{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:59:54Z","timestamp":1772906394561,"version":"3.50.1"},"reference-count":35,"publisher":"Oxford University Press (OUP)","issue":"12","license":[{"start":{"date-parts":[[2018,8,3]],"date-time":"2018-08-03T00:00:00Z","timestamp":1533254400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12,1]]},"DOI":"10.1093\/comjnl\/bxy075","type":"journal-article","created":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T22:47:16Z","timestamp":1532040436000},"page":"1806-1824","source":"Crossref","is-referenced-by-count":7,"title":["Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage"],"prefix":"10.1093","volume":"61","author":[{"given":"Yi","family":"Dou","sequence":"first","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong"}]},{"given":"Henry C B","family":"Chan","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong"}]},{"given":"Man Ho","family":"Au","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong"}]}],"member":"286","published-online":{"date-parts":[[2018,8,3]]},"reference":[{"key":"key\n\t\t\t\t2018112402024922100_bxy075C1","doi-asserted-by":"crossref","first-page":"18:1","DOI":"10.1145\/2636328","article-title":"A survey of provably secure searchable encryption","volume":"47","author":"B\u00f6sch","year":"2014","journal-title":"ACM Comput. Surv."},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C2","author":"Wang","year":"2014"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C3","author":"Wang","year":"2015"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C4","author":"Sun","year":"2014"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C5","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TPDS.2013.45","article-title":"Privacy-preserving multi-keyword ranked search over encrypted cloud data","volume":"25","author":"Cao","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C6","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1109\/TDSC.2016.2593444","article-title":"Searchable encryption over feature-rich data","volume":"15","author":"Wang","year":"2018","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C7","doi-asserted-by":"crossref","first-page":"2320","DOI":"10.1109\/TIFS.2018.2818651","article-title":"Privacy-preserving indexing and query processing for secure dynamic cloud storage","volume":"13","author":"Du","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C8","author":"Wang","year":"2017"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C9","doi-asserted-by":"crossref","first-page":"940","DOI":"10.1109\/TIFS.2017.2774451","article-title":"Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection","volume":"13","author":"Shen","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C10","author":"Boneh","year":"2007"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C11","author":"Agrawal","year":"2004"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C12","author":"Boldyreva","year":"2009"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C13","author":"Popa","year":"2013"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C14","author":"Kerschbaum","year":"2014"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C15","author":"Boneh","year":"2015"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C16","author":"Lewi","year":"2016"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C17","doi-asserted-by":"crossref","first-page":"2305","DOI":"10.1109\/TNET.2015.2457493","article-title":"Fast and scalable range query processing with strong privacy protection for cloud computing","volume":"24","author":"Li","year":"2016","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C18","author":"Demertzis","year":"2016"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C19","article-title":"Blend arithmetic operations on tensor-based fully homomorphic encryption over real numbers","author":"Gai","year":"2017","journal-title":"IEEE Trans. Ind. Inform."},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C20","author":"Naveed","year":"2015"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C21","author":"Furukawa","year":"2013"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C22","author":"Furukawa","year":"2014"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C23","author":"Horst","year":"2017"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C24","author":"Li","year":"2005"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C25","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","article-title":"Space\/time trade-offs in hash coding with allowable errors","volume":"13","author":"Bloom","year":"1970","journal-title":"Commun. ACM"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C26","author":"Goh","year":"2003"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C27","author":"Curtmola","year":"2006"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C28","author":"Lin","year":"2005"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C29","author":"Freedman","year":"2004"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C30","author":"Lewi","year":"2016"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C31","author":"Granlund","year":"2012"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C32","author":"Popa","year":"2011"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C33","author":"Group","year":"2014"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C34","author":"Leskovec","year":"2014"},{"key":"key\n\t\t\t\t2018112402024922100_bxy075C35","author":"Chang","year":"2011"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/12\/1806\/26725096\/bxy075.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T01:33:59Z","timestamp":1571621639000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/12\/1806\/5065094"}},"subtitle":[],"editor":[{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,8,3]]},"references-count":35,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2018,8,3]]},"published-print":{"date-parts":[[2018,12,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy075","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,12]]},"published":{"date-parts":[[2018,8,3]]}}}