{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:22:24Z","timestamp":1769750544829,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T00:00:00Z","timestamp":1561334400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,24]]},"DOI":"10.1145\/3326285.3329064","type":"proceedings-article","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T12:42:33Z","timestamp":1560516153000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["MixGeo"],"prefix":"10.1145","author":[{"given":"Ruoyang","family":"Guo","sequence":"first","affiliation":[{"name":"Renmin University of China"}]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[{"name":"Renmin University of China"}]},{"given":"Yuncheng","family":"Wu","sequence":"additional","affiliation":[{"name":"Renmin University of China"}]},{"given":"Ruixuan","family":"Liu","sequence":"additional","affiliation":[{"name":"Renmin University of China"}]},{"given":"Hong","family":"Chen","sequence":"additional","affiliation":[{"name":"Renmin University of China"}]},{"given":"Cuiping","family":"Li","sequence":"additional","affiliation":[{"name":"Renmin University of China"}]}],"member":"320","published-online":{"date-parts":[[2019,6,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/645933.756665"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Mark de Berg Otfried Cheong Marc van Kreveld and Mark Overmars. 2008. Computational geometry: algorithms and applications. Springer-Verlag TELOS.   Mark de Berg Otfried Cheong Marc van Kreveld and Mark Overmars. 2008. Computational geometry: algorithms and applications. Springer-Verlag TELOS.","DOI":"10.1007\/978-3-540-77974-2"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_19"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_31"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2590701.2590705"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508174"},{"key":"e_1_3_2_1_10_1","unstructured":"Craig Gentry and Dan Boneh. 2009. A fully homomorphic encryption scheme. Vol. 20. Stanford University Stanford.  Craig Gentry and Dan Boneh. 2009. A fully homomorphic encryption scheme. Vol. 20. Stanford University Stanford."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557559"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/602259.602266"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-011-0245-7"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1788414.1788423"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2406704"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.55"},{"key":"e_1_3_2_1_18_1","unstructured":"Yehuda Lindell and Jonathan Katz. 2014. Introduction to modern cryptography. Chapman and Hall\/CRC.  Yehuda Lindell and Jonathan Katz. 2014. Introduction to modern cryptography. Chapman and Hall\/CRC."},{"key":"e_1_3_2_1_19_1","volume-title":"25th IEEE\/ACM International Symposium on Quality of Service, IWQoS 2017","author":"Luo Yuchuan","year":"2017"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_13"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.38"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.76"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_27"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506145"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346827"},{"key":"e_1_3_2_1_27_1","unstructured":"Boyang Wang Ming Li and Li Xiong. 2017. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data. IEEE Transactions on Dependable and Secure Computing (2017).  Boyang Wang Ming Li and Li Xiong. 2017. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data. IEEE Transactions on Dependable and Secure Computing (2017)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.34"},{"key":"e_1_3_2_1_29_1","unstructured":"Wikipedia. {n.d.}. Geohash. http:\/\/en.wikipedia.org\/wiki\/Geohash\/. March 20 2014.  Wikipedia. {n.d.}. Geohash. http:\/\/en.wikipedia.org\/wiki\/Geohash\/. March 20 2014."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"e_1_3_2_1_31_1","unstructured":"Guowen Xu Hongwei Li Yuanshun Dai Kan Yang and Xiaodong Lin. 2018. Enabling Efficient and Geometric Range Query with Access Control over Encrypted Spatial Data. IEEE Transactions on Information Forensics and Security (2018).  Guowen Xu Hongwei Li Yuanshun Dai Kan Yang and Xiaodong Lin. 2018. Enabling Efficient and Geometric Range Query with Access Control over Encrypted Spatial Data. IEEE Transactions on Information Forensics and Security (2018)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Hua Zhang Ziqing Guo Shaohua Zhao and Qiaoyan Wen. 2017. Privacy-Preserving Linear Region Search Service. IEEE Transactions on Services Computing (2017).  Hua Zhang Ziqing Guo Shaohua Zhao and Qiaoyan Wen. 2017. Privacy-Preserving Linear Region Search Service. IEEE Transactions on Services Computing (2017).","DOI":"10.1109\/TSC.2017.2777970"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2499791"}],"event":{"name":"IWQoS '19: IEEE\/ACM International Symposium on Quality of Service","location":"Phoenix Arizona","acronym":"IWQoS '19"},"container-title":["Proceedings of the International Symposium on Quality of Service"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326285.3329064","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3326285.3329064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:00Z","timestamp":1750206360000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326285.3329064"}},"subtitle":["efficient secure range queries on encrypted dense spatial data in the cloud"],"short-title":[],"issued":{"date-parts":[[2019,6,24]]},"references-count":33,"alternative-id":["10.1145\/3326285.3329064","10.1145\/3326285"],"URL":"https:\/\/doi.org\/10.1145\/3326285.3329064","relation":{},"subject":[],"published":{"date-parts":[[2019,6,24]]},"assertion":[{"value":"2019-06-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}