{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:06:04Z","timestamp":1740171964893,"version":"3.37.3"},"reference-count":66,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2020YFB1005500"],"award-info":[{"award-number":["2020YFB1005500"]}]},{"DOI":"10.13039\/501100015401","name":"Key Research and Development Projects of Shaanxi Province","doi-asserted-by":"publisher","award":["2022KXJ-093","2021ZDLGY07-05"],"award-info":[{"award-number":["2022KXJ-093","2021ZDLGY07-05"]}],"id":[{"id":"10.13039\/501100015401","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Basic Research Program of Shaanxi","award":["2019JC-17"],"award-info":[{"award-number":["2019JC-17"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["JB210301"],"award-info":[{"award-number":["JB210301"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2023,7,1]]},"DOI":"10.1109\/tcc.2022.3228906","type":"journal-article","created":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T19:40:44Z","timestamp":1670960444000},"page":"2803-2819","source":"Crossref","is-referenced-by-count":0,"title":["Secure Similar Sequence Query over Multi-source Genomic Data on Cloud"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7948-819X","authenticated-orcid":false,"given":"Ke","family":"Cheng","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8295-6871","authenticated-orcid":false,"given":"Yantian","family":"Hou","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Boise State University, Boise, ID, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0048-5979","authenticated-orcid":false,"given":"Liangmin","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, Jiangsu, China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/3196494.3196535"},{"year":"2017","article-title":"Illumina wants to sequence your whole genome for 100","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1073\/pnas.1216206110"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.ajhg.2015.09.010"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/2508859.2516707"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1038\/nature11412"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.2478\/popets-2021-0036"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1038\/s41525-017-0036-1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1186\/s12920-017-0279-9"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-3-662-48051-9_15"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/s10207-005-0070-3"},{"key":"ref12","first-page":"1","article-title":"Privacy-preserving genetic relatedness test","volume-title":"Proc. 3rd Int. Workshop Genome Privacy Secur.","author":"Emiliano"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1186\/1472-6947-15-S5-S3"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/tdsc.2022.3185313"},{"year":"2016","author":"De Cristofaro","article-title":"Privacy-preserving genetic relatedness test","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICDE.2014.6816690"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.14722\/ndss.2015.23113"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/3321705.3329800"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/INFOCOM.2017.8056952"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/INFOCOM.2017.8057178"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.2478\/popets-2019-0007"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.2478\/popets-2021-0025"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TDSC.2021.3074327"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/TCC.2020.2968893"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/SP.2008.34"},{"year":"2017","author":"Zhu","article-title":"Efficient privacy-preserving general edit distance and beyond","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/2810103.2813725"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1515\/popets-2018-0034"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.2478\/popets-2019-0004"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/CHASE.2017.79"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/ICDE.2015.7113273"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/508171.508174"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/3133956.3134038"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/INFOCOM.2018.8486293"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1007\/978-3-642-38348-9_18"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/TIFS.2016.2622013"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1007\/978-3-662-45472-5_8"},{"key":"ref38","first-page":"179","article-title":"DupLESS: Server-aided encryption for deduplicated storage","volume-title":"Proc. 22nd USENIX Conf. Secur.","author":"Bellare"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1145\/321796.321811"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1007\/s00145-008-9036-8"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1007\/3-540-48910-X_16"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1007\/978-3-642-27954-6_20"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1145\/3133956.3134032"},{"year":"2016","author":"Micali","article-title":"Algorand: The efficient and democratic ledger","key":"ref44"},{"issue":"086","key":"ref45","first-page":"1","article-title":"Intel SGX explained","volume":"2016","author":"Costan","year":"2016","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref46","first-page":"18","article-title":"TrustZone: Integrated hardware and software security","volume":"3","author":"Alves","year":"2004","journal-title":"Inform. Quarterly"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/SP.2017.12"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1007\/978-3-030-02641-7_4"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1145\/1468075.1468121"},{"volume-title":"Introduction to Algorithms","year":"2009","author":"Cormen","key":"ref50"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1007\/978-3-540-30580-4_12"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1017\/cbo9780511721656"},{"year":"2016","author":"Wang","article-title":"EMP-toolkit: Efficient multiparty computation toolkit","key":"ref53"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1093\/molbev\/msx082"},{"key":"ref55","first-page":"35","article-title":"ABY3: A mixed protocol framework for machine learning","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Secur.","author":"Mohassel"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1145\/3433210.3453109"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.1109\/TMI.2019.2935018"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1109\/IJCNN.2017.7965852"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.1007\/s00521-020-05407-3"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1109\/TNSE.2022.3151228"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1109\/ICC.2019.8761693"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1109\/INFOCOM41043.2020.9155279"},{"doi-asserted-by":"publisher","key":"ref63","DOI":"10.1109\/TDSC.2020.3040776"},{"doi-asserted-by":"publisher","key":"ref64","DOI":"10.1109\/TDSC.2020.3022797"},{"doi-asserted-by":"publisher","key":"ref65","DOI":"10.1109\/tdsc.2021.3129512"},{"doi-asserted-by":"publisher","key":"ref66","DOI":"10.1145\/3321705.3329851"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/10241247\/09983485.pdf?arnumber=9983485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:06:15Z","timestamp":1717693575000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9983485\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,1]]},"references-count":66,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2022.3228906","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"type":"electronic","value":"2168-7161"},{"type":"electronic","value":"2372-0018"}],"subject":[],"published":{"date-parts":[[2023,7,1]]}}}