{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T09:08:27Z","timestamp":1725786507677},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,6]]},"DOI":"10.1109\/icccnt56998.2023.10308309","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T18:54:40Z","timestamp":1700765680000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["A Keyword Based Searching and Sharing Scheme on the Encrypted Cloud Data"],"prefix":"10.1109","author":[{"given":"Mazharul","family":"Islam","sequence":"first","affiliation":[{"name":"North South University,Electrical and Computer Engineering,Dhaka"}]},{"given":"Rajesh","family":"Palit","sequence":"additional","affiliation":[{"name":"North South University,Electrical and Computer Engineering,Dhaka"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.12.035"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102569"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-03889-8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CSDE48274.2019.9162368"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2892116"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2011-0426"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218594"},{"key":"ref9","article-title":"Secure indexes","author":"Goh","year":"2003","journal-title":"Cryptology ePrint Archive"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_22"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"}],"event":{"name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2023,7,6]]},"location":"Delhi, India","end":{"date-parts":[[2023,7,8]]}},"container-title":["2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10306338\/10306339\/10308309.pdf?arnumber=10308309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T12:32:09Z","timestamp":1710419529000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10308309\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,6]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icccnt56998.2023.10308309","relation":{},"subject":[],"published":{"date-parts":[[2023,7,6]]}}}