{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:49:26Z","timestamp":1729673366565,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/glocom.2014.7417807","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T15:11:24Z","timestamp":1459177884000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Publicly Verifiable Boolean Query over Outsourced Encrypted Data"],"prefix":"10.1109","author":[{"given":"Shunrong","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Xiaoyan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Linke","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Jianqing","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142488"},{"key":"ref11","first-page":"147","article-title":"Proof-infused streams: Enabling authentication of sliding window queries on streams","author":"li","year":"0"},{"key":"ref12","first-page":"135","article-title":"Cads: Continuous authentication on data streams","author":"papadopoulos","year":"0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1567274.1567277"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455826"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.47"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_20"},{"year":"0","key":"ref6"},{"key":"ref5","first-page":"832","article-title":"Practical dynamic searchable encryption with small leakage","volume":"2013","author":"stefanov","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544852"},{"year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"802","DOI":"10.14778\/1687627.1687718","article-title":"Scalable verification for out-sourced dynamic databases","volume":"2","author":"pang","year":"2009","journal-title":"Proceedings of the VLDB Endowment"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516730"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660373"},{"year":"0","key":"ref22","article-title":"The flint library"},{"year":"0","key":"ref21","article-title":"The delxvi library"},{"key":"ref24","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"song","year":"0"},{"year":"0","key":"ref23","article-title":"The crypto++ library"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_21"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1007\/978-3-642-17373-8_33","article-title":"Structured encryption and controlled disclosure","author":"chase","year":"2010","journal-title":"Advances in Cryptology-ASIACRYPT 2010"}],"event":{"name":"GLOBECOM 2015 - 2015 IEEE Global Communications Conference","start":{"date-parts":[[2015,12,6]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2015,12,10]]}},"container-title":["2015 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T11:39:28Z","timestamp":1602675568000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7417807"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/glocom.2014.7417807","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}