{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:42:10Z","timestamp":1730223730978,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,4]]},"DOI":"10.1109\/globecom48099.2022.10000994","type":"proceedings-article","created":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T17:24:18Z","timestamp":1673457858000},"page":"2248-2253","source":"Crossref","is-referenced-by-count":1,"title":["A Privacy-preserving Data Transmission Protocol with Constant Interactions in E-health"],"prefix":"10.1109","author":[{"given":"Huijie","family":"Yang","sequence":"first","affiliation":[{"name":"School of Computer Science Nanjing Univer. of Infor. Scien. and Tech.,Nanjing,China"}]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Computer Science Nanjing Univer. of Infor. Scien. and Tech.,Nanjing,China"}]},{"given":"Mahammad","family":"Obaidat","sequence":"additional","affiliation":[{"name":"University of Texas-Permian Basin,Department of Computer Science,Odessa,USA"}]},{"given":"Pandi","family":"Vijayakumar","sequence":"additional","affiliation":[{"name":"Univer. College of Engine. Tindivanam,Depart. of Computer Scien. and Engineer.,Tindivanam,India"}]},{"given":"Kuei-Fang","family":"Hsiao","sequence":"additional","affiliation":[{"name":"University of Texas-Permian Basin,Department of Computer Science,Odessa,USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45724-2_26"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-016-9236-6"},{"key":"ref15","first-page":"281","article-title":"Batching base oblivious trans-fers","author":"mcquoid","year":"0","journal-title":"International Conference on the Theory and Application of Cryptology and Information Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5781354"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335755"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382279"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_26"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.3.2.e20"},{"key":"ref17","first-page":"397","article-title":"Efficient k-out-of-n oblivious transfer schemes","volume":"14","author":"chu","year":"2008","journal-title":"J Univers Comput Sci"},{"key":"ref16","first-page":"448","article-title":"Efficient oblivious transfer protocols","author":"naor","year":"2001","journal-title":"Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms"},{"key":"ref19","article-title":"Linkable privacy-preserving scheme for location-based services","author":"yadav","year":"2021","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_34"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3408322"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1109\/TIFS.2014.2309858","article-title":"Cp-abe with constant-size keys for lightweight devices","volume":"9","author":"guo","year":"2014","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44750-4_8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2725953"},{"key":"ref6","first-page":"54","article-title":"Improved ot extension for transfer-ring short secrets","author":"kolesnikov","year":"0","journal-title":"Annual Cryptology Conference"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0102-6"}],"event":{"name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","start":{"date-parts":[[2022,12,4]]},"location":"Rio de Janeiro, Brazil","end":{"date-parts":[[2022,12,8]]}},"container-title":["GLOBECOM 2022 - 2022 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10000063\/10000593\/10000994.pdf?arnumber=10000994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T14:20:08Z","timestamp":1675779608000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10000994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,4]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/globecom48099.2022.10000994","relation":{},"subject":[],"published":{"date-parts":[[2022,12,4]]}}}