{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:29:32Z","timestamp":1774448972641,"version":"3.50.1"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672010"],"award-info":[{"award-number":["61672010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Research Project of State Key Laboratory of Cryptology of China"},{"DOI":"10.13039\/501100004607","name":"Key Projects of Guangxi Natural Science Foundation","doi-asserted-by":"publisher","award":["2019JJD170020"],"award-info":[{"award-number":["2019JJD170020"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Fund Program for State Key Laboratory of Information Security of China","award":["2020-MS-05"],"award-info":[{"award-number":["2020-MS-05"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1109\/jiot.2020.3007518","type":"journal-article","created":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T20:26:26Z","timestamp":1594153586000},"page":"10660-10672","source":"Crossref","is-referenced-by-count":126,"title":["PPO-CPQ: A Privacy-Preserving Optimization of Clinical Pathway Query for E-Healthcare Systems"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8551-8826","authenticated-orcid":false,"given":"Mingwu","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1636-0292","authenticated-orcid":false,"given":"Yu","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1562-5105","authenticated-orcid":false,"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","volume-title":"The Case for eHealth, the First High-Level Conference on eHealth","author":"Silber","year":"2003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7389829"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.016"},{"key":"ref4","article-title":"SE-PPFM: A searchable encryption scheme supporting privacy-preserving fuzzy multi-keyword in cloud systems","author":"Zhang","year":"2018","journal-title":"IEEE Syst. J."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.01.007"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0222892"},{"key":"ref7","volume-title":"Clinical Pathways: Knowledge Management and Healthcare","year":"2013"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/14651858.CD006632.pub2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2015.14"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1373\/clinchem.2006.077180"},{"key":"ref11","first-page":"658","article-title":"Graph algorithms","volume-title":"Introduction to Algorithms","author":"Cormen","year":"2009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700882"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0672-4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2721444"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2965065"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2421946"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2738018"},{"key":"ref18","first-page":"1980","article-title":"On learning and visualizing practice-based clinical pathways for chronic kidney disease","volume-title":"Proc. AMIA Ann. Symp.","author":"Zhang"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2016.2640303"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942190"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2991928"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.11.108"},{"issue":"1","key":"ref23","first-page":"116","article-title":"Clinical pathway variance prediction using artificial neural network for acute decompensated heart failure clinical pathway","volume":"14","author":"Abu Yazid","year":"2018","journal-title":"Malaysian J. Fundamental Appl. Sci."},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2013.827"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2018.00075"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_13"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2811807"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2880981"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2774451"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"ref31","first-page":"101","article-title":"Simplied VSS and fast-track multiparty computations with applications to threshold cryptography","volume-title":"Proc. ACM PODC","author":"Gennaro"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2015.72"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2679189"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1504\/IJACT.2020.107160"},{"key":"ref36","year":"2018","journal-title":"World Health Organization"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-03521-2"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2253474"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2802199"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2847662"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/7.869506"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9219268\/09134428.pdf?arnumber=9134428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T01:27:19Z","timestamp":1706059639000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9134428\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":41,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2020.3007518","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10]]}}}