{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:41:42Z","timestamp":1760161302631},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"European Commissions Seventh Framework Program FP7","award":["Grant agreement No. 257843"],"award-info":[{"award-number":["Grant agreement No. 257843"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2015]]},"DOI":"10.1109\/tdsc.2015.2449831","type":"journal-article","created":{"date-parts":[[2015,7,22]],"date-time":"2015-07-22T17:30:30Z","timestamp":1437586230000},"page":"1-1","source":"Crossref","is-referenced-by-count":5,"title":["Efficient and Confidentiality-Preserving Content-Based Publish\/Subscribe with Prefiltering"],"prefix":"10.1109","author":[{"given":"Raphael","family":"Barazzutti","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Felber","sequence":"additional","affiliation":[]},{"given":"Hugues","family":"Mercier","sequence":"additional","affiliation":[]},{"given":"Emanuel","family":"Onica","sequence":"additional","affiliation":[]},{"given":"Etienne","family":"Riviere","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","article-title":"Towards efficient privacy-preserving SQL processing in untrusted clouds","author":"kurpicz","year":"0"},{"key":"ref33","article-title":"Privacy-enhanced searches using encrypted Bloom filters","author":"bellovin","year":"0","journal-title":"Cryptology ePrint Archive"},{"key":"ref32","article-title":"Secure indexes","author":"goh","year":"0","journal-title":"Cryptology ePrint Archive"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/eScience.2012.6404484"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_15"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1385989.1385999"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.031611.00024"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/978-3-642-22263-4_13","article-title":"A constraint satisfaction cryptanalysis of Bloom filters in private record linkage","volume":"6794","author":"kuzu","year":"0","journal-title":"Proc 11th Int Conf Privacy Enhancing Technol"},{"key":"ref10","article-title":"Privacy-preserving filtering and covering in content-based publish subscribe systems","author":"nabeel","year":"0"},{"key":"ref11","first-page":"272","article-title":"Supporting publication and subscription confidentiality in pub\/sub networks","author":"ion","year":"0","journal-title":"Proc 6th Int ICST Conf Security Privacy Commun Netw"},{"key":"ref12","article-title":"An efficient scheme for preserving confidentiality in content-based publish-subscribe systems","author":"li","year":"0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1619258.1619268"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/380749.380767"},{"key":"ref15","first-page":"164","article-title":"The PADRES publish\/subscribe system","author":"jacobsen","year":"0","journal-title":"Handbook of Research on Advanced Distributed Event-Based Systems Publish\/Subscribe and Message Filtering Technologies"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2335484.2335509"},{"key":"ref17","first-page":"129","article-title":"Performance\/appurity tradeoffs for content-based routing supported by Bloom filters","author":"mercier","year":"0","journal-title":"Proc 20th Int Colloquium Structural Inf Commun Complexity"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497458"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046664"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866401"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/00107510500052444"},{"key":"ref6","first-page":"368","article-title":"A privacy-enhancing content-based publish\/subscribe system using scalar product preserving transformations","volume":"6261","author":"choi","year":"0","journal-title":"Proc Int Conf Database Expert Syst Appl"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22348-8_7"},{"key":"ref5","first-page":"1","article-title":"The Cloud: Data protection and privacy-Whose cloud is it anyway?","author":"liston","year":"0","journal-title":"Proc 12th Global Symp Regulators"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359552"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2488222.2488260"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/857076.857078"},{"key":"ref9","article-title":"Privacy-preserving content-based publish\/subscribe networks","author":"shikfa","year":"0","journal-title":"Proc Emerging Challenges for Security Privacy and Trust"},{"key":"ref20","first-page":"1","article-title":"Keying hash functions for message authentication","author":"bellare","year":"0","journal-title":"Proc 16th Annu Int Cryptol Conf Adv Cryptol"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1385989.1385993"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1199073"},{"key":"ref24","author":"andrews","year":"1998","journal-title":"The Theory of Partitions"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30229-2_14"},{"key":"ref25","author":"graham","year":"1994","journal-title":"Concrete Mathematics A Foundation for Computer Science"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/4358699\/07134784.pdf?arnumber=7134784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:34:47Z","timestamp":1633919687000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7134784\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/tdsc.2015.2449831","relation":{},"ISSN":["1545-5971"],"issn-type":[{"value":"1545-5971","type":"print"}],"subject":[],"published":{"date-parts":[[2015]]}}}