{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:48:34Z","timestamp":1749703714873},"reference-count":5,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T00:00:00Z","timestamp":1601596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T00:00:00Z","timestamp":1601596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11704-019-9125-x","type":"journal-article","created":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T12:03:01Z","timestamp":1601640181000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Simple index based symmetric searchable encryption with result verifiability"],"prefix":"10.1007","volume":"15","author":[{"given":"Dhruti","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Devesh","family":"Jinwala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,2]]},"reference":[{"key":"9125_CR1","doi-asserted-by":"publisher","unstructured":"Ge X, Yu J, Zhang J, Hu C, Li Z, Qin Z, Hao R. Towards achieving search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Transactions on Dependable and Secure Computing, DOI: https:\/\/doi.org\/10.1109\/TDSC.2019.2896258, 2019","DOI":"10.1109\/TDSC.2019.2896258"},{"key":"9125_CR2","doi-asserted-by":"crossref","unstructured":"Ballard L, Kamara S, Monrose F. Achieving efficient conjunctive keyword searches over encrypted data. In: Proceedings of International Conference on Information and Communications Security. 2005, 414\u2013426","DOI":"10.1007\/11602897_35"},{"key":"9125_CR3","doi-asserted-by":"crossref","unstructured":"Byun J W, Lee D H, Lim J. Efficient conjunctive keyword search on encrypted data storage system. In: Proceedings of European Public Key Infrastructure Workshop. 2006, 184\u2013196","DOI":"10.1007\/11774716_15"},{"key":"9125_CR4","doi-asserted-by":"crossref","unstructured":"Wang P, Wang H, Pieprzyk J. Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. In: Proceedings of International Conference on Cryptology and Network Security. 2008, 178\u2013195","DOI":"10.1007\/978-3-540-89641-8_13"},{"issue":"6","key":"9125_CR5","doi-asserted-by":"publisher","first-page":"1083","DOI":"10.1109\/TDSC.2016.2635128","volume":"15","author":"Z Wan","year":"2016","unstructured":"Wan Z, Deng R H. Vpsearch: achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing, 2016, 15(6): 1083\u20131095","journal-title":"IEEE Transactions on Dependable and Secure Computing"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-019-9125-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-019-9125-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-019-9125-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T07:25:36Z","timestamp":1677482736000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-019-9125-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,2]]},"references-count":5,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["9125"],"URL":"https:\/\/doi.org\/10.1007\/s11704-019-9125-x","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,2]]},"assertion":[{"value":"11 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"152805"}}