{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T01:22:34Z","timestamp":1649208154612},"reference-count":23,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. & Syst."],"published-print":{"date-parts":[[2012]]},"DOI":"10.1587\/transinf.e95.d.117","type":"journal-article","created":{"date-parts":[[2012,1,4]],"date-time":"2012-01-04T11:34:32Z","timestamp":1325676872000},"page":"117-125","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments"],"prefix":"10.1587","volume":"E95-D","author":[{"given":"Jangseong","family":"KIM","sequence":"first","affiliation":[{"name":"Department of Information and Communications Engineering, KAIST"}]},{"given":"Joonsang","family":"BAEK","sequence":"additional","affiliation":[{"name":"Khalifa University of Science, Technology, and Research (KUSTAR)"}]},{"given":"Jianying","family":"ZHOU","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research"}]},{"given":"Taeshik","family":"SHON","sequence":"additional","affiliation":[{"name":"Division of Information and Computer Engineering, College of Information Technology, Ajou University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/98.943998"},{"key":"2","unstructured":"[2] C. Ellison, “Home network security,” Intel Technology J., vol.6, pp.37-48, 2002."},{"key":"3","unstructured":"[3] C. Lee and S. Helal, “Protocols for service discovery in dynamic and mobile networks,” International Journal of Computer Research, vol.11, no.1, pp.1-12, 2002."},{"key":"4","unstructured":"[4] Sun Microsystems, “Jini technology core platform specification,” Version 2.0, http:\/\/www.sun.com\/software\/jini\/specs\/, 2003."},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] S. Czerwinski, B.Y. Zhao, T. Hodes, A. Joseph, and R. Katz, “An architecture for a secure service discovery service,” Proc. Fifth Annual International Conf. on Mobile Computing and Networks (MobiCom'99), pp.24-35, Aug. 1999.","DOI":"10.1145\/313451.313462"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.1599409"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] S.S. Yau and Y. Yin, “Controlled privacy preserving keyword search,” Proc. ACM Symposium on Information, Computer & Communication Security (ASIACCS'08), pp.321-324, March 2008.","DOI":"10.1145\/1368310.1368356"},{"key":"8","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/978-3-540-30576-7_18","volume":"3378","author":"BONEH DAN","year":"2005","ISSN":"http:\/\/id.crossref.org\/issn\/0302-9743","issn-type":"print"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] P. Golle, J. Staddon, and B. Waters, “Secure conjunctive search over encrypted data,” Proc. Applied Cryptography and Network Security (ACNS'05), LNCS 3089, pp.31-45, June 2005.","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"11","unstructured":"[11] J. Baek, R. Safavi-Naini, and W. Susilo, “Public key encryption with keyword search revisited,” Cryptology ePrint Archive, Report 2005\/191."},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy keyword search over encrypted data in cloud computing,” Proc. IEEE INFOCOM 2010, San Diego, CA, USA, pp.1-5, March 2010.","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"13","unstructured":"[13] V. Levenshtein, “Binary codes capable of correcting spurious insertions and deletion of ones,” Problems of Information Transmission, vol.1, no.1, pp.8-17, 1965."},{"key":"14","unstructured":"[14] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encrypted cloud data,” Proc. 2010 International Conference on Distributed Computing Systems (ICDCS 2010), pp.253-262, Genova, Italy, June 2010."},{"key":"15","unstructured":"[15] A. Singhai, “Modern information retrieval: A brief overview,” IEEE Data Engineering Bulletin, vol.24, no.4, pp.35-43, 2001."},{"key":"16","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/978-3-642-01001-9_13","volume":"5479","author":"BOLDYREVA ALEXANDRA","year":"2009","ISSN":"http:\/\/id.crossref.org\/issn\/0302-9743","issn-type":"print"},{"key":"17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-24676-3_1","volume":"3027","author":"FREEDMAN M J","year":"2004","ISSN":"http:\/\/id.crossref.org\/issn\/0302-9743","issn-type":"print"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] L. Kissner and D.X. Song, “Privacy-preserving set operations,” Advances in Cryptology-CRYPTO'05, LNCS 3621, pp.241-257, Aug. 2005.","DOI":"10.1007\/11535218_15"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-005-6425-1"},{"key":"20","unstructured":"[20] B. Lynn, Pairing Based Cryptography, http:\/\/crypto.stanford.edu\/pbc\/"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] A. Menezes, T. Okamoto, and S. Vanstone, “Reducing elliptic curve logarithms to logarithms in a finite field,” STOC'91: Proc. Twenty-Third Annual ACM Symposium on Theory of Computing, pp.80-89, New York, NY, USA, 1991.","DOI":"10.1145\/103418.103434"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.2307\/2153546"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] S. Xu and M. Yung, “K-anonymous secret handshakes with reusable credentials,” Proc. 11th ACM Conf. on Computer and Communications Security (CCS'04), pp.158-167, Oct. 2004.","DOI":"10.1145\/1030083.1030105"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transinf\/E95.D\/1\/E95.D_1_117\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T06:35:02Z","timestamp":1619418902000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transinf\/E95.D\/1\/E95.D_1_117\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.e95.d.117","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}