{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:47:59Z","timestamp":1759092479813,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/icde.2014.6816687","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:28:25Z","timestamp":1401474505000},"page":"628-639","source":"Crossref","is-referenced-by-count":16,"title":["Private search on key-value stores with hierarchical indexes"],"prefix":"10.1109","author":[{"given":"Haibo","family":"Hu","sequence":"first","affiliation":[]},{"given":"Jianliang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xizhong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Kexin","family":"Pei","sequence":"additional","affiliation":[]},{"given":"Byron","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Shuigeng","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"journal-title":"Introduction to Modern Cryptography","year":"2008","author":"katz","key":"35"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1007\/s00778-011-0245-7","article-title":"Secure multidimensional range queries over outsourced data","volume":"21","author":"hore","year":"2012","journal-title":"The VLDB Journal"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"18","article-title":"An attacker's view of distance preserving maps for privacy preserving data mining","author":"liu","year":"2006","journal-title":"PKDD"},{"key":"33","article-title":"Efficient and private access to outsourced data","author":"vimercati","year":"2011","journal-title":"Proc ICDCS"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376631"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13651-1_15"},{"key":"16","article-title":"Strong conditional oblivious transfer and computing on intervals","author":"blake","year":"2004","journal-title":"Proceedings of Asiacrypt"},{"journal-title":"Postal Addresse in North East Metropolitan Areas (New York Philadelphia and Boston)","year":"0","key":"39"},{"key":"13","article-title":"Secure nearest neighbor revisited","author":"yao","year":"2013","journal-title":"Proceedings of ICDE"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.79"},{"key":"37","article-title":"Conditional oblivious transfer and timed-release encryption","author":"crescenzo","year":"1999","journal-title":"Proc EUROCRYPT"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"},{"key":"38","article-title":"An improved algorithm for computing logarithms over gf(p) and its cryptographic significance","volume":"24","author":"pohlig","year":"1978","journal-title":"Transactions on Information and System Security"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.23"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"40","article-title":"Accelerating the greater than-strong conditional oblivious transfer multiparty protocol using graphics processing units","author":"rivera","year":"2012","journal-title":"GPU Technology Conference"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775142"},{"key":"23","article-title":"Building decision tree classifier on private data","author":"du","year":"2002","journal-title":"Proceedings of the IEEE International Conference on Privacy Security and Data Mining"},{"key":"24","article-title":"Privacy-preserving cooperative statistical analysis","author":"du","year":"2001","journal-title":"Proceedings of the 17th Annual Computer Security Applications Conference"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.167"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.112"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497553"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081942"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213871"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242623"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.185"},{"journal-title":"Amazon Simpledb (Beta)","year":"0","key":"1"},{"key":"30","doi-asserted-by":"crossref","first-page":"49","DOI":"10.14778\/2732219.2732224","article-title":"Authenticating top-k queries in location-based services with confidentiality","volume":"7","author":"chen","year":"2014","journal-title":"Proc of the VLDB Endowment"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.65"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_30"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.26"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767862"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1620585.1620591"},{"key":"9","article-title":"Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy","author":"khoshgozaran","year":"2007","journal-title":"Proc SSTD"},{"key":"8","article-title":"Efficient secure query evaluation over encrypted xml databases","author":"wang","year":"2006","journal-title":"Proc VLDB"}],"event":{"name":"2014 IEEE 30th International Conference on Data Engineering (ICDE)","start":{"date-parts":[[2014,3,31]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2014,4,4]]}},"container-title":["2014 IEEE 30th International Conference on Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6811095\/6816620\/06816687.pdf?arnumber=6816687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T14:07:07Z","timestamp":1498140427000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6816687\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/icde.2014.6816687","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}