{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:25:21Z","timestamp":1729610721002,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/pst.2013.6596039","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T11:54:58Z","timestamp":1379591698000},"page":"77-81","source":"Crossref","is-referenced-by-count":3,"title":["A novel privacy preserving keyword searching for cloud storage"],"prefix":"10.1109","author":[{"given":"Lin","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Zhengping","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Oiaovan","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/11426639_7","article-title":"Efficient identity-based encryption without random oracles","volume":"3494","author":"waters","year":"2005","journal-title":"Advances in Cryptology-EUROCRYPT 2005"},{"key":"18","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","article-title":"Efficient selective-id secure identity-based encryption without random oracles","volume":"3027","author":"boneh","year":"2004","journal-title":"Eurocrypt 2004"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"16","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","article-title":"Identity-based encryption from the weil pairing","volume":"2139","author":"boneh","year":"2001","journal-title":"Advances in Cryptology-Crypto 2001"},{"key":"13","first-page":"213","article-title":"An id-based client authentication with key agreement protocol for mobile client-server environment on ecc with provable security","volume":"13","author":"he","year":"2012","journal-title":"Information Fusion"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2012.12.037"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0011-9"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.04.002"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"2","first-page":"442","article-title":"Privacy preserving keyword searches on remote encrypted data","volume":"3531","author":"chang","year":"2005","journal-title":"ACNS 2005"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.03.010"},{"key":"7","first-page":"73","article-title":"Public key encryption with conjunctive field keyword search","volume":"3325","author":"park","year":"2004","journal-title":"Fifth International Workshop WISA'04"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"5","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/11535218_13","article-title":"Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions","volume":"3621","author":"abdalla","year":"2005","journal-title":"CRYPTO 2005"},{"key":"4","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","article-title":"Public key encryption with keyword search","volume":"3027","author":"boneh","year":"2004","journal-title":"Eurocrypt 2004"},{"key":"9","first-page":"372","article-title":"Efficient public key encryption with keyword search schemes from pairings","volume":"4990","author":"gu","year":"2008","journal-title":"Inscrypt 2007"},{"key":"8","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/978-3-540-73489-5_2","article-title":"Public key encryption with conjunctive keyword search and its extension to a multi-user system","volume":"4575","author":"hwang","year":"2007","journal-title":"Pairing 2007"}],"event":{"name":"2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2013,7,10]]},"location":"Tarragona, Spain","end":{"date-parts":[[2013,7,12]]}},"container-title":["2013 Eleventh Annual Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589044\/6596025\/06596039.pdf?arnumber=6596039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T18:11:22Z","timestamp":1498068682000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6596039\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/pst.2013.6596039","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}