{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T17:53:25Z","timestamp":1757613205619,"version":"3.44.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/iccchina.2019.8855981","type":"proceedings-article","created":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T21:03:16Z","timestamp":1570136596000},"page":"683-688","source":"Crossref","is-referenced-by-count":2,"title":["Shape-Unconstrained Privacy-Preserving Range Query for Fog Computing Supported Vehicular Networks Using Image"],"prefix":"10.1109","author":[{"given":"Haoran","family":"Liang","sequence":"first","affiliation":[{"name":"School of Cyber Security, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Jun","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Cyber Security, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Zhi","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Mathematical and Systems Engineering, Shizuoka University, Hamamatsu, Japan"}]},{"given":"Jianhua","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Security, Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2469605"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190662"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2009.10.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2842470"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847945"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s17071611"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v063.i04"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6128-9"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2808283"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2690522"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2845844"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2824345"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2747158"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2848227"},{"key":"ref7","first-page":"1","article-title":"A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy","author":"lu","year":"2018","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2799000"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700288"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2764095"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2506573"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-015-0926-z"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1007\/s11071-018-4159-4","article-title":"A novel hybrid encryption algorithm based on chaos and S-AES algorithm","volume":"92","author":"\u00e7avu?o?lu","year":"2018","journal-title":"Nonlinear Dynamics"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.08.010"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1109\/TST.2016.7488738","article-title":"Private Proximity Detection for Convex Polygons","volume":"21","author":"mu","year":"2016","journal-title":"Tsinghua Science and Technology"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2811481"}],"event":{"name":"2019 IEEE\/CIC International Conference on Communications in China (ICCC)","start":{"date-parts":[[2019,8,11]]},"location":"Changchun, China","end":{"date-parts":[[2019,8,13]]}},"container-title":["2019 IEEE\/CIC International Conference on Communications in China (ICCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8848288\/8855800\/08855981.pdf?arnumber=8855981","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T18:19:47Z","timestamp":1757009987000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8855981\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iccchina.2019.8855981","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}