{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T14:11:11Z","timestamp":1725718271951},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642368172"},{"type":"electronic","value":"9783642368189"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36818-9_25","type":"book-chapter","created":{"date-parts":[[2013,3,4]],"date-time":"2013-03-04T11:14:54Z","timestamp":1362395694000},"page":"243-252","source":"Crossref","is-referenced-by-count":3,"title":["Secure and Verifiable Outsourcing of Sequence Comparisons"],"prefix":"10.1007","author":[{"given":"Yansheng","family":"Feng","sequence":"first","affiliation":[]},{"given":"Hua","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Atallah, M., Kerschbaum, F., Du, W.: Secure and private sequence comparisons. In: ACM Workshop on the Privacy in Electronic Society, WPES (2003)","DOI":"10.1145\/1005140.1005147"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Atallah, M., Li, J.: Secure outsourcing of sequence comparisons. In: Workshop on Privacy Enhancing Technologies, PET, pp. 63\u201378 (2004)","DOI":"10.1007\/11423409_5"},{"issue":"4","key":"25_CR3","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10207-005-0070-3","volume":"4","author":"M. Atallah","year":"2005","unstructured":"Atallah, M., Li, J.: Secure outsourcing of sequence comparisons. International Journal of Information Security\u00a04(4), 277\u2013287 (2005)","journal-title":"International Journal of Information Security"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Blanton, M., Aliasgari, M.: Secure outsourcing of DNA searching via finite automata. In: DBSec, pp. 49\u201364 (2010)","DOI":"10.1007\/978-3-642-13739-6_4"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: USENIX Security Symposium (2011)","DOI":"10.1007\/978-3-642-25560-1_2"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Jha, S., Kruger, L., Shmatikov, V.: Toward practical privacy for genomic computation. In: IEEE Symposium on Security and Privacy, pp. 216\u2013230 (2008)","DOI":"10.1109\/SP.2008.34"},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-10433-6_1","volume-title":"Cryptology and Network Security","author":"V. Kolesnikov","year":"2009","unstructured":"Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 1\u201320. Springer, Heidelberg (2009)"},{"key":"25_CR8","unstructured":"Szajda, D., Pohl, M., Owen, J., Lawson, B.: Toward a practical data privacy scheme for a distributed implementation of the Smith-Waterman genome sequence comparison algorithm. In: Network and Distributed System Security Symposium, NDSS (2006)"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Yao, A.: How to generate and exchange secrets. In: IEEE Symposium on Foundations of Computer Science, FOCS, pp. 162\u2013167 (1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the ACM Symposium on the Theory of Computing, STOC (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-642-33167-1_29","volume-title":"Computer Security \u2013 ESORICS 2012","author":"M. Blanton","year":"2012","unstructured":"Blanton, M., Atallah, M.J., Frikken, K.B., Malluhi, Q.: Secure and Efficient Outsourcing of Sequence Comparisons. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol.\u00a07459, pp. 505\u2013522. Springer, Heidelberg (2012)"},{"issue":"2","key":"25_CR12","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s00145-008-9036-8","volume":"22","author":"Y. Lindell","year":"2009","unstructured":"Lindell, Y., Pinkas, B.: A proof of Yao\u2019s protocol for secure two-party computation. Journal of Cryptology\u00a022(2), 161\u2013188 (2009)","journal-title":"Journal of Cryptology"},{"key":"25_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-642-14623-7_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"R. Gennaro","year":"2010","unstructured":"Gennaro, R., Gentry, C., Parno, B.: Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.\u00a06223, pp. 465\u2013482. Springer, Heidelberg (2010)"},{"key":"25_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-642-28914-9_24","volume-title":"Theory of Cryptography","author":"B. Parno","year":"2012","unstructured":"Parno, B., Raykova, M., Vaikuntanathan, V.: How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol.\u00a07194, pp. 422\u2013439. Springer, Heidelberg (2012)"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Blanton, M., Zhang, Y., Frikken, K.B.: Secure and Verifiable Outsourcing of Large-Scale Biometric Computations. In: IEEE International Conference on Information Privacy, Security, Risk and Trust, PASSAT, pp. 1185\u20131191 (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.13"},{"issue":"4","key":"25_CR16","first-page":"46","volume":"3","author":"S.S. Vivek","year":"2012","unstructured":"Vivek, S.S., Selvi, S.S.D., Venkatesan, R., Rangan, C.P.: A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, JoWUA\u00a03(4), 46\u201360 (2012)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)"},{"issue":"4","key":"25_CR17","first-page":"61","volume":"3","author":"J. Wang","year":"2012","unstructured":"Wang, J., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S., Chen, X.: A New Effcient Veriable Fuzzy Keyword Search Scheme. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, JoWUA\u00a03(4), 61\u201371 (2012)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)"}],"container-title":["Lecture Notes in Computer Science","Information and Communicatiaon Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36818-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T07:28:30Z","timestamp":1562743710000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36818-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642368172","9783642368189"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36818-9_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}