{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T17:17:10Z","timestamp":1770139030644,"version":"3.49.0"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Open Important Project of Guangxi Key Laboratory of Cryptography and Information Security","award":["GCIS201703"],"award-info":[{"award-number":["GCIS201703"]}]},{"name":"Opening Project of Guangdong Province Key Laboratory of Information Security Technology","award":["2017B030314131-12"],"award-info":[{"award-number":["2017B030314131-12"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962013"],"award-info":[{"award-number":["61962013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"European Union\u2019s Horizon 2020 Research and Innovation Programme","award":["779391"],"award-info":[{"award-number":["779391"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/jiot.2019.2936532","type":"journal-article","created":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T19:47:26Z","timestamp":1566503246000},"page":"10177-10190","source":"Crossref","is-referenced-by-count":51,"title":["Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8320-0168","authenticated-orcid":false,"given":"Linzhi","family":"Jiang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2680-4907","authenticated-orcid":false,"given":"Liqun","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0663-2263","authenticated-orcid":false,"given":"Thanassis","family":"Giannetsos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8196-2436","authenticated-orcid":false,"given":"Bo","family":"Luo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0262-7678","authenticated-orcid":false,"given":"Kaitai","family":"Liang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4993-9452","authenticated-orcid":false,"given":"Jinguang","family":"Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9720-4"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_25"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref31","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"rivest","year":"1978","journal-title":"Found Secure Comput"},{"key":"ref30","article-title":"KEM\/DEM: Necessary and sufficient conditions for secure hybrid encryption","author":"herranz","year":"2006"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_17"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.2337\/dc07-1312"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9141-6"},{"key":"ref27","first-page":"5","article-title":"A portable, inexpensive, nonmydriatic fundus camera based on the Raspberry Pi&#x00AE; computer","volume":"2017","author":"shen","year":"2017","journal-title":"Ophthalmology"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_23"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_1"},{"key":"ref22","article-title":"Somewhat practical fully homomorphic encryption","author":"fan","year":"2012"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1527017.1527028"},{"key":"ref24","author":"bray","year":"2015","journal-title":"Raspberry Pi 2 Model B"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1988.28259"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055721"},{"key":"ref25","volume":"3","author":"smart","year":"2003","journal-title":"Cryptography An Introduction"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.40"},{"key":"ref51","author":"coyne","year":"2010","journal-title":"Restructuring Proposal for the Criminal Division of the Circuit Court of Cook County"},{"key":"ref59","first-page":"331","article-title":"Faster secure two-party computation using garbled circuits","volume":"201","author":"huang","year":"2011","journal-title":"Proc Usenix Security Symp"},{"key":"ref58","year":"2014","journal-title":"Diabetic Retinopathy Datasets (Messidor)"},{"key":"ref57","year":"2007","journal-title":"Diabetic Retinopathy Datasets (RetiDB)"},{"key":"ref56","year":"2010","journal-title":"Diabetic retinopathy data"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2296-6"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2013.2278845"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2012.2201717"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1117\/12.853197"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600363CM"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_28"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767291"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SIOT.2015.9"},{"key":"ref13","year":"2018","journal-title":"Cyber Attack on Singapore Health Database Steals Details of 1 5m Including Prime Minister"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2016.2520933"},{"key":"ref15","year":"2001","journal-title":"Advanced Encryption Standard Federal Information Processing Standards Publication 197"},{"key":"ref16","year":"1997","journal-title":"National Bureau of Standards (U S )"},{"key":"ref17","article-title":"A proposal for an ISO standard for public key encryption (version 2.1)","author":"shoup","year":"2001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3761723"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMMST.2016.7905331"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2872437"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2872389"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2792423"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/I2MTC.2013.6555533"},{"key":"ref49","first-page":"327","article-title":"Post-quantum key exchange&#x2014;A new hope","author":"alkim","year":"2016","journal-title":"Proc 25th USENIX Secur Symp (USENIX Secur )"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2623767"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.1999.790410"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.437"},{"key":"ref47","first-page":"169","article-title":"A comparison of SIFT, PCA-SIFT AND SURF","volume":"8","author":"juan","year":"2007","journal-title":"Int J Signal Process"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06734-6_20"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.09.014"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_19"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8931267\/08807192.pdf?arnumber=8807192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:11:07Z","timestamp":1657746667000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8807192\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":60,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2019.2936532","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]}}}