{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:21:32Z","timestamp":1729650092793,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/icacci.2018.8554559","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T01:17:32Z","timestamp":1543886252000},"page":"323-329","source":"Crossref","is-referenced-by-count":1,"title":["Attribute based Range Search over Encrypted Data for Privacy Preserving in Cloud Computing"],"prefix":"10.1109","author":[{"given":"Jeswanth","family":"Maseedu","sequence":"first","affiliation":[]},{"given":"Syam Kumar","family":"Pasupuleti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"key":"ref12","article-title":"Privacy-preserving logarithmic-time search on encrypted data in cloud","author":"lu","year":"2012","journal-title":"19th Annual Network and Distributed System Security Symposium NDSS 2012"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590305"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2996429.2996437"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"ref3","article-title":"Attribute based encryption in cloud computing: A survey, gap analysis, and future directions","author":"kumar","year":"0","journal-title":"Journal of Network and Computer Applications"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.113"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1007\/978-3-319-23829-6_26","article-title":"Tree-based multidimensional range search on encrypted data with enhanced privacy","author":"wang","year":"2015","journal-title":"International Conference on Security and Privacy in Communication Networks"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1109\/TIFS.2015.2506145","volume":"11","author":"wang","year":"2016","journal-title":"Geometric range search on encrypted spatial data IEEE Transactions on Information Forensics and Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1497-6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2520932"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref9","first-page":"1","article-title":"Search ranges efficiently and compatibly as keywords over encrypted data","author":"wang","year":"2016","journal-title":"IEEE Transactions on Dependable and Secure Computing"}],"event":{"name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2018,9,19]]},"location":"Bangalore","end":{"date-parts":[[2018,9,22]]}},"container-title":["2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536361\/8554361\/08554559.pdf?arnumber=8554559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T23:55:54Z","timestamp":1720828554000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554559\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icacci.2018.8554559","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}