{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T05:11:05Z","timestamp":1760591465355,"version":"build-2065373602"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,8]]},"DOI":"10.1109\/cns66487.2025.11195061","type":"proceedings-article","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:34:49Z","timestamp":1760549689000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["MulShare: A Multi-Receiver Encrypted Search Scheme to Secure Cloud-Assisted EMRs Sharing"],"prefix":"10.1109","author":[{"given":"Shiyuan","family":"Xu","sequence":"first","affiliation":[{"name":"The University of Hong Kong,Department of Computer Science,Pokfulam,Hong Kong"}]},{"given":"Xue","family":"Chen","sequence":"additional","affiliation":[{"name":"The University of Hong Kong,Department of Computer Science,Pokfulam,Hong Kong"}]},{"given":"Yan","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Beijing Normal University,Beijing,China"}]},{"given":"Shang","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Accounting and Finance, Hong Kong Polytechnic University,Department of Computing,Hong Kong"}]},{"given":"Jing","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Beijing Normal University,Beijing,China"}]},{"given":"Siu-Ming","family":"Yiu","sequence":"additional","affiliation":[{"name":"The University of Hong Kong,Department of Computer Science,Pokfulam,Hong Kong"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2023.3316922"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3653297"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162311"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC51071.2022.9771830"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2022.3224644"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109595"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3552199"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/cns62487.2024.10735601"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3455772"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2989392"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2025.3540649"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3056116"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103783"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2025.3550261"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3275750"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3368819"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2023.3257223"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-023-3128-3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838582"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.23288"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2024.3520007"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3114719"},{"key":"ref23","first-page":"2581","article-title":"{MUSES}: Efficient {Multi-User} searchable encrypted database","author":"Le","journal-title":"USENIX Security, 2024"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3550054"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3627673.3679522"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-0942-7_14"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3446920"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2025.121975"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2023.3249189"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90567-5_10"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2024.3495049"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3406325.3451007"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30617-4_16"},{"issue":"1","key":"ref34","first-page":"92","article-title":"Aesm 2 attribute-based encrypted search for multi-owner and multi-user dis-tributed systems","volume":"34","author":"Wang","year":"2022","journal-title":"IEEE TPDS"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2019.2935044"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-29371-9_8"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3292129"}],"event":{"name":"2025 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2025,9,8]]},"location":"Avignon, France","end":{"date-parts":[[2025,9,11]]}},"container-title":["2025 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11194903\/11194169\/11195061.pdf?arnumber=11195061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T04:50:58Z","timestamp":1760590258000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11195061\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/cns66487.2025.11195061","relation":{},"subject":[],"published":{"date-parts":[[2025,9,8]]}}}