{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:18:16Z","timestamp":1740169096082,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2904724","type":"journal-article","created":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T19:05:55Z","timestamp":1552503955000},"page":"41296-41308","source":"Crossref","is-referenced-by-count":2,"title":["Security-Aware Department Matching and Doctor Searching for Online Appointment Registration System"],"prefix":"10.1109","volume":"7","author":[{"given":"Luona","family":"Yin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5286-188X","authenticated-orcid":false,"given":"Aiqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xinrong","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Xiaojuan","family":"Xie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1007\/s10916-018-0995-5"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/TIFS.2015.2414399"},{"key":"ref31","article-title":"Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack","volume":"60","author":"qiu","year":"2016","journal-title":"Sci China Inf Sci"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TPDS.2014.2355202"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1186\/s12913-015-0726-2"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TSP.2014.2332438"},{"key":"ref12","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"song","year":"2002","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref13","first-page":"506","article-title":"Public key encryption with keyword search","volume":"3027","author":"boneh","year":"2004","journal-title":"Adv Cryptology"},{"year":"0","author":"baek","article-title":"Public key encryption with keyword search revisited","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1016\/j.ins.2013.03.008"},{"key":"ref16","first-page":"73","article-title":"Public key encryption with conjunctive field keyword search","author":"park","year":"2004","journal-title":"Information Security Applications"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.jnca.2010.07.007"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.jss.2011.03.075"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TIFS.2015.2509912","article-title":"Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds","volume":"11","author":"yang","year":"2016","journal-title":"IEEE Trans Inf Forensics Security"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/CIT.2014.97"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.5812\/semj.60249"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/MDM.2013.94"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.2196\/jmir.6747"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.5539\/gjhs.v5n5p193"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/INFOCOM.2014.6847976"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.30918\/IRJMMS.52.17.019"},{"year":"0","author":"mu","article-title":"A rule-based disease self-inspection and hospital registration recommendation system","key":"ref8"},{"key":"ref7","first-page":"232","article-title":"Web based long-distance appointment registered system","author":"hang","year":"2012","journal-title":"Proc 3rd Int Conf Comput Commun Technol Agricult Eng"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1186\/1472-6947-14-49"},{"key":"ref9","first-page":"59","article-title":"Dependable online appointment booking system for Nhis outpatient in nigerian teaching hospitals","volume":"6","author":"idowu","year":"2014","journal-title":"Int J Comput Sci Inf Technol"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1186\/1472-6963-11-318"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/s12083-016-0458-z"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ACCESS.2018.2823718"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/s12243-017-0574-7"},{"key":"ref24","first-page":"457","article-title":"Fuzzy identity-based encryption","author":"sahai","year":"2005","journal-title":"Proc Int Technol Conf"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TDSC.2016.2599883"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/SP.2007.11"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/1180405.1180418"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08666707.pdf?arnumber=8666707","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T13:20:02Z","timestamp":1694697602000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8666707\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2904724","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}