{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:02:03Z","timestamp":1754161323218,"version":"3.41.2"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/pst47121.2019.8949049","type":"proceedings-article","created":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T23:06:06Z","timestamp":1578438366000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["Achieving Privacy-Preserving Edit Distance Query in Cloud and Its Application to Genomic Data"],"prefix":"10.1109","author":[{"given":"Jason","family":"Chang","sequence":"first","affiliation":[{"name":"University of New Brunswick,Faculty of Computer Science,Fredericton,NB,Canada,E3B 5A3"}]},{"given":"Rongxing","family":"Lu","sequence":"additional","affiliation":[{"name":"University of New Brunswick,Faculty of Computer Science,Fredericton,NB,Canada,E3B 5A3"}]}],"member":"263","reference":[{"journal-title":"Java Pairing Based Cryptography Library (JPBC)","year":"0","author":"caro","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711449"},{"journal-title":"2010 IEEE International Workshop on Information Forensics and Security ser BMC Med Genomics","year":"2017","author":"aziz","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196535"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-33167-1_29","article-title":"Secure and efficient outsourcing of sequence comparisons","author":"blanton","year":"2012","journal-title":"Computer Security - ESORICS 2012"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268956"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2938503.2938507"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajhg.2015.09.010"},{"journal-title":"State of the Cloud Report","year":"2018","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2007.908465"},{"key":"ref5","first-page":"325","article-title":"Evaluating 2-dnf formulas on ciphertexts","author":"boneh","year":"2005","journal-title":"TCC 2005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/375360.375365"},{"journal-title":"Privacy-preserving search of similar patients in genomic data","year":"2017","author":"asharov","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813725"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-48051-9_15","article-title":"Homomorphic computation of edit distance","author":"cheon","year":"2015","journal-title":"Financial Cryptography and Data Security"},{"journal-title":"Handbook of Applied Cryptography","year":"1997","author":"menezes","key":"ref9"}],"event":{"name":"2019 17th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2019,8,26]]},"location":"Fredericton, NB, Canada","end":{"date-parts":[[2019,8,28]]}},"container-title":["2019 17th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8937293\/8949011\/08949049.pdf?arnumber=8949049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T19:38:23Z","timestamp":1753731503000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8949049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/pst47121.2019.8949049","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}