{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:18:25Z","timestamp":1775913505128,"version":"3.50.1"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2016,2,1]],"date-time":"2016-02-01T00:00:00Z","timestamp":1454284800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61173141"],"award-info":[{"award-number":["61173141"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61232016"],"award-info":[{"award-number":["61232016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["U1405254"],"award-info":[{"award-number":["U1405254"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61173142"],"award-info":[{"award-number":["61173142"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61173136"],"award-info":[{"award-number":["61173136"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61103215"],"award-info":[{"award-number":["61103215"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61373132"],"award-info":[{"award-number":["61373132"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61373133"],"award-info":[{"award-number":["61373133"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61300237"],"award-info":[{"award-number":["61300237"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61373167"],"award-info":[{"award-number":["61373167"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["GYHY201206033"],"award-info":[{"award-number":["GYHY201206033"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["201301030"],"award-info":[{"award-number":["201301030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["2013DFG12860"],"award-info":[{"award-number":["2013DFG12860"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["BC2013012"],"award-info":[{"award-number":["BC2013012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Jiangsu Engineering Center of Network Monitoring","award":["KJR1308"],"award-info":[{"award-number":["KJR1308"]}]},{"name":"Jiangsu Engineering Center of Network Monitoring","award":["KJR1402"],"award-info":[{"award-number":["KJR1402"]}]},{"DOI":"10.13039\/501100001459","name":"MOE Internet Innovation Platform","doi-asserted-by":"publisher","award":["KJRP1403"],"award-info":[{"award-number":["KJRP1403"]}],"id":[{"id":"10.13039\/501100001459","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003819","name":"Natural Science Foundation of Hubei Province","doi-asserted-by":"publisher","award":["2013CFB297"],"award-info":[{"award-number":["2013CFB297"]}],"id":[{"id":"10.13039\/501100003819","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012246","name":"PAPD","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100012246","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2016,2,1]]},"DOI":"10.1109\/tpds.2015.2401003","type":"journal-article","created":{"date-parts":[[2015,2,11]],"date-time":"2015-02-11T14:36:32Z","timestamp":1423665392000},"page":"340-352","source":"Crossref","is-referenced-by-count":953,"title":["A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data"],"prefix":"10.1109","volume":"27","author":[{"given":"Zhihua","family":"Xia","sequence":"first","affiliation":[]},{"given":"Xinhui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xingming","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"0"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"key":"ref32","first-page":"353","article-title":"Highly-scalable searchable symmetric encryption with support for boolean queries","author":"cash","year":"0","journal-title":"Proc Adv Cryptol"},{"key":"ref31","first-page":"258","article-title":"Parallel and dynamic searchable symmetric encryption","author":"kamara","year":"0","journal-title":"Financial Cryptography and Data Security"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-49244-5","author":"delfs","year":"2007","journal-title":"Introduction to Cryptography Principles and Applications"},{"key":"ref36","article-title":"Efficient feature selection and classification for vehicle detection","author":"wen","year":"0","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1304","DOI":"10.1109\/TNNLS.2013.2250300","article-title":"Feasibility and finite convergence analysis for accurate on-line-support vector learning","volume":"24","author":"gu","year":"2013","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"key":"ref10","first-page":"79","article-title":"Searchable symmetric encryption: Improved definitions and efficient constructions","author":"curtmola","year":"0","journal-title":"Proc 13th ACM Conf Comput Commun Secur"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.23"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848153"},{"key":"ref15","first-page":"31","article-title":"Secure conjunctive keyword search over encrypted data","author":"golle","year":"0","journal-title":"Proc Appl Cryptography Netw Security"},{"key":"ref16","first-page":"2","article-title":"Public key encryption with conjunctive keyword search and its extension to a multi-user system","author":"hwang","year":"0","journal-title":"Proc 1st Int Conf Pairing-Based Cryptography"},{"key":"ref17","first-page":"414","article-title":"Achieving efficient conjunctive keyword searches over encrypted data","author":"ballard","year":"0","journal-title":"Proc 7th Int Conf Inf Commun Secur"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.007"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2013.18"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref27","first-page":"71","article-title":"Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking","author":"sun","year":"0","journal-title":"Proc 8th ACM SIGSAC Symp Inf Comput Commun Secur"},{"key":"ref3","article-title":"A fully homomorphic encryption scheme","author":"gentry","year":"2009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_4"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.36"},{"key":"ref5","first-page":"506","article-title":"Public key encryption with keyword search","author":"boneh","year":"0","journal-title":"Advances in Cryptology Proc Of EUROCRYPT"},{"key":"ref8","first-page":"216","article-title":"Secure indexes","volume":"2003","author":"goh","year":"2003","journal-title":"IACR Cryptology ePrint"},{"key":"ref7","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"song","year":"0","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref2","first-page":"136","article-title":"Cryptographic cloud storage","author":"kamara","year":"0","journal-title":"Financial Cryptography and Data Security"},{"key":"ref9","first-page":"442","article-title":"Privacy preserving keyword searches on remote encrypted data","author":"chang","year":"0","journal-title":"Proc 3rd Int Conf Appl Cryptogr Netw Secur"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.14"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"ref22","first-page":"62","article-title":"Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption","author":"lewko","year":"0","journal-title":"Proc 29th Annu Int Conf Theory Appl Cryptographic Tech"},{"key":"ref21","first-page":"457","article-title":"Predicate privacy in encryption systems","author":"shen","year":"0","journal-title":"Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1516360.1516412"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1314313.1314316"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935306"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.282"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/71\/7383375\/7039216.pdf?arnumber=7039216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:46:40Z","timestamp":1641988000000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7039216\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,1]]},"references-count":39,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2015.2401003","relation":{},"ISSN":["1045-9219"],"issn-type":[{"value":"1045-9219","type":"print"}],"subject":[],"published":{"date-parts":[[2016,2,1]]}}}