{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:59:52Z","timestamp":1773331192753,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/icde.2014.6816690","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T14:28:25Z","timestamp":1401460105000},"page":"664-675","source":"Crossref","is-referenced-by-count":289,"title":["Secure k-nearest neighbor query over encrypted data in outsourced environments"],"prefix":"10.1109","author":[{"given":"Yousef","family":"Elmehdwi","sequence":"first","affiliation":[]},{"given":"Bharath K.","family":"Samanthula","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.79"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45811-5_37"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-88735-7_10"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"16","article-title":"Heart disease data set","author":"janosi","year":"1988","journal-title":"The UCI KDD Archive"},{"key":"13","article-title":"Secure nearest neighbor revisited","author":"yao","year":"2013","journal-title":"IEEE ICDE"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2484402.2484415"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376631"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.112"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484386"},{"key":"24","article-title":"Twin clouds: An architecture for secure cloud computing (extended abstract)","author":"bugiel","year":"2011","journal-title":"Workshop on Cryptography and Security in Clouds"},{"key":"25","author":"elmehdwi","year":"2013","journal-title":"Secure K-nearest Neighbor Query over Encrypted Data in Outsourced Environments"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.41"},{"key":"2","first-page":"145","article-title":"The nist definition of cloud computing (draft)","volume":"800","author":"mell","year":"2011","journal-title":"NIST Special Publication"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/11805588_7"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767862"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8.50064-4"},{"key":"5","article-title":"Access pattern disclosure on searchable encryption: Ramification, attack and mitigation","author":"islam","year":"2012","journal-title":"NDSS"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455790"},{"key":"9","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/978-3-540-24571-1_10","article-title":"Efficient execution of aggregation queries over encrypted relational databases","author":"hacigu?mu?s?","year":"2004","journal-title":"Database Systems for Advanced Applications"},{"key":"8","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/s00778-011-0245-7","article-title":"Secure multidimensional range queries over outsourced data","volume":"21","author":"hore","year":"2012","journal-title":"The VLDB Journal"}],"event":{"name":"2014 IEEE 30th International Conference on Data Engineering (ICDE)","location":"Chicago, IL, USA","start":{"date-parts":[[2014,3,31]]},"end":{"date-parts":[[2014,4,4]]}},"container-title":["2014 IEEE 30th International Conference on Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6811095\/6816620\/06816690.pdf?arnumber=6816690","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,11]],"date-time":"2019-08-11T00:39:20Z","timestamp":1565483960000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6816690\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icde.2014.6816690","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}