{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T01:06:33Z","timestamp":1755219993980,"version":"3.43.0"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2024MF038"],"award-info":[{"award-number":["ZR2024MF038"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172245"],"award-info":[{"award-number":["62172245"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018532","name":"Major Scientific and Technological Innovation project of Shandong Province","doi-asserted-by":"publisher","award":["2022CXGC020102"],"award-info":[{"award-number":["2022CXGC020102"]}],"id":[{"id":"10.13039\/501100018532","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Project of the State Key Laboratory of Integrated Service Networks","award":["ISN25-21"],"award-info":[{"award-number":["ISN25-21"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1109\/tnsm.2025.3565943","type":"journal-article","created":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T13:23:57Z","timestamp":1746105837000},"page":"3341-3354","source":"Crossref","is-referenced-by-count":0,"title":["Enabling Privacy-Preserving Top-k Hamming Distance Query on the Cloud"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9938-1442","authenticated-orcid":false,"given":"Wenjing","family":"Gao","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Qingdao University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0574-7803","authenticated-orcid":false,"given":"Jia","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Qingdao University, Qingdao, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.09.052"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2804763"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90567-5_33"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41320-9_11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-1063-z"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2025.103404"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102953"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2937764"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2017.2707552"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3174184"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3482321"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3276360"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.02.080"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2656475"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.107534"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3158363"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03344-x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05048-y"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/s0065-2458(01)80019-x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2937484"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3262839"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710941"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2417542"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3099720"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3141391"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3029899"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3020545"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3040012"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2024.3463397"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2025.3525614"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761643"},{"key":"ref36","first-page":"1","article-title":"Faster secure two-party computation using garbled circuits","volume-title":"Proc. 20th USENIX Secur. Symp.","author":"Huang"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120592"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/11118327\/10981730.pdf?arnumber=10981730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T17:44:38Z","timestamp":1754588678000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10981730\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":37,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2025.3565943","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2025,8]]}}}