{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:03:10Z","timestamp":1740096190302,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_18","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"178-184","source":"Crossref","is-referenced-by-count":2,"title":["Data Protection and Privacy Preservation Using Searchable Encryption on Outsourced Databases"],"prefix":"10.1007","author":[{"given":"Lucas Rodrigo","family":"Raso Mattos","sequence":"first","affiliation":[]},{"given":"Vijayaraghavan","family":"Varadharajan","sequence":"additional","affiliation":[]},{"given":"Rajarathnam","family":"Nallusamy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Playstation\u2019s blog (2011), \n                    \n                      http:\/\/blog.eu.playstation.com\/2011\/04\/28\/playstation-network-and-qriocity-outage-faq\/"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 506\u2013522. Springer, Heidelberg (2004), \n                    \n                      http:\/\/dx.doi.org\/10.1007\/978-3-540-24676-3_30"},{"key":"18_CR3","doi-asserted-by":"crossref","first-page":"367","DOI":"10.3233\/JCS-2010-0415","volume":"19","author":"C. Dong","year":"2011","unstructured":"Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. Journal of Computer Security\u00a019, 367\u2013397 (2011), \n                    \n                      http:\/\/iospress.metapress.com\/content\/5400312680314865","journal-title":"Journal of Computer Security"},{"key":"18_CR4","first-page":"25","volume":"10","author":"C. Gu","year":"2010","unstructured":"Gu, C., Zhu, Y.: New efficient searchable encryption schemes from bilinear pairings. International Journal of Network Security\u00a010, 25\u201331 (2010)","journal-title":"International Journal of Network Security"},{"issue":"3","key":"18_CR5","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MIC.2011.25","volume":"15","author":"D. Irani","year":"2011","unstructured":"Irani, D., Webb, S., Pu, C., Li, K.: Modeling unintended personal-information leakage from multiple online social networks. IEEE Internet Computing\u00a015(3), 13\u201319 (2011)","journal-title":"IEEE Internet Computing"},{"key":"18_CR6","unstructured":"Quinn, B., Arthur, C.: Playstation network hackers access data of 77 million users (2011), \n                    \n                      http:\/\/www.guardian.co.uk\/technology\/2011\/apr\/26\/playstation-network-hackers-data"},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1145\/1653662.1653687","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009","author":"T. Ristenpart","year":"2009","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 199\u2013212. ACM, New York (2009), \n                    \n                      http:\/\/doi.acm.org\/10.1145\/1653662.1653687"},{"key":"18_CR8","unstructured":"Vijayan, J.: Two more organizations report data breaches (2006), \n                    \n                      http:\/\/www.computerworld.com\/s\/article\/9000878\/Two_more_organizations_report_data_breaches_?taxonomyId=17\/"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:45:45Z","timestamp":1620132345000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}