{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:58:39Z","timestamp":1742975919855,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":15,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400767379"},{"type":"electronic","value":"9789400767386"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-94-007-6738-6_28","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T15:22:19Z","timestamp":1367508139000},"page":"219-226","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["On Privacy Preserving Encrypted Data Stores"],"prefix":"10.1007","author":[{"given":"Tracey","family":"Raybourn","sequence":"first","affiliation":[]},{"given":"Jong Kwan","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Ray","family":"Kresman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,3]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: 2004 ACM SIGMOD international conference on management of data, Paris, pp 563\u2013574","DOI":"10.1145\/1007568.1007632"},{"key":"28_CR2","unstructured":"Alwarsh M, Kresman R (2011) On querying encrypted databases. In: 2011 international conference on security and management, Las Vegas, pp 256\u2013262"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Damiani E, De Capitani di Vimercati S, Jajodia S, Paraboschi S, Samarati P (2003) Balancing confidentiality and efficiency in untrusted relational DBMSs. In: 10th ACM conference on computer and communication security, Washington, DC, pp 93\u2013102","DOI":"10.1145\/948109.948124"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Hore B, Mehrotra S, Tsudik G (2004) A privacy-preserving index for range queries. In: 30th international conference on very large databases, Toronto, pp 720\u2013731","DOI":"10.1016\/B978-012088469-8.50064-4"},{"issue":"3","key":"28_CR5","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s00778-011-0245-7","volume":"21","author":"B Hore","year":"2012","unstructured":"Hore B, Mehrotra S, Canim M, Kantarcioglu M (2012) Secure multidimensional range queries over outsourced data. VLDB J 21(3):333\u2013358","journal-title":"VLDB J"},{"issue":"3","key":"28_CR6","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MMUL.2012.35","volume":"19","author":"B Huet","year":"2012","unstructured":"Huet B, Chua TS, Hauptmann A (2012) Large-scale multimedia data collections. IEEE MultiMedia 19(3):12\u201314 (IEEE Computer Society)","journal-title":"IEEE MultiMedia"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Li J, Omiecinski ER (2005) Efficiency and security trade-off in supporting range queries on encrypted databases. In: 19th annual IFIP WG 11.3 working conference on data and applications security, Storrs, CT, pp 69\u201383","DOI":"10.1007\/11535706_6"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Liu D, Wang S (2012) Programmable order-preserving secure index for encrypted database query. In: 2012 IEEE 5th international conference on cloud computing, Honolulu, pp 502\u2013509","DOI":"10.1109\/CLOUD.2012.65"},{"key":"28_CR9","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379\u2013423","journal-title":"Bell Syst Tech J"},{"issue":"4","key":"28_CR10","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MMUL.2008.96","volume":"15","author":"JR Smith","year":"2008","unstructured":"Smith JR, D\u00f6ller M, Tous R, Gruhne M, Yoon K, Sano M, Burnett IS (2008) The MPEG query format: unifying access to multimedia retrieval systems. IEEE Multimedia 15(4):82\u201395","journal-title":"IEEE Multimedia"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Sun W, Rane S (2012) A distance-sensitive attribute based cryptosystem for privacy-preserving querying. In: 2012 IEEE international conference on multimedia and expo, Melbourne, pp. 386\u2013391","DOI":"10.1109\/ICME.2012.64"},{"issue":"9","key":"28_CR12","doi-asserted-by":"crossref","first-page":"1160","DOI":"10.1002\/cpe.1566","volume":"22","author":"J Wang","year":"2010","unstructured":"Wang J, Du X, Lu J, Lu W (2010) Bucket-based authentication for outsourced databases. Concurr Comput Pract Experience 22(9):1160\u20131180","journal-title":"Concurr Comput Pract Experience"},{"key":"28_CR13","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2011.127","volume":"9","author":"J Weis","year":"2011","unstructured":"Weis J, Alves-Foss J (2011) Securing database as a service: issues and compromises. IEEE Secur Privacy 9:49\u201355","journal-title":"IEEE Secur Privacy"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Win LL, Thomas T, Emmanuel S (2011) A privacy preserving content distribution mechanism for DRM without trusted third parties. In: 2011 IEEE international conference on multimedia and expo, pp 1\u20136, Barcelona","DOI":"10.1109\/ICME.2011.6012033"},{"key":"28_CR15","unstructured":"Yao Y, Guo H, Sun C (2008) An improved indexing scheme for range queries. In: 2008 international conference on security and management, Las Vegas, pp 397\u2013403"}],"container-title":["Lecture Notes in Electrical Engineering","Multimedia and Ubiquitous Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-6738-6_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T00:09:00Z","timestamp":1715299740000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-6738-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9789400767379","9789400767386"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-6738-6_28","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"3 May 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}