{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:59:31Z","timestamp":1772906371215,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icc.2018.8422279","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T22:51:41Z","timestamp":1534805501000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["EFRS:Enabling Efficient and Fine-Grained Range Search on Encrypted Spatial Data"],"prefix":"10.1109","author":[{"given":"Guowen","family":"Xu","sequence":"first","affiliation":[]},{"given":"Hongwei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuanshun","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.124"},{"key":"ref11","article-title":"Achieving efficient and privacy-preserving truth discovery in crowd sensing systems","author":"xu","year":"2016","journal-title":"Computers & Security"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jpdc.2015.11.004","article-title":"Secure and controllable k-nn query over encrypted cloud data with key confidentiality","volume":"89","author":"zhu","year":"2016","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2675864"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813629"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978376"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.44"},{"key":"ref17","article-title":"On the soundness and security of privacy-preserving svm for outsourcing data classification","author":"li","year":"2017","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref18","article-title":"Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking","author":"sun","year":"2013","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2684802"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.99"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2499791"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7224730"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2371239"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2371239"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506145"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524389"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2406704"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"ref22","author":"vamos","year":"2012","journal-title":"Polynomial Fitting"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"}],"event":{"name":"2018 IEEE International Conference on Communications (ICC 2018)","location":"Kansas City, MO","start":{"date-parts":[[2018,5,20]]},"end":{"date-parts":[[2018,5,24]]}},"container-title":["2018 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8411665\/8422068\/08422279.pdf?arnumber=8422279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T03:26:07Z","timestamp":1598239567000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8422279\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icc.2018.8422279","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}