{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:50:43Z","timestamp":1729648243498,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/cloudcom.2012.6427591","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T17:05:06Z","timestamp":1360343106000},"page":"895-899","source":"Crossref","is-referenced-by-count":3,"title":["Character-based search with data confidentiality in the clouds"],"prefix":"10.1109","author":[{"given":"Varun","family":"Maheshwari","sequence":"first","affiliation":[]},{"given":"Arash","family":"Nourian","sequence":"additional","affiliation":[]},{"given":"Muthucumaru","family":"Maheswaran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","first-page":"49","article-title":"Survey of visual cryptography schemes","volume":"4","author":"revenkar","year":"2010","journal-title":"IJSIA '10"},{"journal-title":"ImageMagick 6 7 1-1","year":"2011","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989346"},{"key":"12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BFb0053419","article-title":"Visual cryptography","volume":"950","author":"naor","year":"1994","journal-title":"Advances in Cryptology-Eurocrypt'94 LNCS"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"2","first-page":"205","article-title":"Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions","volume":"3621","author":"abdalla","year":"2005","journal-title":"CRYPTO '05 LNCS"},{"journal-title":"Above the Clouds A Berkeley View of Cloud Computing","year":"2009","author":"armbrust","key":"1"},{"key":"10","first-page":"120","article-title":"Fast normalized cross-correlation","volume":"10","author":"lewis","year":"1995","journal-title":"Vision Interface"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"5","first-page":"383","article-title":"Authorized private keyword search over encrypted data in cloud computing","volume":"11","author":"ming","year":"2011","journal-title":"ICDCS"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2011.114"},{"key":"8","first-page":"294","article-title":"CAPTCHA: Using hard AI problems for security","author":"ahn","year":"2003","journal-title":"Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT ' 03)"}],"event":{"name":"2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)","start":{"date-parts":[[2012,12,3]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2012,12,6]]}},"container-title":["4th IEEE International Conference on Cloud Computing Technology and Science Proceedings"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6415464\/6427477\/06427591.pdf?arnumber=6427591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T03:13:37Z","timestamp":1498014817000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6427591\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/cloudcom.2012.6427591","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}