{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T22:21:15Z","timestamp":1777674075604,"version":"3.51.4"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/infocomwkshps50562.2020.9162859","type":"proceedings-article","created":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T17:55:09Z","timestamp":1597082109000},"page":"746-753","source":"Crossref","is-referenced-by-count":25,"title":["Building an Authentic and Ethical Keyword Search by applying Decentralised (Blockchain) Verification"],"prefix":"10.1109","author":[{"given":"M.","family":"Poongodi","sequence":"first","affiliation":[]},{"given":"Mounir","family":"Hamdi","sequence":"additional","affiliation":[]},{"given":"Vijayakumar","family":"Varadarajan","sequence":"additional","affiliation":[]},{"given":"Bharat S.","family":"Rawal","sequence":"additional","affiliation":[]},{"given":"Ma","family":"Maode","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2010.5757657"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866321"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_21"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2781227"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2008.152"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2015.157"},{"key":"ref16","year":"0","journal-title":"What is Network Traffic? - Definition from Techopedia (n d )"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.01.025"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NCIS.2011.27"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2015.86"},{"key":"ref4","year":"0","journal-title":"What is Cryptographic Hashing? MD 5 SHA and More Tiptop Security (n d )"},{"key":"ref3","year":"2016","journal-title":"Difference between DES and AES (with Comparison Chart)"},{"key":"ref6","year":"2016","journal-title":"Centralized vs Decentralized Internet Network"},{"key":"ref5","year":"2017","journal-title":"Difference Between Client-Server and Peer-to-Peer network"},{"key":"ref8","year":"0","journal-title":"Amazon Web Services Documentation (n d )"},{"key":"ref7","year":"2014","journal-title":"How to Search on Encrypted Data Functional Encryption"},{"key":"ref2","year":"2018","journal-title":"The TF*IDF Algorithm Explained"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICNGCIS.2017.9"},{"key":"ref1","year":"2018","journal-title":"Decentralized Application"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906985"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/HOTICN.2018.8605993"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2013.155"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICICI.2017.8365200"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.43"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2010.66"}],"event":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","location":"Toronto, ON, Canada","start":{"date-parts":[[2020,7,6]]},"end":{"date-parts":[[2020,7,9]]}},"container-title":["IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9146478\/9162584\/09162859.pdf?arnumber=9162859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:58:09Z","timestamp":1656439089000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9162859\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/infocomwkshps50562.2020.9162859","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}