{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:33:06Z","timestamp":1725600786809},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642231407"},{"type":"electronic","value":"9783642231414"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23141-4_29","type":"book-chapter","created":{"date-parts":[[2011,8,17]],"date-time":"2011-08-17T12:36:48Z","timestamp":1313584608000},"page":"292-305","source":"Crossref","is-referenced-by-count":1,"title":["A Study for Method of Construct Encryption Scheme for Supporting Range Query Based on Bucket ID Transformation about Sensor Applications"],"prefix":"10.1007","author":[{"given":"You-Jin","family":"Song","sequence":"first","affiliation":[]},{"given":"Jae-Sang","family":"Cha","sequence":"additional","affiliation":[]},{"given":"Jang-Mook","family":"Kang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order Preserving Encryption for Numeric Data. In: Proc. of the ACM SIGMOD Conf. on Management of Data, Paris, France, pp. 563\u2013574 (2004)","DOI":"10.1145\/1007568.1007632"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Damiani, E., Vimercati, S.D.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs. In: Proc. of the 10th ACM Conf. on Computer and Communications Security (CCS), pp. 93\u2013102 (2003)","DOI":"10.1145\/948109.948124"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Damiani, E., Vimercati, S.D.C., Finetti, M., Paraboschi, S., Samarati, P., Jajodia, S.: Implementation of a Storage Mechanism for Untrusted DBMSs. In: Proc. of the International IEEE Security in Storage Workshop, p. 38 (2003)","DOI":"10.1109\/SISW.2003.10006"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fcs, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proc. of the 18th International Conference on Data Engineering, p. 29 (2002)","DOI":"10.1109\/ICDE.2002.994695"},{"issue":"2","key":"29_CR5","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1137\/0215025","volume":"15","author":"L. Blum","year":"1986","unstructured":"Blum, L., Blum, M., Shub, M.: A Simple Unpredictable Pseudo Random Number Generator. SIAM Journal on Computing Archive\u00a015(2), 364\u2013383 (1986)","journal-title":"SIAM Journal on Computing Archive"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fcs, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over Encrypted Data in the Database-Service-Provider Model. In: Proc. of the ACM SIGMOD Conf. on Management of Data, Madison,Wisconsin, pp. 216\u2013227 (2002)","DOI":"10.1145\/564691.564717"},{"key":"29_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-24741-8_10","volume-title":"Advances in Database Technology - EDBT 2004","author":"B. Iyer","year":"2004","unstructured":"Iyer, B., Mehrotra, S., Mykletun, E., Tsudik, G., Wu, Y.: A Framework for Efficient Storage Security in RDBMS. In: Hwang, J., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., B\u00f6hm, K. (eds.) EDBT 2004. LNCS, vol.\u00a02992, pp. 147\u2013164. Springer, Heidelberg (2004)"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Chung, S.S., Ozsoyoglu, G.: Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases. In: 22nd International Conference on Data Engineering Workshops (ICDEW 2006), p. 98 (2006)","DOI":"10.1109\/ICDEW.2006.30"}],"container-title":["Communications in Computer and Information Science","Information Security and Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23141-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,31]],"date-time":"2019-03-31T14:44:43Z","timestamp":1554043483000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23141-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642231407","9783642231414"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23141-4_29","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}