{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T04:31:53Z","timestamp":1749184313529},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,2,22]],"date-time":"2021-02-22T00:00:00Z","timestamp":1613952000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,2,22]],"date-time":"2021-02-22T00:00:00Z","timestamp":1613952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s11277-021-08268-8","type":"journal-article","created":{"date-parts":[[2021,2,22]],"date-time":"2021-02-22T06:02:52Z","timestamp":1613973772000},"page":"369-383","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Aggregation Encryption Method of Social Network Privacy Data Based on Matrix Decomposition Algorithm"],"prefix":"10.1007","volume":"127","author":[{"given":"Hongjing","family":"Bi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,22]]},"reference":[{"issue":"5","key":"8268_CR1","doi-asserted-by":"publisher","first-page":"1288","DOI":"10.1109\/TEMC.2018.2808497","volume":"60","author":"PH Shen","year":"2018","unstructured":"Shen, P. H., Qi, Y. H., Yu, W., & Li, F. H. (2018). Inverse matrix auto-search technique for the RTS MIMO OTA test\u2014Part II: validations. IEEE Transactions on Electromagnetic Compatibility, 60(5), 1288\u20131295.","journal-title":"IEEE Transactions on Electromagnetic Compatibility"},{"issue":"3","key":"8268_CR2","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1109\/JSAC.2018.2815442","volume":"36","author":"LH Zhu","year":"2018","unstructured":"Zhu, L. H., Tang, X. Y., Shen, M., Du, X. J., & Guizani, M. (2018). Privacy-preserving DDoS attack detection using cross-domain traffic in software defined networks. IEEE Journal on Selected Areas in Communications, 36(3), 628\u2013643.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"6","key":"8268_CR3","doi-asserted-by":"publisher","first-page":"5813","DOI":"10.1109\/TVT.2019.2959383","volume":"69","author":"BW Chen","year":"2020","unstructured":"Chen, B. W., Wu, L. B., Wang, H. Q., Zhou, L., & He, D. B. (2020). A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks. IEEE Transactions on Vehicular Technology, 69(6), 5813\u20135825.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"9","key":"8268_CR4","doi-asserted-by":"publisher","first-page":"11587","DOI":"10.1364\/OE.26.011587","volume":"26","author":"HS Jiao","year":"2018","unstructured":"Jiao, H. S., Pu, T., Zheng, J. L., Zhou, H., Lu, L., Xiang, P., et al. (2018). Semi-quantum noise randomized data encryption based on an amplified spontaneous emission light source. Optics Express, 26(9), 11587.","journal-title":"Optics Express"},{"issue":"3","key":"8268_CR5","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1049\/iet-spr.2018.5401","volume":"13","author":"D Hassan","year":"2019","unstructured":"Hassan, D., Redif, S., & Lambotharan, S. (2019). Polynomial matrix decompositions and semi-blind channel estimation for MIMO frequency-selective channels. IET Signal Processing, 13(3), 356\u2013366.","journal-title":"IET Signal Processing"},{"issue":"2","key":"8268_CR6","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1007\/s11276-017-1597-8","volume":"25","author":"JJ Hong","year":"2019","unstructured":"Hong, J. J., Liu, B., Sun, Q. Y., & Li, F. G. (2019). A combined public-key scheme in the case of attribute-based for wireless body area networks. Wireless Networks, 25(2), 845\u2013859.","journal-title":"Wireless Networks"},{"issue":"4","key":"8268_CR7","first-page":"1","volume":"199","author":"L Zhang","year":"2018","unstructured":"Zhang, L., Kim, K. T., & Bathe, K. J. (2018). The new paradigm of finite element solutions with overlapping elements in CAD\u2014Computational efficiency of the procedure. Computers & Structures, 199(4), 1\u201317.","journal-title":"Computers & Structures"},{"issue":"5","key":"8268_CR8","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1070\/QEL17283","volume":"50","author":"AS Trushechkin","year":"2020","unstructured":"Trushechkin, A. S. (2020). Operational meaning and practical aspects of the use of the security parameter in the quantum key distribution. Quantum Electronics, 50(5), 426\u2013439.","journal-title":"Quantum Electronics"},{"issue":"2","key":"8268_CR9","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1080\/03772063.2017.1419835","volume":"65","author":"MU Bokhari","year":"2019","unstructured":"Bokhari, M. U., Shallal, Q. M., & Tamandani, Y. K. (2019). Reducing the required time and power for data encryption and decryption using K-NN machine learning. IETE Journal of Research, 65(2), 227\u2013235.","journal-title":"IETE Journal of Research"},{"issue":"6","key":"8268_CR10","doi-asserted-by":"publisher","first-page":"153","DOI":"10.23919\/JCC.2020.06.013","volume":"17","author":"LC Cao","year":"2020","unstructured":"Cao, L. C., Kang, Y. F., Wu, Q. R., Wu, R., & Tao, F. (2020). Searchable encryption cloud storage with dynamic data update to support efficient policy hiding. China Communications, 17(6), 153\u2013163.","journal-title":"China Communications"},{"issue":"12","key":"8268_CR11","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1631\/FITEE.1800192","volume":"20","author":"M Padhya","year":"2019","unstructured":"Padhya, M., & Jinwala, D. C. (2019). MULKASE: A novel approach for key-aggregate searchable encryption for multi-owner data. Frontiers of Information Technology & Electronic Engineering, 20(12), 1717\u20131748.","journal-title":"Frontiers of Information Technology & Electronic Engineering"},{"issue":"6","key":"8268_CR12","first-page":"1098","volume":"33","author":"J Kim","year":"2019","unstructured":"Kim, J., & Vetter, J. S. (2019). Implementing efficient data compression and encryption in a persistent key-value store for HPC. Experimental Mechanics, 33(6), 1098\u20131112.","journal-title":"Experimental Mechanics"},{"issue":"07","key":"8268_CR13","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1142\/S0129054117500289","volume":"28","author":"JH Wei","year":"2018","unstructured":"Wei, J. H., Huang, X. Y., Liu, W. F., & Hu, X. X. (2018). Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security. International Journal of Foundations of Computer Science, 28(07), 843\u2013868.","journal-title":"International Journal of Foundations of Computer Science"},{"issue":"3","key":"8268_CR14","doi-asserted-by":"publisher","first-page":"1034","DOI":"10.1007\/s11036-018-1060-9","volume":"24","author":"V Vijayakumar","year":"2019","unstructured":"Vijayakumar, V., Priyan, M. K., Ushadevi, G., Varatharajan, R., Manogaran, G., & Tarare, P. V. (2019). E-Health cloud security using timing enabled proxy re-encryption. Mobile Networks & Applications, 24(3), 1034\u20131045.","journal-title":"Mobile Networks & Applications"},{"issue":"004","key":"8268_CR15","first-page":"322","volume":"037","author":"Z Wen","year":"2020","unstructured":"Wen, Z. (2020). Research on revoidable encryption simulation of ontology storage data in Internet of Things. Computer Simulation, 037(004), 322\u2013325.","journal-title":"Computer Simulation"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08268-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08268-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08268-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T13:19:14Z","timestamp":1671023954000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08268-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,22]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["8268"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08268-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,22]]},"assertion":[{"value":"4 February 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}