{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T16:15:56Z","timestamp":1760890556441,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819756087"},{"type":"electronic","value":"9789819756094"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5609-4_4","type":"book-chapter","created":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T12:02:04Z","timestamp":1722340924000},"page":"43-54","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["HybridHash: An Efficient Hash Index for Encrypted Databases"],"prefix":"10.1007","author":[{"given":"Boheng","family":"Lin","sequence":"first","affiliation":[]},{"given":"Hongtao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Peiquan","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Xiaoniu","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,31]]},"reference":[{"issue":"3","key":"4_CR1","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1815933.1815940","volume":"38","author":"E Shmueli","year":"2010","unstructured":"Shmueli, E., Vaisenberg, R., Elovici, Y., Glezer, C.: Database encryption: an overview of contemporary challenges and design considerations. ACM SIGMOD Rec. 38(3), 29\u201334 (2010)","journal-title":"ACM SIGMOD Rec."},{"key":"4_CR2","doi-asserted-by":"publisher","unstructured":"Van Tilborg, H.C., Jajodia, S.: Encyclopedia of Cryptography and Security. Springer Science Business Media (2014).https:\/\/doi.org\/10.1007\/978-1-4419-5906-5","DOI":"10.1007\/978-1-4419-5906-5"},{"issue":"2","key":"4_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1735886.1735891","volume":"35","author":"SDCD Vimercati","year":"2010","unstructured":"Vimercati, S.D.C.D., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM Trans. Database Syst. 35(2), 1\u201346 (2010)","journal-title":"ACM Trans. Database Syst."},{"issue":"3","key":"4_CR4","doi-asserted-by":"publisher","first-page":"1881","DOI":"10.32604\/csse.2023.026690","volume":"44","author":"SS Kirubakaran","year":"2023","unstructured":"Kirubakaran, S.S., Arunachalam, V.P., Karthik, S., Kannan, S.: Towards developing privacy-preserved data security approach (PP-DSA) in cloud computing environment. Comput. Syst. Sci. Eng. 44(3), 1881\u20131895 (2023)","journal-title":"Comput. Syst. Sci. Eng."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Sun, B., Zhao, S., Tian, G.: SQL queries over encrypted databases: a survey. Connect. Sci. 36(1), 2323059 (2024)","DOI":"10.1080\/09540091.2024.2323059"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Tu, S., Zheng, W., Kohler, E., Liskov, B., Madden, S.: Speedy transactions in multicore in-memory databases. In: Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, pp. 18\u201332 (2013)","DOI":"10.1145\/2517349.2522713"},{"issue":"5","key":"4_CR7","doi-asserted-by":"publisher","first-page":"185606","DOI":"10.1007\/s11704-023-3344-x","volume":"18","author":"P Jin","year":"2024","unstructured":"Jin, P., Chu, Z., Liu, G., Luo, Y., Wan, S.: Optimizing b+-tree for hybrid memory with in-node hotspot cache and eADR awareness. Frontiers Comput. Sci. 18(5), 185606 (2024)","journal-title":"Frontiers Comput. Sci."},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Naveed, M., Prabhakaran, M., Gunter, C.A.: Dynamic searchable encryption via blind storage. In: 2014 IEEE Symposium on Security and Privacy, pp. 639\u2013654. IEEE (2014)","DOI":"10.1109\/SP.2014.47"},{"issue":"1","key":"4_CR9","doi-asserted-by":"publisher","first-page":"181803","DOI":"10.1007\/s11704-022-2401-1","volume":"18","author":"X Li","year":"2024","unstructured":"Li, X., Zhu, Y., Xu, R., Wang, J., Zhang, Y.: Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query. Frontiers Comput. Sci. 18(1), 181803 (2024)","journal-title":"Frontiers Comput. Sci."},{"key":"4_CR10","doi-asserted-by":"publisher","unstructured":"Chen, H., Liang, J., Qin, X.: A secure order-preserving encryption scheme based on encrypted index. In: APWeb-WAIM, pp. 247\u2013261 (2022).https:\/\/doi.org\/10.1007\/978-3-031-25201-3_19","DOI":"10.1007\/978-3-031-25201-3_19"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"102469","DOI":"10.1016\/j.jnca.2019.102469","volume":"149","author":"H Zhong","year":"2020","unstructured":"Zhong, H., Li, Z., Cui, J., Sun, Y., Liu, L.: Efficient dynamic multi-keyword fuzzy search over encrypted cloud data. J. Netw. Comput. Appl. 149, 102469 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.jcss.2021.12.004","volume":"126","author":"N Andola","year":"2022","unstructured":"Andola, N., Prakash, S., Yadav, V.K., Venkatesan, S., Verma, S., et al.: A secure searchable encryption scheme for cloud using hash-based indexing. J. Comput. Syst. Sci. 126, 119\u2013137 (2022)","journal-title":"J. Comput. Syst. Sci."},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/BF03391580","volume":"1","author":"Y Wang","year":"2016","unstructured":"Wang, Y., Wang, J., Chen, X.: Secure searchable encryption: a survey. J. Commun. Inf. Netw. 1, 52\u201365 (2016)","journal-title":"J. Commun. Inf. Netw."},{"key":"4_CR14","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp. 44\u201355. IEEE (2000)"},{"key":"4_CR15","unstructured":"Goh, E.J.: Secure indexes. Cryptol. ePrint Archive (2003)"},{"issue":"7","key":"4_CR16","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422\u2013426 (1970)","journal-title":"Commun. ACM"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications security, pp. 79\u201388 (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 965\u2013976 (2012)","DOI":"10.1145\/2382196.2382298"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5609-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T12:02:59Z","timestamp":1722340979000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5609-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819756087","9789819756094"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5609-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"31 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2024\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}