{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T09:28:04Z","timestamp":1746005284622,"version":"3.37.3"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1109\/icc45855.2022.9838957","type":"proceedings-article","created":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T19:37:11Z","timestamp":1660246631000},"page":"2792-2797","source":"Crossref","is-referenced-by-count":2,"title":["SEMMI: Multi-party Security Decision-making Scheme Under the Internet of Medical Things"],"prefix":"10.1109","author":[{"given":"Cheng","family":"Li","sequence":"first","affiliation":[{"name":"Xidian University,School of Computer Science and Technology,Xi&#x2019;an,China"}]},{"given":"Li","family":"Yang","sequence":"additional","affiliation":[{"name":"Xidian University,School of Computer Science and Technology,Xi&#x2019;an,China"}]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Technology Sydney,School of Software,Sydney,Australia"}]},{"given":"Wenjing","family":"Qin","sequence":"additional","affiliation":[{"name":"Xidian University,School of Computer Science and Technology,Xi&#x2019;an,China"}]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[{"name":"Xidian University,School of Cyber Engineering,Xi&#x2019;an,China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2987958"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2992349"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2984579"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0035"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E99.A.73"},{"journal-title":"GSW implementation","year":"2021","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref3","first-page":"3155","article-title":"What the gdpr means for businesses","volume":"2017","author":"tankard","year":"2017","journal-title":"Network Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2932444"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-018-0539-4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3004231"},{"key":"ref2","first-page":"3152676","article-title":"The eu general data protection regulation (gdpr)","volume":"10","author":"voigtaxel","year":"2017","journal-title":"A Practical Guide"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.017"},{"key":"ref9","first-page":"1261","article-title":"K-nearest neighbor classification over semantically secure encrypted relational data","volume":"27","author":"elmehdwi","year":"2014","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"journal-title":"UCI Machine Learning Repository","year":"2021","key":"ref20"},{"journal-title":"Find Open Datasets and Machine Learning Projects","year":"2021","key":"ref21"}],"event":{"name":"ICC 2022 - IEEE International Conference on Communications","start":{"date-parts":[[2022,5,16]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2022,5,20]]}},"container-title":["ICC 2022 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9837954\/9838246\/09838957.pdf?arnumber=9838957","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T20:02:45Z","timestamp":1663012965000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9838957\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icc45855.2022.9838957","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]}}}