{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:08Z","timestamp":1750219808050,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,1,13]],"date-time":"2017-01-13T00:00:00Z","timestamp":1484265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,1,13]]},"DOI":"10.1145\/3036290.3036299","type":"proceedings-article","created":{"date-parts":[[2017,4,7]],"date-time":"2017-04-07T12:30:32Z","timestamp":1491568232000},"page":"47-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Speed up Querying Encrypted Data on Outsourced Database"],"prefix":"10.1145","author":[{"given":"Kim Giau","family":"Ho","sequence":"first","affiliation":[{"name":"Le Quy Don Technical University, Hanoi, Vietnam"}]},{"given":"Ly","family":"Vu","sequence":"additional","affiliation":[{"name":"Le Quy Don Technical University, Hanoi, Vietnam"}]},{"given":"Nam Hai","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Academy of Cryptography Techniques, Hanoi, Vietnam"}]},{"given":"Hieu Minh","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Academy of Cryptography Techniques, Hanoi, Vietnam"}]}],"member":"320","published-online":{"date-parts":[[2017,1,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/sprout.ics.uci.edu\/past_projects\/odb\/.  http:\/\/sprout.ics.uci.edu\/past_projects\/odb\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2014.18"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2015.34"},{"key":"e_1_3_2_1_4_1","first-page":"653","volume-title":"2015 Fifth International Conference on","author":"Shastri S.","year":"2015","unstructured":"S. Shastri , R. Kresman , and J. K. Lee , \" An Improved Algorithm for Querying Encrypted Data in the Cloud,\" in Communication Systems and Network Technologies (CSNT) , 2015 Fifth International Conference on , 2015 , pp. 653 -- 656 . S. Shastri, R. Kresman, and J. K. Lee, \"An Improved Algorithm for Querying Encrypted Data in the Cloud,\" in Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on, 2015, pp. 653--656."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1201\/1086\/44530.13.3.20040701\/83065.3"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2330667.2330691"},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"A Novel Architecture for Outsourcing Secure Database Processing","author":"Chen B. H.","year":"2015","unstructured":"B. H. Chen , P. Cheung , P. Y. Cheung , and Y.-K. Kwok , \"CypherDB : A Novel Architecture for Outsourcing Secure Database Processing ,\" p. 1 , 2015 . B. H. Chen, P. Cheung, P. Y. Cheung, and Y.-K. Kwok, \"CypherDB: A Novel Architecture for Outsourcing Secure Database Processing,\" p. 1, 2015."},{"key":"e_1_3_2_1_9_1","first-page":"150","volume-title":"2010 Second International Conference on","author":"Wang Z.-F.","year":"2010","unstructured":"Z.-F. Wang and A.-G. Tang , \"Implementation of encrypted data for outsourced database,\" in Computational Intelligence and Natural Computing Proceedings (CINC) , 2010 Second International Conference on , 2010 , pp. 150 -- 153 . Z.-F. Wang and A.-G. Tang, \"Implementation of encrypted data for outsourced database,\" in Computational Intelligence and Natural Computing Proceedings (CINC), 2010 Second International Conference on, 2010, pp. 150--153."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5120\/17487-7999"}],"event":{"name":"ICMLSC '17: 2017 International Conference on Machine Learning and Soft Computing","acronym":"ICMLSC '17","location":"Ho Chi Minh City Vietnam"},"container-title":["Proceedings of the 2017 International Conference on Machine Learning and Soft Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3036290.3036299","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3036290.3036299","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:42Z","timestamp":1750217802000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3036290.3036299"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,13]]},"references-count":12,"alternative-id":["10.1145\/3036290.3036299","10.1145\/3036290"],"URL":"https:\/\/doi.org\/10.1145\/3036290.3036299","relation":{},"subject":[],"published":{"date-parts":[[2017,1,13]]},"assertion":[{"value":"2017-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}