{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:48:32Z","timestamp":1749703712467,"version":"3.37.3"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2020,10,16]],"date-time":"2020-10-16T00:00:00Z","timestamp":1602806400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,16]],"date-time":"2020-10-16T00:00:00Z","timestamp":1602806400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2018YFB0804702","2016QY04W0802"],"award-info":[{"award-number":["2018YFB0804702","2016QY04W0802"]}]},{"name":"Science and Technology Program of Sichuan","award":["2016JY0007"],"award-info":[{"award-number":["2016JY0007"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["ZYGX2016J216"],"award-info":[{"award-number":["ZYGX2016J216"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s12652-020-02565-z","type":"journal-article","created":{"date-parts":[[2020,10,16]],"date-time":"2020-10-16T17:02:35Z","timestamp":1602867755000},"page":"8319-8337","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Secure image classification with deep neural networks for IoT applications"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4080-2668","authenticated-orcid":false,"given":"Abdelrhman","family":"Hassan","sequence":"first","affiliation":[]},{"given":"Fei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Fanchuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,16]]},"reference":[{"key":"2565_CR1","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-25385-0_2","volume-title":"Advances in cryptology\u2014ASIACRYPT 2011","author":"S Agrawal","year":"2011","unstructured":"Agrawal S, Freeman DM, Vaikuntanathan V (2011) Functional encryption for inner product predicates from learning with errors. In: Lee DH, Wang X (eds) Advances in cryptology\u2014ASIACRYPT 2011. Springer, Berlin, pp 21\u201340"},{"key":"2565_CR2","doi-asserted-by":"crossref","unstructured":"Araki T, Barak A, Furukawa J, Keller M, Lindell Y, Ohara K, Tsuchida H (2018) Generalizing the SPDZ compiler for other protocols. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp 880\u2013895","DOI":"10.1145\/3243734.3243854"},{"key":"2565_CR3","doi-asserted-by":"publisher","unstructured":"Bhardwaj S, Pandove G, Dahiya PK (2020) An efficient comparison of two indexing-based deep learning models for the formation of a web-application based IoT-cloud network. J Ambient Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-020-02500-2","DOI":"10.1007\/s12652-020-02500-2"},{"key":"2565_CR4","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-540-88313-5_13","volume-title":"Computer security\u2014ESORICS 2008","author":"D Bogdanov","year":"2008","unstructured":"Bogdanov D, Laur S, Willemson J (2008) Sharemind: a framework for fast privacy-preserving computations. In: Jajodia S, Lopez J (eds) Computer security\u2014ESORICS 2008. Springer, Berlin, pp 192\u2013206"},{"issue":"2","key":"2565_CR5","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1137\/120868669","volume":"43","author":"Z Brakerski","year":"2014","unstructured":"Brakerski Z, Vaikuntanathan V (2014) Efficient fully homomorphic encryption from (standard) LWE. SIAM J Comput 43(2):831\u2013871","journal-title":"SIAM J Comput"},{"issue":"3","key":"2565_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2633600","volume":"6","author":"Z Brakerski","year":"2014","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V (2014) (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans Comput Theory (TOCT) 6(3):1\u201336","journal-title":"ACM Trans Comput Theory (TOCT)"},{"key":"2565_CR7","doi-asserted-by":"crossref","unstructured":"Chillotti I, Gama N, Georgieva M, Izabachene M (2016) Faster fully homomorphic encryption: bootstrapping in less than 0.1\u00a0seconds. In: International conference on the theory and application of cryptology and information security. Springer, Berlin, pp 3\u201333","DOI":"10.1007\/978-3-662-53887-6_1"},{"issue":"1","key":"2565_CR8","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","volume":"33","author":"I Chillotti","year":"2020","unstructured":"Chillotti I, Gama N, Georgieva M, Izabach\u00e8ne M (2020) TFHE: fast fully homomorphic encryption over the torus. J Cryptol 33(1):34\u201391","journal-title":"J Cryptol"},{"key":"2565_CR9","unstructured":"Dowlin N, Gilad-Bachrach R, Laine K, Lauter K, Naehrig M, Wernsing J (2016) Cryptonets: applying neural networks to encrypted data with high throughput and accuracy. Technical Report MSR-TR-2016-3, Microsoft Research"},{"issue":"8","key":"2565_CR10","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MCOM.2018.1701148","volume":"56","author":"M Du","year":"2018","unstructured":"Du M, Wang K, Chen Y, Wang X, Sun Y (2018) Big data privacy preserving in multi-access edge computing for heterogeneous internet of things. IEEE Commun Mag 56(8):62\u201367. https:\/\/doi.org\/10.1109\/MCOM.2018.1701148","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"2565_CR11","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Elgamal","year":"1985","unstructured":"Elgamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469\u2013472","journal-title":"IEEE Trans Inf Theory"},{"key":"2565_CR12","unstructured":"Elhabob R, Sella I, Zhao Y, Zhu G, Xiong H (2018) A heterogeneous systems public key encryption with equality test in smart city. In: Proceedings of the 18th international conference on electronic business. ICEB, Guilin"},{"key":"2565_CR13","doi-asserted-by":"publisher","first-page":"68957","DOI":"10.1109\/ACCESS.2019.2917326","volume":"7","author":"R Elhabob","year":"2019","unstructured":"Elhabob R, Zhao Y, Sella I, Xiong H (2019) Efficient certificateless public key cryptography with equality test for internet of vehicles. IEEE Access 7:68957\u201368969","journal-title":"IEEE Access"},{"issue":"3","key":"2565_CR14","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1007\/s12652-019-01365-4","volume":"11","author":"R Elhabob","year":"2020","unstructured":"Elhabob R, Zhao Y, Sella I, Xiong H (2020) An efficient certificateless public key cryptography with authorized equality test in IIoT. J Ambient Intell Human Comput 11(3):1065\u20131083","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2565_CR15","doi-asserted-by":"publisher","unstructured":"Eltayieb N, Elhabob R, Hassan A, Li F (2020) Secure mobile health system supporting search function and decryption verification. J Ambient Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-020-02321-3","DOI":"10.1007\/s12652-020-02321-3"},{"key":"2565_CR16","doi-asserted-by":"publisher","unstructured":"Ferreira B, Rodrigues J, Leit\u00e3o J, Domingos H (2015) Privacy-preserving content-based image retrieval in the cloud. In: 2015 IEEE 34th symposium on reliable distributed systems (SRDS), pp 11\u201320. https:\/\/doi.org\/10.1109\/SRDS.2015.27","DOI":"10.1109\/SRDS.2015.27"},{"key":"2565_CR17","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-642-29011-4_28","volume-title":"Advances in cryptology\u2014EUROCRYPT 2012","author":"C Gentry","year":"2012","unstructured":"Gentry C, Halevi S, Smart NP (2012) Fully homomorphic encryption with polylog overhead. In: Pointcheval D, Johansson T (eds) Advances in cryptology\u2014EUROCRYPT 2012. Springer, Berlin, pp 465\u2013482"},{"key":"2565_CR18","unstructured":"Gilad-Bachrach R, Dowlin N, Laine K, Lauter K, Naehrig M, Wernsing J (2016) Cryptonets: applying neural networks to encrypted data with high throughput and accuracy. In: International conference on machine learning, pp 201\u2013210"},{"key":"2565_CR19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography: Volume 2, Basic Applications","author":"O Goldreich","year":"2004","unstructured":"Goldreich O (2004) Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, New York"},{"key":"2565_CR20","doi-asserted-by":"publisher","unstructured":"Goldreich O, Micali S, Wigderson A (1987) How to play ANY mental game. In: Proceedings of the 19th Annual Conference on Theory of computing. Vol. 87 ACM, New York, pp 218\u2013229. https:\/\/doi.org\/10.1145\/28395.28420","DOI":"10.1145\/28395.28420"},{"issue":"1","key":"2565_CR21","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S Goldwasser","year":"1989","unstructured":"Goldwasser S, Micali S, Rackoff C (1989) The knowledge complexity of interactive proof systems. SIAM J Comput 18(1):186\u2013208. https:\/\/doi.org\/10.1137\/0218012","journal-title":"SIAM J Comput"},{"key":"2565_CR22","unstructured":"Halevi S, Shoup V (2014) HElib-an implementation of homomorphic encryption. Cryptology ePrint Archive, Report 2014\/039"},{"issue":"6","key":"2565_CR23","doi-asserted-by":"publisher","first-page":"1713","DOI":"10.1007\/s12652-017-0622-1","volume":"9","author":"A Hassan","year":"2018","unstructured":"Hassan A, Eltayieb N, Elhabob R, Li F (2018) An efficient certificateless user authentication and key exchange protocol for client-server environment. J Ambient Intell Human Comput 9(6):1713\u20131727","journal-title":"J Ambient Intell Human Comput"},{"key":"2565_CR24","doi-asserted-by":"publisher","unstructured":"Hassan A, Wang Y, Elhabob R, Eltayieb N, Li F (2020) An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments. J Syst Archit 109:101776. https:\/\/doi.org\/10.1016\/j.sysarc.2020.101776","DOI":"10.1016\/j.sysarc.2020.101776"},{"key":"2565_CR25","doi-asserted-by":"publisher","unstructured":"Hastings M, Hemenway B, Noble D, Zdancewic S (2019) Sok: General purpose compilers for secure multi-party computation. In: 2019 IEEE symposium on security and privacy (SP), pp 1220\u20131237. https:\/\/doi.org\/10.1109\/SP.2019.00028","DOI":"10.1109\/SP.2019.00028"},{"issue":"3","key":"2565_CR26","first-page":"123","volume":"2018","author":"E Hesamifard","year":"2018","unstructured":"Hesamifard E, Takabi H, Ghasemi M, Wright RN (2018) Privacy-preserving machine learning as a service. Proc Priv Enhanc Technol 2018(3):123\u2013142","journal-title":"Proc Priv Enhanc Technol"},{"issue":"7","key":"2565_CR27","doi-asserted-by":"publisher","first-page":"3411","DOI":"10.1109\/TIP.2016.2568460","volume":"25","author":"S Hu","year":"2016","unstructured":"Hu S, Wang Q, Wang J, Qin Z, Ren K (2016) Securing sift: privacy-preserving outsourcing computation of feature extractions over encrypted image data. IEEE Trans Image Process 25(7):3411\u20133425","journal-title":"IEEE Trans Image Process"},{"key":"2565_CR28","doi-asserted-by":"crossref","unstructured":"Huang K, Liu X, Fu S, Guo D, Xu M (2019) A lightweight privacy-preserving CNN feature extraction framework for mobile sensing. IEEE Trans Dependable Secur Comput","DOI":"10.1109\/TDSC.2019.2913362"},{"issue":"1","key":"2565_CR29","doi-asserted-by":"publisher","first-page":"e16","DOI":"10.1002\/itl2.16","volume":"1","author":"J Joy","year":"2018","unstructured":"Joy J, Rabsatt V, Gerla M (2018) Internet of vehicles: enabling safe, secure, and private vehicular crowdsourcing. Internet Technol Lett 1(1):e16","journal-title":"Internet Technol Lett"},{"key":"2565_CR30","unstructured":"Juvekar C, Vaikuntanathan V, Chandrakasan A (2018) GAZELLE: a low latency framework for secure neural network inference. In: 27th USENIX security symposium (USENIX Security 18). USENIX Association, Baltimore, pp 1651\u20131669"},{"key":"2565_CR31","doi-asserted-by":"crossref","unstructured":"Khayyam H, Javadi B, Jalili M, Jazar RN (2020) Artificial intelligence and internet of things for autonomous vehicles. In: Nonlinear approaches in engineering applications. Springer, Berlin, pp 39\u201368","DOI":"10.1007\/978-3-030-18963-1_2"},{"key":"2565_CR32","first-page":"1097","volume-title":"Advances in neural information processing systems 25","author":"A Krizhevsky","year":"2012","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) ImageNet classification with deep convolutional neural networks. In: Pereira F, Burges CJC, Bottou L, Weinberger KQ (eds) Advances in neural information processing systems 25. Curran Associates, Inc., Red Hook, pp 1097\u20131105"},{"issue":"6","key":"2565_CR33","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2017) ImageNet classification with deep convolutional neural networks. Commun ACM 60(6):84\u201390. https:\/\/doi.org\/10.1145\/3065386","journal-title":"Commun ACM"},{"issue":"15","key":"2565_CR34","doi-asserted-by":"publisher","first-page":"4349","DOI":"10.1007\/s00500-016-2066-5","volume":"21","author":"P Li","year":"2017","unstructured":"Li P, Li T, Yao ZA, Tang CM, Li J (2017) Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Comput 21(15):4349\u20134359","journal-title":"Soft Comput"},{"key":"2565_CR35","doi-asserted-by":"crossref","unstructured":"Liu J, Juuti M, Lu Y, Asokan N (2017a) Oblivious neural network predictions via miniONN transformations. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, pp 619\u2013631","DOI":"10.1145\/3133956.3134056"},{"key":"2565_CR36","doi-asserted-by":"crossref","unstructured":"Liu J, Yang J, Xiong L, Pei J (2017b) Secure skyline queries on cloud platform. In: 2017 IEEE 33rd international conference on data engineering (ICDE), pp 633\u2013644","DOI":"10.1109\/ICDE.2017.117"},{"key":"2565_CR37","doi-asserted-by":"publisher","first-page":"119209","DOI":"10.1109\/ACCESS.2019.2935222","volume":"7","author":"F Liu","year":"2019","unstructured":"Liu F, Wang Y, Wang F, Zhang Y, Lin J (2019) Intelligent and secure content-based image retrieval for mobile users. IEEE Access 7:119209\u2013119222. https:\/\/doi.org\/10.1109\/ACCESS.2019.2935222","journal-title":"IEEE Access"},{"key":"2565_CR38","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/978-3-030-12612-4_24","volume-title":"Topics in cryptology\u2014CT-RSA 2019","author":"E Makri","year":"2019","unstructured":"Makri E, Rotaru D, Smart NP, Vercauteren F (2019) EPIC: efficient private image classification (or: learning from the masters). In: Matsui M (ed) Topics in cryptology\u2014CT-RSA 2019. Springer, Cham, pp 473\u2013492"},{"issue":"5","key":"2565_CR39","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1007\/s10994-016-5602-8","volume":"106","author":"Q Mao","year":"2017","unstructured":"Mao Q, Wang L, Tsang IW (2017) A unified probabilistic framework for robust manifold learning and embedding. Mach Learn 106(5):627\u2013650","journal-title":"Mach Learn"},{"key":"2565_CR40","doi-asserted-by":"crossref","unstructured":"Mohassel P, Rindal P (2018) ABY3: a mixed protocol framework for machine learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp 35\u201352","DOI":"10.1145\/3243734.3243760"},{"key":"2565_CR41","doi-asserted-by":"crossref","unstructured":"Mohassel P, Zhang Y (2017) SecureML: a system for scalable privacy-preserving machine learning. In: 2017 IEEE symposium on security and privacy (SP), pp 19\u201338","DOI":"10.1109\/SP.2017.12"},{"key":"2565_CR42","doi-asserted-by":"crossref","unstructured":"Nasr M, Shokri R, Houmansadr A (2019) Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning. In: 2019 IEEE symposium on security and privacy (SP), pp 739\u2013753","DOI":"10.1109\/SP.2019.00065"},{"issue":"4","key":"2565_CR43","doi-asserted-by":"publisher","first-page":"2506","DOI":"10.1109\/JIOT.2017.2764259","volume":"5","author":"Z Ning","year":"2017","unstructured":"Ning Z, Hu X, Chen Z, Zhou M, Hu B, Cheng J, Obaidat MS (2017) A cooperative quality-aware service access system for social internet of vehicles. IEEE Internet Things J 5(4):2506\u20132517","journal-title":"IEEE Internet Things J"},{"key":"2565_CR44","doi-asserted-by":"crossref","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp 223\u2013238","DOI":"10.1007\/3-540-48910-X_16"},{"key":"2565_CR45","unstructured":"Polyakov Y, Rohloff K, Ryan GW (2018) Palisade lattice cryptography library. Cybersecurity Research Center, New Jersey Institute of Technology, Newark, NJ, USA, Technical Report"},{"key":"2565_CR46","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.comcom.2018.06.001","volume":"127","author":"N Rahim","year":"2018","unstructured":"Rahim N, Ahmad J, Muhammad K, Sangaiah AK, Baik SW (2018) Privacy-preserving image retrieval for mobile devices with deep features on the cloud. Comput Commun 127:75\u201385","journal-title":"Comput Commun"},{"key":"2565_CR47","doi-asserted-by":"crossref","unstructured":"Riazi MS, Weinert C, Tkachenko O, Songhori EM, Schneider T, Koushanfar F (2018) Chameleon: a hybrid secure computation framework for machine learning applications. In: Proceedings of the 2018 on Asia conference on computer and communications security, pp 707\u2013721","DOI":"10.1145\/3196494.3196522"},{"key":"2565_CR48","doi-asserted-by":"crossref","unstructured":"Rouhani BD, Riazi MS, Koushanfar F (2018) DeepSecure: scalable provably-secure deep learning. In: Proceedings of the 55th annual design automation conference. pp 1\u20136","DOI":"10.1145\/3195970.3196023"},{"key":"2565_CR49","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-642-14423-3_16","volume-title":"Information, security and cryptology\u2014ICISC 2009","author":"AR Sadeghi","year":"2010","unstructured":"Sadeghi AR, Schneider T, Wehrenberg I (2010) Efficient privacy-preserving face recognition. In: Lee D, Hong S (eds) Information, security and cryptology\u2014ICISC 2009. Springer, Berlin, pp 229\u2013244"},{"key":"2565_CR50","unstructured":"SEAL (2019) Microsoft SEAL (release 3.3). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research, Redmond, WA"},{"issue":"5","key":"2565_CR51","doi-asserted-by":"publisher","first-page":"1821","DOI":"10.1007\/s12652-018-1161-0","volume":"11","author":"K Shankar","year":"2020","unstructured":"Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu S, Yuan X (2020) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Human Comput 11(5):1821\u20131833","journal-title":"J Ambient Intell Human Comput"},{"key":"2565_CR52","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146\u2013164","journal-title":"Comput Netw"},{"key":"2565_CR53","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint. arXiv:1409.1556"},{"issue":"2","key":"2565_CR54","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/MSP.2007.914237","volume":"25","author":"M Slaney","year":"2008","unstructured":"Slaney M, Casey M (2008) Locality-sensitive hashing for finding nearest neighbors [lecture notes]. IEEE Signal Process Mag 25(2):128\u2013131. https:\/\/doi.org\/10.1109\/MSP.2007.914237","journal-title":"IEEE Signal Process Mag"},{"key":"2565_CR55","doi-asserted-by":"crossref","unstructured":"Songhori EM, Hussain SU, Sadeghi A, Schneider T, Koushanfar F (2015) TinyGarble: highly compressed and scalable sequential garbled circuits. In: 2015 IEEE symposium on security and privacy, pp 411\u2013428","DOI":"10.1109\/SP.2015.32"},{"issue":"3","key":"2565_CR56","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/COMST.2008.4625806","volume":"10","author":"Y Toor","year":"2008","unstructured":"Toor Y, Muhlethaler P, Laouiti A, De La Fortelle A (2008) Vehicle ad hoc networks: applications and related technical issues. IEEE Commun Surv Tutor 10(3):74\u201388","journal-title":"IEEE Commun Surv Tutor"},{"key":"2565_CR57","first-page":"284","volume":"47","author":"Y Wang","year":"2019","unstructured":"Wang Y, Hassan A, Duan X, Zhang X (2019a) An efficient multiple-user location-based query authentication approach for social networking. J Inf Secur Appl 47:284\u2013294","journal-title":"J Inf Secur Appl"},{"key":"2565_CR58","first-page":"335","volume":"47","author":"Y Wang","year":"2019","unstructured":"Wang Y, Hassan A, Liu F, Guan Y, Zhang Z (2019b) Secure string pattern query for open data initiative. J Inf Secur Appl 47:335\u2013352","journal-title":"J Inf Secur Appl"},{"key":"2565_CR59","first-page":"102399","volume":"49","author":"Y Wang","year":"2019","unstructured":"Wang Y, Liu F, Pang Z, Hassan A, Lu W (2019c) Privacy-preserving content-based image retrieval for mobile computing. J Inf Secur Appl 49:102399","journal-title":"J Inf Secur Appl"},{"key":"2565_CR60","doi-asserted-by":"crossref","unstructured":"Wang Y, Zhang S, Tang Y, Su Q, Chen B (2019d) Rational adversary with flexible utility in secure two-party computation. J Ambient Intell Human Comput 10(8):2913\u20132927","DOI":"10.1007\/s12652-017-0669-z"},{"issue":"5","key":"2565_CR61","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","volume":"4","author":"Y Yang","year":"2017","unstructured":"Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet Things J 4(5):1250\u20131258. https:\/\/doi.org\/10.1109\/JIOT.2017.2694844","journal-title":"IEEE Internet Things J"},{"key":"2565_CR62","doi-asserted-by":"crossref","unstructured":"Yao ACC (1986) How to generate and exchange secrets. In: 27th Annual symposium on foundations of computer science (SFCS 1986), pp 162\u2013167","DOI":"10.1109\/SFCS.1986.25"},{"key":"2565_CR63","doi-asserted-by":"crossref","unstructured":"Yi X, Bertino E, Rao FY, Bouguettaya A (2016) Practical privacy-preserving user profile matching in social networks. In: 2016 IEEE 32nd international conference on data engineering (ICDE). IEEE, New York, pp 373\u2013384","DOI":"10.1109\/ICDE.2016.7498255"},{"key":"2565_CR64","unstructured":"Zahur S, Evans D (2015) Obliv-C: a language for extensible data-oblivious computation. IACR Cryptol, ePrint Archive, Report 2015\/1153"},{"key":"2565_CR65","doi-asserted-by":"crossref","unstructured":"Zheng P, Huang J (2013) An efficient image homomorphic encryption scheme with small ciphertext expansion. In: Proceedings of the 21st ACM international conference on multimedia, pp 803\u2013812","DOI":"10.1145\/2502081.2502105"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02565-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-020-02565-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02565-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,16]],"date-time":"2021-10-16T20:57:34Z","timestamp":1634417854000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-020-02565-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,16]]},"references-count":65,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["2565"],"URL":"https:\/\/doi.org\/10.1007\/s12652-020-02565-z","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2020,10,16]]},"assertion":[{"value":"27 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}