{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T21:01:55Z","timestamp":1763154115987,"version":"3.45.0"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tdsc.2025.3580140","type":"journal-article","created":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T15:03:03Z","timestamp":1750086183000},"page":"6058-6073","source":"Crossref","is-referenced-by-count":0,"title":["Enabling Efficient and Privacy-Preserving Sequence Similarity Query on Encrypted Genomes"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4730-3731","authenticated-orcid":false,"given":"Chen","family":"Gong","sequence":"first","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6420-8308","authenticated-orcid":false,"given":"Xiangyu","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3365-6757","authenticated-orcid":false,"given":"Dan","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyber Security, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3769-7211","authenticated-orcid":false,"given":"Cheng","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9476-6386","authenticated-orcid":false,"given":"Zhuoran","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4251-1143","authenticated-orcid":false,"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1038\/nature24286"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1038\/ng.3810"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TCC.2017.2682860"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TCC.2021.3131287"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TCC.2020.2968893"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/INFOCOM.2017.8057178"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1653662.1653703"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1038\/nrg.2017.113"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TDSC.2021.3074327"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/2810103.2813725"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/3196494.3196535"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/3321705.3329800"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.30953\/bhty.v1.10"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TNSM.2018.2799000"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TIFS.2018.2868162"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.26599\/TST.2023.9010158"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/JBHI.2018.2881086"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/978-3-642-33167-1_29"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/SPW.2015.11"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1515\/popets-2015-0014"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/CHASE.2017.79"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/s10207-005-0070-3"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TDSC.2023.3266292"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/TCC.2022.3205700"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TSC.2023.3259642"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/362003.362025"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/2046707.2046785"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1016\/0022-0000(80)90002-1"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TIFS.2018.2838540"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.14722\/ndss.2023.24423"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/3490237"},{"key":"ref32","first-page":"143","article-title":"A highly accurate query-recovery attack against searchable encryption using non-indexed documents","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Damie"},{"key":"ref33","first-page":"2599","article-title":"Query recovery from easy to hard: Jigsaw attack against SSE","volume-title":"Proc. 33 rd USENIX Secur. Symp.","author":"Nie"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/TIFS.2025.3530692"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1093\/nar\/gkz836"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/INFCOM.2010.5462196"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/INFCOM.2012.6195784"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/TPDS.2011.282"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/INFOCOM.2014.6848153"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/TKDE.2018.2828095"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/TSC.2019.2959775"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/TSC.2024.3376203"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/TSC.2021.3081350"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/TIFS.2024.3350909"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1145\/3600006.3613134"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11242243\/11037401.pdf?arnumber=11037401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T21:00:45Z","timestamp":1763154045000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11037401\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":45,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3580140","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}