{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:08:23Z","timestamp":1725563303142},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642151514"},{"type":"electronic","value":"9783642151521"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15152-1_9","type":"book-chapter","created":{"date-parts":[[2010,8,30]],"date-time":"2010-08-30T14:02:06Z","timestamp":1283176926000},"page":"93-101","source":"Crossref","is-referenced-by-count":3,"title":["Private Searching on MapReduce"],"prefix":"10.1007","author":[{"given":"Huafei","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Feng","family":"Bao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the Clouds: A Berkeley View of Cloud Computing, Technical Report No. UCB\/EECS-2009-28"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-540-74143-5_4","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"D. Boneh","year":"2007","unstructured":"Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith III, W.E.: Public Key Encryption That Allows PIR Queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622, pp. 50\u201367. Springer, Heidelberg (2007)"},{"key":"9_CR3","unstructured":"Dean, J., Ghemawat, S.: MapReduce: Simplified Data Processing on Large Clusters. In: OSDI 2004, pp. 137\u2013150 (2004)"},{"issue":"1","key":"9_CR4","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J. Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. ACM Commun.\u00a051(1), 107\u2013113 (2008)","journal-title":". ACM Commun."},{"issue":"1","key":"9_CR5","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/1629175.1629198","volume":"53","author":"J. Dean","year":"2010","unstructured":"Dean, J., Ghemawat, S.: MapReduce: a flexible data processing tool. CACM Commun.\u00a053(1), 72\u201377 (2010)","journal-title":"CACM Commun."},{"issue":"2","key":"9_CR6","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MITP.2009.40","volume":"11","author":"R.L. Grossman","year":"2009","unstructured":"Grossman, R.L.: The Case for Cloud Computing. IT Professional\u00a011(2), 23\u201327 (2009)","journal-title":"IT Professional"},{"issue":"2","key":"9_CR7","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.future.2008.07.009","volume":"25","author":"R.L. Grossman","year":"2009","unstructured":"Grossman, R.L., Gu, Y., Sabala, M., Zhang, W.: Compute and storage clouds using wide area high performance networks. Future Generation Comp. Syst.\u00a025(2), 179\u2013183 (2009)","journal-title":"Future Generation Comp. Syst."},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/11535218_14","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"R. Ostrovsky","year":"2005","unstructured":"Ostrovsky, R., Skeith III, W.E.: Private Searching on Streaming Data. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 223\u2013240. Springer, Heidelberg (2005)"},{"issue":"4","key":"9_CR9","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s00145-007-0565-3","volume":"20","author":"R. Ostrovsky","year":"2007","unstructured":"Ostrovsky, R., Skeith III, W.E.: Private Searching on Streaming Data. J. Cryptology\u00a020(4), 397\u2013430 (2007)","journal-title":"J. Cryptology"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15152-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,19]],"date-time":"2019-03-19T03:00:59Z","timestamp":1552964459000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15152-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642151514","9783642151521"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15152-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}