{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:09:08Z","timestamp":1758845348565},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319422930"},{"type":"electronic","value":"9783319422947"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42294-7_59","type":"book-chapter","created":{"date-parts":[[2016,7,11]],"date-time":"2016-07-11T11:00:47Z","timestamp":1468234847000},"page":"659-669","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient Conjunctive Keyword Searchable Encryption Scheme for Mobile Cloud Computing"],"prefix":"10.1007","author":[{"given":"Tao","family":"Lin","sequence":"first","affiliation":[]},{"given":"Zexian","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Hexu","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,12]]},"reference":[{"issue":"4","key":"59_CR1","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MWC.2015.7224730","volume":"22","author":"H Li","year":"2015","unstructured":"Li, H., Liu, D., Dai, Y.: Engineering searchable encryption of mobile cloud networks: when QoE meets QoP. Wirel. Commun. 22(4), 74\u201380 (2015)","journal-title":"Wirel. Commun."},{"issue":"3","key":"59_CR2","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1109\/TETC.2015.2445101","volume":"3","author":"R Ma","year":"2015","unstructured":"Ma, R., Li, J., Guan, H., Xia, M.: ESED: efficient encrypted data search as a mobile cloud service. Emerg. Top. Comput. 3(3), 372\u2013383 (2015)","journal-title":"Emerg. Top. Comput."},{"issue":"1","key":"59_CR3","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao, N., Wang, C., Li, M., Ren, K.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. Parallel Distrib. Syst. 25(1), 222\u2013233 (2014)","journal-title":"Parallel Distrib. Syst."},{"issue":"8","key":"59_CR4","first-page":"146","volume":"23","author":"C Wang","year":"2012","unstructured":"Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. Parallel Distrib. 23(8), 146\u20131479 (2012)","journal-title":"Parallel Distrib."},{"key":"59_CR5","doi-asserted-by":"crossref","unstructured":"Nyberg, K.: Fast accumulated hashing. In: Proceedings of the International Workshop on Fast Software Encryption (FSE), pp. 83\u201387(1996)","DOI":"10.1007\/3-540-60865-6_45"},{"key":"59_CR6","unstructured":"Nyberg, K.: Commutativity in cryptography. In: Proceedings of the International Workshop on Functional Analysis, pp. 331\u2013342(1996)"},{"key":"59_CR7","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Security and Privacy (S&P), PP. 44\u201355(2000)"},{"key":"59_CR8","series-title":"Lecture Notes in Computer Science","first-page":"442","volume-title":"Applied Cryptography and Network Security","author":"Y-C Chang","year":"2005","unstructured":"Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442\u2013455. Springer, Heidelberg (2005)"},{"key":"59_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506\u2013522. Springer, Heidelberg (2004)"},{"issue":"2","key":"59_CR10","first-page":"30","volume":"18","author":"Q Shen","year":"2014","unstructured":"Shen, Q.: Exploiting geodistributed clouds for e-Health monitoring system with minimum service delay and privacy preservation. Health Inform. 18(2), 30\u201339 (2014)","journal-title":"Health Inform."},{"issue":"4","key":"59_CR11","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MCC.2014.85","volume":"1","author":"Ma Dong","year":"2014","unstructured":"Dong, Ma.: Multi cloud-based evacuation services for emergency management. Cloud Comput. 1(4), 50\u201359 (2014)","journal-title":"Cloud Comput."},{"issue":"5","key":"59_CR12","first-page":"22","volume":"61","author":"H Liang","year":"2012","unstructured":"Liang, H.: An SMDP-based service model for interdomain resource allocation in mobile cloud networks. Veh. Technol. 61(5), 22\u201332 (2012)","journal-title":"Veh. Technol."}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42294-7_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T14:11:57Z","timestamp":1498313517000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42294-7_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319422930","9783319422947"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42294-7_59","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}