{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T02:30:56Z","timestamp":1775788256294,"version":"3.50.1"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2016,5,1]],"date-time":"2016-05-01T00:00:00Z","timestamp":1462060800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472065"],"award-info":[{"award-number":["61472065"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1333127"],"award-info":[{"award-number":["U1333127"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Funds for Chinese Central Universities","award":["ZYGX2015J056"],"award-info":[{"award-number":["ZYGX2015J056"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2014M552336"],"award-info":[{"award-number":["2014M552336"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2015T80972"],"award-info":[{"award-number":["2015T80972"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"State Key Laboratory of Information Security","award":["2015-MS-02"],"award-info":[{"award-number":["2015-MS-02"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2016,5,1]]},"DOI":"10.1109\/tdsc.2015.2406704","type":"journal-article","created":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T14:50:36Z","timestamp":1424789436000},"page":"312-325","source":"Crossref","is-referenced-by-count":227,"title":["Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data"],"prefix":"10.1109","volume":"13","author":[{"given":"Hongwei","family":"Li","sequence":"first","affiliation":[]},{"given":"Yi","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Tom H.","family":"Luan","sequence":"additional","affiliation":[]},{"given":"Xiaohui","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xuemin Sherman","family":"Shen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195657"},{"key":"ref10","article-title":"Enabling efficient multi-keyword ranked search over encrypted cloud data through blind storage","author":"li","year":"2014","journal-title":"IEEE Trans Emerging Topics Comput"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.34"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.282"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.31"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28323-9_4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.007"},{"key":"ref18","author":"stinson","year":"2006","journal-title":"Cryptography Theory and Practice"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036902"},{"key":"ref28","first-page":"506","article-title":"Public key encryption with keyword search","author":"boneh","year":"2004","journal-title":"Adv Cryptology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_14"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2013.2292829"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"ref29","first-page":"2","article-title":"Zpublic key encryption with conjunctive keyword search and its extension to a multi-user system","author":"hwang","year":"0","journal-title":"Proc Pairing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567071"},{"key":"ref8","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"song","year":"0","journal-title":"Proc of IEEE S&P"},{"key":"ref7","year":"0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.302"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.06.029"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2194748"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249517"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1353343.1353380"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45537-X_8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/281250.281256"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"ref25","year":"0"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/7468581\/07047812.pdf?arnumber=7047812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:46:02Z","timestamp":1641987962000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7047812\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,1]]},"references-count":30,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2015.2406704","relation":{},"ISSN":["1545-5971"],"issn-type":[{"value":"1545-5971","type":"print"}],"subject":[],"published":{"date-parts":[[2016,5,1]]}}}