":"Kun","family":"He","sequence":"additional","affiliation":[]},{"given":"Lan","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Quan","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Ruiying","family":"Du","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5252-0831","authenticated-orcid":false,"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3472-1717","authenticated-orcid":false,"given":"Jie","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS121104028W"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2448099"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.12.026"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2366471"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218595"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484322"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TIFS.2015.2509912","article-title":"Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds","volume":"11","author":"yang","year":"2016","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1109\/TIFS.2016.2599293","article-title":"Dual-server public-key encryption with keyword search for secure cloud storage","volume":"11","author":"chen","year":"2016","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.215"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848153"},{"key":"ref12","article-title":"Secure indexes","volume":"2003","author":"goh","year":"2003","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"ref14","first-page":"604","article-title":"Approximate nearest neighbors: Towards removingthe curse of dimensionality","year":"1998","journal-title":"Proc Annual ACM Sympos Theory Comput"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2596138"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2604820"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.32"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/997817.997857"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218596"},{"key":"ref4","first-page":"353","article-title":"Highly-scalable searchable symmetric encryption with support for boolean queries","author":"cash","year":"2013","journal-title":"Proceedings of the Advances in Cryptology—CRYPTO"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714623"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935306"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.47"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218594"},{"key":"ref8","article-title":"Practical dynamic searchable encryption with small leakage","volume":"2013","author":"stefanov","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"ref2","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"song","year":"2000","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516730"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2560812"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref22","first-page":"733","article-title":"Secure nearest neighbor revisited","author":"yao","year":"2013","journal-title":"Proc Int Conf Data Eng"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"},{"key":"ref42","first-page":"613","article-title":"Efficient fuzzy search on encrypted data","author":"boldyreva","year":"2014","journal-title":"Fast Software Encryption Third International Workshop Proceedings"},{"key":"ref24","article-title":"Enron email dataset.","year":"0"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2011.6045073"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.94"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-015-1737-3"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_30"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2013.44"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/4629386\/9286945\/8078212-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/9286945\/08078212.pdf?arnumber=8078212","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,27]],"date-time":"2023-08-27T12:24:22Z","timestamp":1693139062000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8078212\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,1]]},"references-count":44,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2017.2765323","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,1]]}}}