{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T22:21:35Z","timestamp":1693693295168},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1007\/s11390-014-1413-1","type":"journal-article","created":{"date-parts":[[2014,1,20]],"date-time":"2014-01-20T13:18:32Z","timestamp":1390223912000},"page":"81-89","source":"Crossref","is-referenced-by-count":6,"title":["Effective Error-Tolerant Keyword Search for Secure Cloud Computing"],"prefix":"10.1007","volume":"29","author":[{"given":"Bo","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiao-Qiong","family":"Pang","sequence":"additional","affiliation":[]},{"given":"Jun-Qiang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,1,10]]},"reference":[{"key":"1413_CR1","unstructured":"Mell P, Grance T. The NIST definition of cloud computing. National Institute of Standards and Technology Special Publication, SP 800-145, September 2011. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf"},{"issue":"4","key":"1413_CR2","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/MSP.2009.87","volume":"7","author":"J Harauz","year":"2009","unstructured":"Harauz J, Kaufman L M, Potter B. Data security in the world of cloud computing. IEEE Security & Privacy, 2009, 7(4): 61\u201364.","journal-title":"IEEE Security & Privacy"},{"issue":"3","key":"1413_CR3","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/1666420.1666444","volume":"53","author":"C Gentry","year":"2010","unstructured":"Gentry C. Computing arbitrary functions of encrypted data. Communications of the ACM, 2010, 53(3): 97\u2013105.","journal-title":"Communications of the ACM"},{"key":"1413_CR4","volume-title":"Public key encryption with keyword search. In Proc. EUROCRYPT 2004, May 2004, pp. 506\u2013522","author":"D Boneh","year":"2004","unstructured":"Boneh D, Crescenzo G D, Ostrovsky R, Persiano G. Public key encryption with keyword search. In Proc. EUROCRYPT 2004, May 2004, pp. 506\u2013522."},{"key":"1413_CR5","doi-asserted-by":"crossref","unstructured":"Boneh D, Kushilevitz E, Ostrovsky R, Skeith W. Public-key encryption that allows PIR queries. In Proc. the 27th CRYPTO, Aug. 2007, pp. 50\u201367.","DOI":"10.1007\/978-3-540-74143-5_4"},{"key":"1413_CR6","doi-asserted-by":"crossref","unstructured":"Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In Proc. the 4th Theory of Cryptography Conference, Feb. 2007, pp. 535\u2013554.","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"1413_CR7","volume-title":"Error-tolerant searchable encryption. In Proc. the IEEE International Conference on Communications, June 2009","author":"J Bringer","year":"2009","unstructured":"Bringer J, Chabanne H, Kindarji B. Error-tolerant searchable encryption. In Proc. the IEEE International Conference on Communications, June 2009."},{"key":"1413_CR8","doi-asserted-by":"crossref","unstructured":"Chang Y, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data. In Proc. the 3rd Int. Conf. Applied Cryptography and Network Security, June 2005, pp. 442\u2013455.","DOI":"10.1007\/11496137_30"},{"issue":"5","key":"1413_CR9","doi-asserted-by":"crossref","first-page":"895","DOI":"10.3233\/JCS-2011-0426","volume":"19","author":"R Curtmola","year":"2011","unstructured":"Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: Improved definitions and efficient constructions. J. Computer Security, 2011, 19(5): 895\u2013934.","journal-title":"J. Computer Security"},{"key":"1413_CR10","unstructured":"Goh E. Secure indexes. IACR ePrint Cryptography Archive, 2003. http:\/\/eprint.iacr.org\/2003\/216 , Dec. 2013."},{"key":"1413_CR11","doi-asserted-by":"crossref","unstructured":"Li J, Wang Q, Wang C, Cao N, Ren K, Lou W. Fuzzy keyword search over encrypted data in cloud computing. In Proc. the 29th IEEE INFOCOM, March 2010, pp. 441\u2013445.","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"1413_CR12","doi-asserted-by":"crossref","unstructured":"Ma S, Yang B, Li K, Xia F. A privacy-preserving join on out-sourced database. In Proc. the 14th Information Security Conference, Oct. 2011, pp. 278\u2013292.","DOI":"10.1007\/978-3-642-24861-0_19"},{"key":"1413_CR13","doi-asserted-by":"crossref","unstructured":"Park D, Kim K, Lee P. Public key encryption with conjunctive field keyword search. In Proc. the 5th Int. Workshop on Information Security Applications, Aug. 2004, pp. 73\u201386.","DOI":"10.1007\/978-3-540-31815-6_7"},{"key":"1413_CR14","doi-asserted-by":"crossref","unstructured":"Pinkas B, Reinman T. Oblivious RAM revisited. In Proc. the 30th CRYPT, Aug. 2010, pp. 502\u2013519.","DOI":"10.1007\/978-3-642-14623-7_27"},{"key":"1413_CR15","volume-title":"Multi-dimensional range query over encrypted data. In Proc. the 2007 IEEE Symp. Security and Privacy, May 2007, pp. 350\u2013364","author":"E Shi","year":"2007","unstructured":"Shi E, Bethencourt J, Chan T et al. Multi-dimensional range query over encrypted data. In Proc. the 2007 IEEE Symp. Security and Privacy, May 2007, pp. 350\u2013364."},{"key":"1413_CR16","volume-title":"Practical techniques for searches on encrypted data. In Proc. the 2000 IEEE Symposium on Security and Privacy, May 2000, pp. 44\u201355","author":"D Song","year":"2000","unstructured":"Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In Proc. the 2000 IEEE Symposium on Security and Privacy, May 2000, pp. 44\u201355."},{"key":"1413_CR17","doi-asserted-by":"crossref","unstructured":"van Liesdonk P, Sedghi S, Doumen J et al. Computationally efficient searchable symmetric encryption. In Proc. the 7th VLDB Workshop. Secure Data Management, Sept. 2010, pp. 87\u2013100.","DOI":"10.1007\/978-3-642-15546-8_7"},{"key":"1413_CR18","doi-asserted-by":"crossref","unstructured":"Pang X, Yang B, Huang Q. Privacy-preserving noisy keyword search in cloud computing. In Proc. the 14th Int. Conf. Information and Communications Security, October 2012, pp. 154\u2013166.","DOI":"10.1007\/978-3-642-34129-8_14"},{"issue":"3","key":"1413_CR19","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O Goldreich","year":"1996","unstructured":"Goldreich O, Ostrovsky R. Software protection and simulation on oblivious RAMS. Journal of the ACM, 1996, 43(3): 431\u2013473.","journal-title":"Journal of the ACM"},{"issue":"1","key":"1413_CR20","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis Y, Ostrovsky R, Reyzin L, Smith A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal of Computing, 2008, 38(1): 97\u2013139.","journal-title":"SIAM Journal of Computing"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-014-1413-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-014-1413-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-014-1413-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T20:49:56Z","timestamp":1565124596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-014-1413-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["1413"],"URL":"https:\/\/doi.org\/10.1007\/s11390-014-1413-1","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1]]}}}