{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:39:58Z","timestamp":1771025998796,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2015,9,4]],"date-time":"2015-09-04T00:00:00Z","timestamp":1441324800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012166","name":"973 program","doi-asserted-by":"crossref","award":["2013CB834205"],"award-info":[{"award-number":["2013CB834205"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2013M532104"],"award-info":[{"award-number":["2013M532104"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LZ12F02005"],"award-info":[{"award-number":["LZ12F02005"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s10207-015-0302-0","type":"journal-article","created":{"date-parts":[[2015,9,3]],"date-time":"2015-09-03T11:20:28Z","timestamp":1441279228000},"page":"539-547","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Efficient wildcard search over encrypted data"],"prefix":"10.1007","volume":"15","author":[{"given":"Changhui","family":"Hu","sequence":"first","affiliation":[]},{"given":"Lidong","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,4]]},"reference":[{"issue":"4","key":"302_CR1","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., et al.: A view of cloud computing. Commun. ACM 53(4), 50\u201358 (2010)","journal-title":"Commun. ACM"},{"key":"302_CR2","doi-asserted-by":"crossref","unstructured":"Suga, S., Nishide, T., Sakurai, K.: Secure keyword search using Bloom filter with specified character positions. In: Proceedings of ProvSec 2012, LNCS 7496, pp. 235\u2013252 (2012)","DOI":"10.1007\/978-3-642-33272-2_15"},{"key":"302_CR3","doi-asserted-by":"crossref","unstructured":"Bosch, C., Brinkman, R., Hartel, P., Jonker, W.: Conjunctive wildcard search over encrypted data. In: Proceedings of SDM 2011, pp. 114\u2013117(2011)","DOI":"10.1007\/978-3-642-23556-6_8"},{"key":"302_CR4","unstructured":"Goh, E.-J.: Secure indexes. IACR Cryptology ePrint Archive 2003 report 216 (2003). http:\/\/eprint.iacr.org\/2003\/216"},{"issue":"3","key":"302_CR5","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM 43(3), 431\u2013473 (1996)","journal-title":"J. ACM"},{"key":"302_CR6","unstructured":"Song, D., Wagner, D., Perrig, A.: Practical techniques for searching on encrypted data. In: IEEE Symposium on Security and Privacy (SSP), pp. 44\u201355 (2000)"},{"key":"302_CR7","doi-asserted-by":"crossref","unstructured":"Chang, Y., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Proceedings of Applied Cryptography and Network Security (ACNS), pp. 442\u2013455 (2005)","DOI":"10.1007\/11496137_30"},{"key":"302_CR8","doi-asserted-by":"crossref","unstructured":"Watanabe, C., Arai, Y.: Privacy-preserving queries for a DAS model using encrypted Bloom filter. In: Proceedings of DASFAA 2009. LNCS 5463, pp. 491\u2013495 (2009)","DOI":"10.1007\/978-3-642-00887-0_43"},{"key":"302_CR9","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. In: Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 79\u201388 (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"302_CR10","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of ACM Conference on Computer and Communications Security (CCS), pp. 965\u2013976 (2012)","DOI":"10.1145\/2382196.2382298"},{"key":"302_CR11","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C.: Parallel and dynamic searchable symmetric encryption. In: Proceedings of Financial Cryptography and Data Security (FC\u201913), LNCS 7859, pp. 258\u2013274 (2013)","DOI":"10.1007\/978-3-642-39884-1_22"},{"key":"302_CR12","doi-asserted-by":"crossref","unstructured":"Stefanov, Emil, Papamanthou, Charalampos, Shi, Elaine: Practical Dynamic Searchable Encryption with Small Leakage. NDSS (2014)","DOI":"10.14722\/ndss.2014.23298"},{"key":"302_CR13","unstructured":"Naveed, M., Prabhakaran, M., Gunter, C.A.: Dynamic Searchable Encryption via Blind Storage. IACR Cryptology ePrint Archive 2014 report 219, (2014). https:\/\/eprint.iacr.org\/2014\/219"},{"key":"302_CR14","doi-asserted-by":"crossref","unstructured":"Cash, D., Jaeger, J., Jarecki, S., et al.: Dynamic searchable encryption in very large databases: data structures and implementation. NDSS (2014)","DOI":"10.14722\/ndss.2014.23264"},{"key":"302_CR15","doi-asserted-by":"crossref","unstructured":"Sedghi, S., van Liesdonk, P., Nikova, S., Hartel, P., Jonker, W.: Searching keywords with wildcards on encrypted data. In: Proceedings of SCN 2010, LNCS 6280, pp. 138\u2013153 (2010)","DOI":"10.1007\/978-3-642-15317-4_10"},{"key":"302_CR16","doi-asserted-by":"crossref","unstructured":"Wang, C., Ren, K., Yu, S.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings of IEEE INFOCOM 2012, pp. 451\u2013459 (2012)","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"302_CR17","doi-asserted-by":"crossref","unstructured":"Wang, B., Yu, S., Lou, W., Hou, Y.T.: Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud. In IEEE INFOCOM (2014)","DOI":"10.1109\/INFOCOM.2014.6848153"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0302-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-015-0302-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0302-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0302-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T20:14:35Z","timestamp":1589573675000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-015-0302-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,4]]},"references-count":17,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["302"],"URL":"https:\/\/doi.org\/10.1007\/s10207-015-0302-0","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,4]]}}}