{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:45:56Z","timestamp":1762004756096},"reference-count":15,"publisher":"Computers, Materials and Continua (Tech Science Press)","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Automation &amp; Soft Computing"],"published-print":{"date-parts":[[2016,4,2]]},"DOI":"10.1080\/10798587.2015.1095476","type":"journal-article","created":{"date-parts":[[2015,11,13]],"date-time":"2015-11-13T23:51:20Z","timestamp":1447458680000},"page":"295-301","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":4,"title":["Multi-Key Searchable Encryption with Designated Server"],"prefix":"10.32604","volume":"22","author":[{"given":"Yousheng","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Han","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wenjun","family":"Luo","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2015,11,13]]},"reference":[{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69839-5_96"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2014.888243"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38562-9_74"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24861-0_8"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10433-6_16"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2014.915109"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35211-9_72"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23324-1_23"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73489-5_2"},{"key":"CIT0014","first-page":"508","volume":"2013","author":"Popa R. A.","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.03.020"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.11.726"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1587\/elex.6.237"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-013-0398-z"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2013.778985"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/autosoftjournal.net\/viewPaper.php?paper=1095476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T13:12:01Z","timestamp":1591189921000},"score":1,"resource":{"primary":{"URL":"http:\/\/autosoftjournal.net\/paperShow.php?paper=1095476"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,13]]},"references-count":15,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2015,11,26]]},"published-print":{"date-parts":[[2016,4,2]]}},"alternative-id":["10.1080\/10798587.2015.1095476"],"URL":"https:\/\/doi.org\/10.1080\/10798587.2015.1095476","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"value":"1079-8587","type":"print"},{"value":"2326-005X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,13]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}