{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:15:23Z","timestamp":1763018123325,"version":"3.37.3"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,1,4]],"date-time":"2020-01-04T00:00:00Z","timestamp":1578096000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,4]],"date-time":"2020-01-04T00:00:00Z","timestamp":1578096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61572026"],"award-info":[{"award-number":["61572026"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100010905","name":"Major Research Plan","doi-asserted-by":"publisher","award":["61672195"],"award-info":[{"award-number":["61672195"]}],"id":[{"id":"10.13039\/501100010905","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11036-019-01493-3","type":"journal-article","created":{"date-parts":[[2020,1,4]],"date-time":"2020-01-04T04:53:35Z","timestamp":1578113615000},"page":"1574-1585","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7275-8190","authenticated-orcid":false,"given":"Shaojing","family":"Fu","sequence":"first","affiliation":[]},{"given":"Qi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,4]]},"reference":[{"key":"1493_CR1","doi-asserted-by":"publisher","unstructured":"Indyk P, Motwani R (1998) Approximate Nearest Neighbors: Towards Removing the Curse of Dimensionality. In: Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, STOC \u201998. ACM, New York, pp 604\u2013613. https:\/\/doi.org\/10.1145\/276698.276876","DOI":"10.1145\/276698.276876"},{"key":"1493_CR2","doi-asserted-by":"crossref","unstructured":"Lin W, Wang K, Zhang Z, Chen H (2017) Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants. In: IEEE International Conference on Distributed Computing Systems, pp 1116\u20131125","DOI":"10.1109\/ICDCS.2017.20"},{"key":"1493_CR3","doi-asserted-by":"crossref","unstructured":"Wang B, Yu S, Lou W, Hou YT (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: IEEE INFOCOM, pp 2112\u20132120","DOI":"10.1109\/INFOCOM.2014.6848153"},{"issue":"4","key":"1493_CR4","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1109\/TPDS.2015.2425407","volume":"27","author":"C Chen","year":"2016","unstructured":"Chen C, Zhu X, Shen P, Hu J, Guo S, Tari Z, Zomaya AY (2016) An Efficient Privacy-Preserving Ranked Keyword Search Method. IEEE Trans Parall Distr Syst 27(4):951. https:\/\/doi.org\/10.1109\/TPDS.2015.2425407","journal-title":"IEEE Trans Parall Distr Syst"},{"key":"1493_CR5","doi-asserted-by":"crossref","unstructured":"Wang D, Jia X, Wang C, Yang K, Fu S, Xu M (2015) Generalized pattern matching string search on encrypted data in cloud systems. In: IEEE INFOCOM, pp 2101\u20132109","DOI":"10.1109\/INFOCOM.2015.7218595"},{"key":"1493_CR6","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.jnca.2015.11.023","volume":"64","author":"SK Pasupuleti","year":"2016","unstructured":"Pasupuleti SK, Ramalingam S, Buyya R (2016) An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. J Netw Comput Appl 64:12","journal-title":"J Netw Comput Appl"},{"issue":"12","key":"1493_CR7","doi-asserted-by":"publisher","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","volume":"11","author":"Z Fu","year":"2017","unstructured":"Fu Z, Wu X, Guan C, Sun X, Ren K (2017) Towards Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement. IEEE Trans Inf Foren Sec 11(12):2706","journal-title":"IEEE Trans Inf Foren Sec"},{"key":"1493_CR8","doi-asserted-by":"publisher","unstructured":"Luo Y, Jia X, Fu S, Xu M (2018) pRide: Privacy-preserving Ride-matching over Road Networks for Online Ride Hailing Service. IEEE Transactions On Information Forensics & Security, p 1. https:\/\/doi.org\/10.1109\/TIFS.2018.2885282","DOI":"10.1109\/TIFS.2018.2885282"},{"key":"1493_CR9","doi-asserted-by":"publisher","unstructured":"Liu Z, Li B, Huang Y, Li J, Xiang Y (2019) NewMCOS: Towards a Practical Multi-cloud Oblivious Storage Scheme. WitoldPedrycz, IEEE Transactions on Knowledge and Data Engineering, p 1. https:\/\/doi.org\/10.1109\/TKDE.2019.2891581","DOI":"10.1109\/TKDE.2019.2891581"},{"key":"1493_CR10","doi-asserted-by":"crossref","unstructured":"Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Conference on Information Communications, pp 441\u2013445","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"1493_CR11","doi-asserted-by":"crossref","unstructured":"Zheng M, Zhou H (2014) An Efficient Attack on a Fuzzy Keyword Search Scheme over Encrypted Data. In: IEEE International Conference on High PERFORMANCE Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, pp 1647\u20131651","DOI":"10.1109\/HPCC.and.EUC.2013.232"},{"key":"1493_CR12","doi-asserted-by":"crossref","unstructured":"Wang C, Ren K, Yu S, Urs KMR (2012) Achieving usable and privacy-assured similarity search over outsourced cloud data. In: IEEE INFOCOM, pp 451\u2013459","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"1493_CR13","doi-asserted-by":"crossref","unstructured":"Kuzu M, Islam MS, Kantarcioglu M (2012) Efficient Similarity Search over Encrypted Data. In: IEEE International Conference on Data Engineering, pp 1156\u20131167","DOI":"10.1109\/ICDE.2012.23"},{"issue":"7","key":"1493_CR14","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom BH (1970) Space\/time trade-offs in hash coding with allowable error. Commun ACM 13(7):422. https:\/\/ci.nii.ac.jp\/naid\/20001345133\/en\/","journal-title":"Commun ACM"},{"key":"1493_CR15","doi-asserted-by":"crossref","unstructured":"Datar M, Immorlica N, Indyk P, Mirrokni VS (2004) Locality-sensitive hashing scheme based on p-stable distributions. In: Twentieth Symposium on Computational Geometry, pp 253\u2013262","DOI":"10.1145\/997817.997857"},{"issue":"12","key":"1493_CR16","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1093\/bioinformatics\/btm134","volume":"23","author":"H Kim","year":"2007","unstructured":"Kim H, Park H (2007) Sparse non-negative matrix factorizations via alternating nonnegativity- constrained least squares for microarray data analysis. Bioinformatics 23(12):1495","journal-title":"Bioinformatics"},{"key":"1493_CR17","doi-asserted-by":"crossref","unstructured":"Wong WK, Cheung DW, Kao B, Mamoulis N (2009) Secure kNN computation on encrypted databases. In: ACM SIGMOD International Conference on Management of Data, pp 139\u2013152","DOI":"10.1145\/1559845.1559862"},{"issue":"3","key":"1493_CR18","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1109\/TDSC.2015.2406704","volume":"13","author":"H Li","year":"2016","unstructured":"Li H, Yang Y, Luan T, Liang X, Zhou L, Shen X (2016) Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data. IEEE Trans Depend Secure Comput 13(3):312","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"1493_CR19","doi-asserted-by":"crossref","unstructured":"Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption:improved definitions and efficient constructions. In: ACM Conference on Computer and Communications Security, pp 79\u201388","DOI":"10.1145\/1180405.1180417"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01493-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-019-01493-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01493-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T03:39:51Z","timestamp":1635305991000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-019-01493-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,4]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["1493"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01493-3","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2020,1,4]]},"assertion":[{"value":"4 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}