{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T14:04:32Z","timestamp":1767967472946,"version":"3.49.0"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402055"],"award-info":[{"award-number":["61402055"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902040"],"award-info":[{"award-number":["61902040"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004761","name":"Natural Science Foundation of Hainan Province","doi-asserted-by":"publisher","award":["2018JJ2445"],"award-info":[{"award-number":["2018JJ2445"]}],"id":[{"id":"10.13039\/501100004761","id-type":"DOI","asserted-by":"publisher"}]},{"name":"FDCT Project","award":["0007\/2018\/A1"],"award-info":[{"award-number":["0007\/2018\/A1"]}]},{"name":"DCT-MoST Joint Project of SAR Macau","award":["FDCT\/025\/2015\/AMJ"],"award-info":[{"award-number":["FDCT\/025\/2015\/AMJ"]}]},{"name":"Funds of University of Macau","award":["CPG2018-00032-FST"],"award-info":[{"award-number":["CPG2018-00032-FST"]}]},{"name":"Funds of University of Macau","award":["SRG2018-00111-FST"],"award-info":[{"award-number":["SRG2018-00111-FST"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61532013"],"award-info":[{"award-number":["61532013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National China 973 Project","award":["2015CB352401"],"award-info":[{"award-number":["2015CB352401"]}]},{"name":"Shanghai Scientific Innovation Act of STCSM","award":["15JC1402400"],"award-info":[{"award-number":["15JC1402400"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2021,10,1]]},"DOI":"10.1109\/tetc.2019.2943524","type":"journal-article","created":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T20:00:01Z","timestamp":1569355201000},"page":"1883-1900","source":"Crossref","is-referenced-by-count":24,"title":["Secure Data Sequence Query Framework Based on Multiple Fogs"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0793-5218","authenticated-orcid":false,"given":"Ke","family":"Gu","sequence":"first","affiliation":[]},{"given":"Na","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Weijia","family":"Jia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"571","article-title":"Scalable group signatures with almost-for-free revocation","author":"libert","year":"2012","journal-title":"Proc 32nd Annu Cryptology Conf Advances Cryptology"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_36"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1132905.1132944"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258475"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2009.8"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-011-0130-z"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2316816"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38577-3_49"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"899","DOI":"10.3844\/jcssp.2012.899.907","article-title":"Fuzzy based secure data aggregation technique in wireless sensor networks","volume":"8","author":"rajesh","year":"2012","journal-title":"J Comput Sci"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455836"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-017-0090-3"},{"key":"ref40","first-page":"1030","article-title":"Exploitable authentication multi-secret sharing without trusted center","volume":"37","author":"yu","year":"2014","journal-title":"Acta Ch Comput"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.173"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2659783"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2607178"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2692960"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2668838"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2017.8171359"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2014.7051866"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.7839768"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2705076"},{"key":"ref28","first-page":"384","article-title":"Secure aggregation for wireless networks","author":"hu","year":"2003","journal-title":"Proc IEEE Appl Internet Workshops"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21837-3_67"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-009-0177-y"},{"key":"ref3","first-page":"2248","article-title":"A review-fog computing and its role in the Internet of Things","volume":"6","author":"pande","year":"2016","journal-title":"Int J Eng Res Appl"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.15439\/2014F503"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1561\/1900000025"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2015.7333287"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCC.2018.8390464"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2893674"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2685434"},{"key":"ref9","first-page":"864","article-title":"Fog computing: Review of privacy and security issues","volume":"3","author":"dhande","year":"2015","journal-title":"Int J Eng Res Gen Sci"},{"key":"ref1","article-title":"OpenFog reference architecture for fog computing","year":"2017","journal-title":"OpenFog Consortium Archit"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2017.7946404"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CIOT.2016.7872914"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2565516"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICASI.2017.7988506"},{"key":"ref41","first-page":"897","article-title":"Key sharing system","volume":"45","author":"liu","year":"2000","journal-title":"Chinese Science Bulletin"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2016.41"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417140"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997360"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/9635600\/08847460.pdf?arnumber=8847460","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:48Z","timestamp":1652194428000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8847460\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,1]]},"references-count":41,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2019.2943524","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,1]]}}}