{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T09:40:44Z","timestamp":1775295644147,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1109\/bigcomp.2016.7425806","type":"proceedings-article","created":{"date-parts":[[2016,3,7]],"date-time":"2016-03-07T16:21:03Z","timestamp":1457367663000},"page":"93-100","source":"Crossref","is-referenced-by-count":8,"title":["A kNN query processing algorithm using a tree index structure on the encrypted database"],"prefix":"10.1109","author":[{"family":"Hyeong-Il Kim","sequence":"first","affiliation":[]},{"family":"Hyeong-Jin Kim","sequence":"additional","affiliation":[]},{"family":"Jae-Woo Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"664","author":"elmehdwi","year":"2014","journal-title":"Secure k-nearest neighbor query over encrypted data in outsourced environments in ICDE"},{"key":"ref11","first-page":"363","volume":"19","author":"yiu","year":"2010","journal-title":"Enabling search services on outsourced private spatial data VLDB Journal"},{"key":"ref12","author":"miller","year":"2009","journal-title":"Advanced encryption standard Proceedings of the Advanced Encryption Standard"},{"key":"ref13","first-page":"471","author":"domingo-ferrer","year":"2002","journal-title":"A provably secure additive and multiplicative privacy homomorphism in ISC"},{"key":"ref14","first-page":"77","author":"kim","year":"2014","journal-title":"Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data in Big Data and Smart Computing"},{"key":"ref15","first-page":"223","author":"paillier","year":"1999","journal-title":"Public-key cryptosystems based on composite degree residuosity classes"},{"key":"ref16","author":"carmit","year":"2010","journal-title":"Efficient Secure Two-Party Protocols Techniques and Constructions"},{"key":"ref17","first-page":"66","author":"liu","year":"2015","journal-title":"Efficient Secure Similarity Computation on Encrypted Trajectory Data in ICDE"},{"key":"ref18","first-page":"32","author":"bugiel","year":"2011","journal-title":"Twin clouds Secure cloud computing with low latency in CMS"},{"key":"ref19","first-page":"541","author":"samanthula","year":"2013","journal-title":"An efficient and probabilistic secure bit-decomposition in ASIACCS"},{"key":"ref4","first-page":"125","author":"hacigumus","year":"2004","journal-title":"Efficient execution of aggregation queries over encrypted relational databases in Database Systems for Advanced Applications"},{"key":"ref3","first-page":"333","volume":"21","author":"hore","year":"2012","journal-title":"Secure multidimensional range queries over outsourced data VLDB Journal"},{"key":"ref6","first-page":"601","author":"hu","year":"2011","journal-title":"Processing private queries over untrusted data cloud through privacy homomorphism in ICDE"},{"key":"ref5","first-page":"89","author":"mykletun","year":"2006","journal-title":"Aggregation queries in the database-as-aservice model in Data and Applications Security"},{"key":"ref8","first-page":"55","author":"zhu","year":"2013","journal-title":"Secure k-nn computation on encrypted cloud data without sharing key with query users in Security in cloud computing"},{"key":"ref7","first-page":"139","author":"wong","year":"2009","journal-title":"Secure knn computation on encrypted databases in SIGMOD"},{"key":"ref2","first-page":"350","author":"shi","year":"2007","journal-title":"Multidimensional range query over encrypted data in Symposium on Security and Privacy"},{"key":"ref1","first-page":"1","article-title":"Managing and accessing data in the cloud: Privacy risks and approaches","author":"de","year":"2012","journal-title":"CRiSIS"},{"key":"ref9","first-page":"733","author":"yao","year":"2013","journal-title":"Secure nearest neighbor revisited in ICDE"}],"event":{"name":"2016 International Conference on Big Data and Smart Computing (BigComp)","location":"Hong Kong, China","start":{"date-parts":[[2016,1,18]]},"end":{"date-parts":[[2016,1,20]]}},"container-title":["2016 International Conference on Big Data and Smart Computing (BigComp)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7422342\/7425793\/7425806.pdf?arnumber=7425806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,28]],"date-time":"2016-09-28T14:27:26Z","timestamp":1475072846000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7425806\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/bigcomp.2016.7425806","relation":{},"subject":[],"published":{"date-parts":[[2016,1]]}}}