{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T04:52:41Z","timestamp":1748321561687,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/cwit.2015.7255155","type":"proceedings-article","created":{"date-parts":[[2015,9,14]],"date-time":"2015-09-14T17:20:09Z","timestamp":1442251209000},"page":"71-74","source":"Crossref","is-referenced-by-count":4,"title":["Database query privacy using homomorphic encryptions"],"prefix":"10.1109","author":[{"given":"Sudharaka","family":"Palamakumbura","sequence":"first","affiliation":[]},{"given":"Hamid","family":"Usefi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Location based services","year":"2013","author":"zickuhr","key":"ref4"},{"journal-title":"Physics of the Future","year":"2012","author":"kaku","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref11","article-title":"Private computation on encrypted genomic data","author":"lauter","year":"2014","journal-title":"Tech Rep MSR-TR-2014&#x2013;93"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/978-3-642-13190-5_2","article-title":"Fully homomorphic encryption over the integers","volume":"6110","author":"van dijk","year":"2010","journal-title":"Advances in Cryptology-EUROCRYPT 2010"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123132"},{"key":"ref8","first-page":"75","article-title":"Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based","volume":"8042","author":"gentry","year":"2013","journal-title":"Advances in Cryptology"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref2","first-page":"505","article-title":"Fully homomorphic encryption from ring-lwe and security for key dependent messages","volume":"6841","author":"braserski","year":"2011","journal-title":"Advances in Cryptology-CRYPTO?98"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/978-3-642-40041-4_5","article-title":"Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based","author":"gentry","year":"2013","journal-title":"Advances in Cryptology - CRYPTO 2013"},{"key":"ref1","article-title":"A secure database system using homomorphic encryption schemes","author":"gahi","year":"2011","journal-title":"International Conference on Advances in Databases Knowledge and Data Applications"}],"event":{"name":"2015 IEEE 14th Canadian Workshop on Information Theory (CWIT)","start":{"date-parts":[[2015,7,6]]},"location":"St. John's, NL, Canada","end":{"date-parts":[[2015,7,9]]}},"container-title":["2015 IEEE 14th Canadian Workshop on Information Theory (CWIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7237119\/7255133\/07255155.pdf?arnumber=7255155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T15:31:20Z","timestamp":1498231880000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7255155\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/cwit.2015.7255155","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}