{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:05:25Z","timestamp":1774541125880,"version":"3.50.1"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"State Key Laboratory of Information Security Open Foundation","award":["2015-MS-02"],"award-info":[{"award-number":["2015-MS-02"]}]},{"DOI":"10.13039\/501100002858","name":"China Post-Doctoral Science Foundation Funded Project","doi-asserted-by":"publisher","award":["2014M552336"],"award-info":[{"award-number":["2014M552336"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Post-Doctoral Science Foundation Funded Project","doi-asserted-by":"publisher","award":["2015T80972"],"award-info":[{"award-number":["2015T80972"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"International Science and Technology Cooperation and Exchange Program of Sichuan Province, China","award":["2014HH0029"],"award-info":[{"award-number":["2014HH0029"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472065"],"award-info":[{"award-number":["61472065"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61350110238"],"award-info":[{"award-number":["61350110238"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1233108"],"award-info":[{"award-number":["U1233108"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1333127"],"award-info":[{"award-number":["U1333127"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1109\/tetc.2015.2511457","type":"journal-article","created":{"date-parts":[[2015,12,23]],"date-time":"2015-12-23T19:05:44Z","timestamp":1450897544000},"page":"97-109","source":"Crossref","is-referenced-by-count":118,"title":["Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds"],"prefix":"10.1109","volume":"6","author":[{"given":"Hongwei","family":"Li","sequence":"first","affiliation":[]},{"given":"Dongxiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yuanshun","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Tom H.","family":"Luan","sequence":"additional","affiliation":[]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.47"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"ref31","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"song","year":"2000","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7224730"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883390"},{"key":"ref35","first-page":"506","article-title":"Public key encryption with keyword search","author":"boneh","year":"2004","journal-title":"Proc EUROCRYPT"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249517"},{"key":"ref10","first-page":"173","article-title":"uLeepp: An ultra-lightweight energy-efficient and privacy-protected scheme for pervasive and mobile WBSN-cloud communications","volume":"27","author":"ren","year":"2015","journal-title":"Ad Hoc Sensor Wireless Netw"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847943"},{"key":"ref12","first-page":"69","article-title":"Sink privacy protection with minimum network traffic in WSNs","volume":"25","author":"ying","year":"2015","journal-title":"Ad Hoc Sensor Wireless Netw"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.02.006"},{"key":"ref14","article-title":"Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data","author":"li","year":"2015","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848153"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"},{"key":"ref28","first-page":"3937","article-title":"EMRQ: An efficient multi-keyword range query scheme in smart grid auction market","volume":"8","author":"li","year":"2014","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref4","first-page":"1902","article-title":"Stochastic modeling and analysis of opportunistic computing in intermittent mobile cloud","author":"zeng","year":"2013","journal-title":"Proc 8th IEEE Conf Ind Electron Appl (ICIEA)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036902"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6963805"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1201\/b19128"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2371239"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654807"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.06.011"},{"key":"ref7","article-title":"Dynamic operations of cloud radio access networks (C-RAN) for mobile cloud computing systems","author":"cai","year":"2015","journal-title":"IEEE Trans Veh Technol"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2194748"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2013.2292829"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.302"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6616115"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609631"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_14"},{"key":"ref24","year":"2015","journal-title":"NSF Research Awards Abstracts 1990&#x2013;2003"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2610508"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883442"},{"key":"ref25","year":"2015","journal-title":"Java Pairing Based Cryptography Library (JPBC)"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/8306164\/07364230.pdf?arnumber=7364230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:36:03Z","timestamp":1633919763000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7364230\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":36,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2015.2511457","relation":{},"ISSN":["2168-6750"],"issn-type":[{"value":"2168-6750","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]}}}