{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:00:42Z","timestamp":1742976042038,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031770685"},{"type":"electronic","value":"9783031770692"}],"license":[{"start":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T00:00:00Z","timestamp":1731542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T00:00:00Z","timestamp":1731542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-77069-2_8","type":"book-chapter","created":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T05:01:49Z","timestamp":1731474109000},"page":"95-104","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Similar Adjacent Vertex Query on\u00a0Sparse Graph Data in\u00a0Cloud Environment"],"prefix":"10.1007","author":[{"given":"Yun","family":"Tian","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bin","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiaoli","family":"Shi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Caicai","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Du","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,11,14]]},"reference":[{"issue":"3","key":"8_CR1","doi-asserted-by":"publisher","first-page":"1140","DOI":"10.1109\/TSC.2023.3331000","volume":"17","author":"J Jiang","year":"2024","unstructured":"Jiang, J., Wang, D., Zhang, G., et al.: QPause: quantum-resistant password-protected data outsourcing for cloud storage. IEEE Trans. Serv. Comput. 17(3), 1140\u20131153 (2024)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"5","key":"8_CR2","doi-asserted-by":"publisher","first-page":"4181","DOI":"10.1109\/TMC.2023.3288160","volume":"23","author":"Q Liu","year":"2024","unstructured":"Liu, Q., Peng, Y., Jiang, H., et al.: Authorized keyword search on mobile devices in secure data outsourcing. IEEE Trans. Mob. Comput. 23(5), 4181\u20134195 (2024)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"1","key":"8_CR3","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1109\/TWC.2023.3278108","volume":"23","author":"Z Zhou","year":"2024","unstructured":"Zhou, Z., Wan, Y., Cui, Q., et al.: Blockchain-based secure and efficient secret image sharing with outsourcing computation in wireless networks. IEEE Trans. Wireless Commun. 23(1), 423\u2013435 (2024)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Liu, W., Wen, D., Wang, H., et al.: Skyline nearest neighbor search on multi-layer graphs. In: 2014 IEEE 35th International Conference on Data Engineering Workshops, IEEE: Piscataway, N.J., USA, 2019, pp. 259\u2013265 (2019)","DOI":"10.1109\/ICDEW.2019.000-3"},{"issue":"1","key":"8_CR5","doi-asserted-by":"publisher","first-page":"997","DOI":"10.14778\/1920841.1920967","volume":"3","author":"M Potamias","year":"2010","unstructured":"Potamias, M., Bonchi, F., Gionis, A., Kollios, G., et al.: K-nearest neighbors in uncertain graphs. Proc. VLDB Endowment 3(1), 997\u20131008 (2010)","journal-title":"Proc. VLDB Endowment"},{"issue":"6","key":"8_CR6","doi-asserted-by":"publisher","first-page":"6984","DOI":"10.1109\/TPAMI.2020.3005590","volume":"45","author":"R Wang","year":"2023","unstructured":"Wang, R., Yan, J., Yang, X., et al.: Combinatorial learning of robust deep graph matching: an embedding based approach. IEEE Trans. Pattern Anal. Mach. Intell. 45(6), 6984\u20137000 (2023)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.tcs.2018.10.011","volume":"769","author":"C Bazgan","year":"2019","unstructured":"Bazgan, C., Pontoizeau, T., Tuza, Z., et al.: Finding a potential community in networks. Theoret. Comput. Sci. 769, 32\u201342 (2019)","journal-title":"Theoret. Comput. Sci."},{"issue":"4","key":"8_CR8","doi-asserted-by":"publisher","first-page":"2759","DOI":"10.1109\/TNSE.2022.3169220","volume":"9","author":"P Ferrer-Cid","year":"2023","unstructured":"Ferrer-Cid, P., Barcel\u00f3-Ordinas, J., Garc\u00eda-Vidal, J., et al.: Volterra graph-based outlier detection for air pollution sensor networks. IEEE Trans. Netw. Sci. Eng. 9(4), 2759\u20132771 (2023)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"1","key":"8_CR9","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/TDSC.2020.3015886","volume":"19","author":"X Li","year":"2022","unstructured":"Li, X., Ye, H., Li, T., et al.: Efficient and secure outsourcing of differentially private data publishing with multiple evaluators. IEEE Trans. Dependable Secure Comput. 19(1), 67\u201376 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"8_CR10","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TSC.2019.2942297","volume":"15","author":"X Zhang","year":"2022","unstructured":"Zhang, X., Zhao, J., Xu, C., et al.: DOPIV: post-quantum secure identity-based data outsourcing with public integrity verification in cloud storage. IEEE Trans. Serv. Comput. 15(1), 334\u2013345 (2022)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"8_CR11","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy (S &P\u201900), IEEE: Los Alamitos, CA, USA, 2000; pp. 44\u201355 (2000)"},{"key":"8_CR12","doi-asserted-by":"publisher","unstructured":"Chang, Y.C., Howser, G., Mitzenmacher, M., Madria, S.: Privacy preserving keyword searches on remote encrypted data. In: Third International Conference, Applied Cryptography and Network Security (ACNS\u201905), pp. 442\u2013455. Springer: Berlin, Germany (2005). https:\/\/doi.org\/10.1007\/11496137_30","DOI":"10.1007\/11496137_30"},{"key":"8_CR13","unstructured":"Goh, E.J.: Secure indexes. In: Cryptology ePrint Archive, Report 2003\/216 (2003)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, S.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (ccs\u201906), pp. 79\u201388. ACM: Alexandria, VA, United states (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"8_CR15","doi-asserted-by":"publisher","unstructured":"Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search revisited. In: International Conference on Computational Science and Its Applications (ICCSA\u201908), pp. 1249\u20131259. Springer: Berlin, Germany (2008). https:\/\/doi.org\/10.1007\/978-3-540-69839-5_96","DOI":"10.1007\/978-3-540-69839-5_96"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Wang, C., Ren, K., Yu, S., et al.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings of the IEEE INFOCOM 2012, pp. 451\u2013459. IEEE: Orlando, FL, USA (2012)","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"102343","DOI":"10.1016\/j.is.2024.102343","volume":"122","author":"Z Mei","year":"2024","unstructured":"Mei, Z., Yu, J., Zhang, C., et al.: Secure multi-dimensional data retrieval with access control and range query in the cloud. Inf. Syst. 122, 102343 (2024)","journal-title":"Inf. Syst."},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Oyamada, R.S., Shimomura, L.C., Barbon, S., et al.: A meta-learning configuration framework for graph-based similarity search indexes. Inf. Syst. 112, 102123 (2023)","DOI":"10.1016\/j.is.2022.102123"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Chase, M., Kamara, S., et al.: Structured encryption and controlled disclosure. Structured encryption and controlled disclosure. In: Cryptology and Information Security 2010, pp. 577\u2013594 (2010)","DOI":"10.1007\/978-3-642-17373-8_33"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Cao, N., Yang, Z., Wang, C., Ren, K., Lou, W.: Privacy-preserving query over encrypted graph-structured data in cloud computing. In: Proceedings of the 2011 31st International Conference on Distributed Computing Systems (ICDCS\u201911), IEEE: Los Alamitos, CA, USA, (2011), pp. 393\u2013402 (2011)","DOI":"10.1109\/ICDCS.2011.84"},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1109\/TIFS.2017.2774451","volume":"13","author":"M Shen","year":"2018","unstructured":"Shen, M., Ma, B., Zhu, L., et al.: Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection. IEEE Trans. Inf. Forensics Secur. 13, 940\u2013953 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR22","doi-asserted-by":"publisher","unstructured":"Ciucanu, R., Lafourcade, P., et al.: GOOSE: a secure framework for graph outsourcing and SPARQL evaluation. In: Proceedings of Data and Applications Security and Privacy - 34th Annual IFIP WG 11.3 Conference (DBSec 2020), pp. 347\u2013366. Springer: Regensburg, Germany (2020). https:\/\/doi.org\/10.1007\/978-3-030-49669-2_20","DOI":"10.1007\/978-3-030-49669-2_20"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall\/CRC (2007)","DOI":"10.1201\/9781420010756"},{"key":"8_CR24","unstructured":"Singhal, A.: Modern information retrieval: a brief overview. Bull. IEEE Comput. Soc. Tech. Committee Data Eng. 24(4), 35\u201343 (2001)"},{"issue":"1","key":"8_CR25","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/15427951.2009.10129177","volume":"6","author":"J Leskovec","year":"2009","unstructured":"Leskovec, J., Lang, K.J., Dasgupta, A., et al.: Community structure in large networks: natural cluster sizes and the absence of large well-defined clusters. Internet Math. 6(1), 29\u2013123 (2009)","journal-title":"Internet Math."},{"key":"8_CR26","unstructured":"Klimt, B., Yang, Y.: Introducing the Enron corpus. In: First Conference on Email and Anti-Spam (CEAS\u201904), pp. 1\u20132. Google, Microsoft, etc.: Mountain View, CA, USA (2004)"}],"container-title":["Lecture Notes in Computer Science","Edge Computing \u2013 EDGE 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-77069-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T05:02:48Z","timestamp":1731474168000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-77069-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,14]]},"ISBN":["9783031770685","9783031770692"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-77069-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,14]]},"assertion":[{"value":"14 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EDGE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Edge Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangkok","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"edge2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.servicessociety.org\/edge","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}