{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:54:55Z","timestamp":1725771295917},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_35","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T09:26:22Z","timestamp":1391765182000},"page":"396-403","source":"Crossref","is-referenced-by-count":4,"title":["Privacy Preserving Ranked Keyword Search over Encrypted Cloud Data"],"prefix":"10.1007","author":[{"given":"Dinesh","family":"Nepolean","sequence":"first","affiliation":[]},{"given":"I.","family":"Karthik","sequence":"additional","affiliation":[]},{"given":"Mu.","family":"Preethi","sequence":"additional","affiliation":[]},{"given":"Rahul","family":"Goyal","sequence":"additional","affiliation":[]},{"given":"M. Kathirvel","family":"Vanethi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","unstructured":"Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proc. of IEEE Symposium on Security and Privacy 2000 (2000)"},{"key":"35_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 506\u2013522. Springer, Heidelberg (2004)"},{"key":"35_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/11496137_30","volume-title":"Applied Cryptography and Network Security","author":"Y.-C. Chang","year":"2005","unstructured":"Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 442\u2013455. Springer, Heidelberg (2005)"},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: Proc. of IEEE INFOCOM 2010 Mini-Conference (2010)","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Wang, C., Cao, N., Ren, K., Lou, W.: Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data. IEEE Transactions on Parallel and Distributed Systems\u00a023(8) (2012)","DOI":"10.1109\/TPDS.2011.282"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proc. of ICDCS 2010 (2010)","DOI":"10.1109\/ICDCS.2010.34"},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient Constructions. In: Proc. of ACM CCS 2006(2006)","DOI":"10.1145\/1180405.1180417"},{"issue":"4","key":"35_CR8","first-page":"2250","volume":"2","author":"R. Rajan","year":"2012","unstructured":"Rajan, R.: Efficient and Privacy Preserving Multi User Keyword Search For Cloud Storage Services. International Journal of Advanced Technology and Engineering Research (IJATER)\u00a02(4) (2012) ISSN 2250 - 3536","journal-title":"International Journal of Advanced Technology and Engineering Research (IJATER)"},{"key":"35_CR9","unstructured":"Khan, Z.A., Pateriya, R.K.: Multiple Pattern String Matching Methodologies: A Comparative Analysis (2012)"},{"key":"35_CR10","volume-title":"Managing gigabytes: Compressing and indexing documents and images","author":"I.H. Witten","year":"1999","unstructured":"Witten, I.H., Moffat, A., Bell, T.C.: Managing gigabytes: Compressing and indexing documents and images. Morgan Kaufmann Publishing, San Francisco (1999)"},{"key":"35_CR11","unstructured":"Moataz, T., Shifka, A.: Boolean Symmetric Searchable Encryption"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T02:07:05Z","timestamp":1558836425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_35","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}