{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:24Z","timestamp":1750220904960,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":20,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Advanced Program of Computer Science and Honors Program, Faculty of Information Technology, University of Science, VNU-HCM"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1145\/3368926.3369701","type":"proceedings-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T13:30:11Z","timestamp":1576848611000},"page":"425-432","source":"Crossref","is-referenced-by-count":1,"title":["Privacy Preserving Visual Log Service with Temporal Interval Query using Interval Tree-based Searchable Symmetric Encryption"],"prefix":"10.1145","author":[{"given":"Viet-An","family":"Pham","sequence":"first","affiliation":[{"name":"Software Engineering Lab, University of Science, VNU-HCM"}]},{"given":"Dinh-Hieu","family":"Hoang","sequence":"additional","affiliation":[{"name":"Software Engineering Lab, University of Science, VNU-HCM"}]},{"given":"Huy-Hoang","family":"Chung-Nguyen","sequence":"additional","affiliation":[{"name":"Software Engineering Lab, University of Science, VNU-HCM"}]},{"given":"Mai-Khiem","family":"Tran","sequence":"additional","affiliation":[{"name":"Software Engineering Lab, University of Science, VNU-HCM"}]},{"given":"Minh-Triet","family":"Tran","sequence":"additional","affiliation":[{"name":"Software Engineering Lab, University of Science, VNU-HCM"}]}],"member":"320","reference":[{"key":"key-10.1145\/3368926.3369701-1","unstructured":"Tobias Boelter, Rishabh Poddar, and Raluca Ada Popa. 2016. A Secure One-Roundtrip Index for Range Queries. IACR Cryptology ePrint Archive 2016 (2016), 568."},{"key":"key-10.1145\/3368926.3369701-2","unstructured":"Raphael Bost. 2016. o&phiv;o&sigmav;: Forward Secure Searchable Encryption. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1143--1154."},{"key":"key-10.1145\/3368926.3369701-3","unstructured":"Rapha&#235;l Bost, Brice Minaud, and Olga Ohrimenko. 2017. Forward and backward private searchable encryption from constrained cryptographic primitives. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1465--1482."},{"key":"key-10.1145\/3368926.3369701-4","unstructured":"Reza Curtmola, Juan Garay, Seny Kamara, and Rafail Ostrovsky. 2011. Searchable symmetric encryption: improved definitions and efficient constructions. Journal of Computer Security 19, 5 (2011), 895--934."},{"key":"key-10.1145\/3368926.3369701-5","unstructured":"Victor Shoup Dan Boneh. 2017. A Graduate Course in Applied Cryptography."},{"key":"key-10.1145\/3368926.3369701-6","unstructured":"Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, and Thomas Ristenpart. 2017. Leakage-abuse attacks against order-revealing encryption. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 655--672."},{"key":"key-10.1145\/3368926.3369701-7","unstructured":"Seny Kamara, Charalampos Papamanthou, and Tom Roeder. 2012. Dynamic searchable symmetric encryption. In Proceedings of the 2012 ACM conference on Computer and communications security. ACM, 965--976."},{"key":"key-10.1145\/3368926.3369701-8","unstructured":"Florian Kerschbaum and Anselme Tueno. 2017. An efficiently searchable encrypted data structure for range queries. arXiv preprint arXiv:1709.09314 (2017)."},{"key":"key-10.1145\/3368926.3369701-9","unstructured":"Nguyen-Khang Le, Dieu-Hien Nguyen, Trung-Hieu Hoang, Thanh-An Nguyen, Thanh-Dat Truong, Tung Dinh Duy, Quoc-An Luong, Viet-Khoa Vo-Ho, Vinh-Tiep Nguyen, and Minh-Triet Tran. 2019. Smart Lifelog Retrieval System with Habit-based Concepts and Moment Visualization. In Proceedings of the ACM Workshop on Lifelog Search Challenge, LSC@ICMR 2019, Ottawa, ON, Canada, 10 June 2019. 1--6."},{"key":"key-10.1145\/3368926.3369701-10","unstructured":"Nguyen-Khang Le, Dieu-Hien Nguyen, Vinh-Tiep Nguyen, and Minh-Triet Tran. 2019. Lifelog Moment Retrieval with Advanced Semantic Extraction and Flexible Moment Visualization for Exploration. In Working Notes of CLEF 2019 - Conference and Labs of the Evaluation Forum, Lugano, Switzerland, September 9-12, 2019."},{"key":"key-10.1145\/3368926.3369701-11","unstructured":"Tu-Khiem Le, Van-Tu Ninh, Duc-Tien Dang-Nguyen, Minh-Triet Tran, Liting Zhou, Pablo Redondo, Sinead Smyth, and Cathal Gurrin. 2019. LifeSeeker - Interactive Lifelog Search Engine at LSC 2019. In Proceedings of the 2019 ACM Workshop on The Lifelog Search Challenge. ACM, 4."},{"key":"key-10.1145\/3368926.3369701-12","unstructured":"Bernd M&#252;nzer, Andreas Leibetseder, Sabrina Kletz, Manfred J&#252;rgen Primus, and Klaus Schoeffmann. 2018. lifeXplore at the Lifelog Search Challenge 2018. In Proceedings of the 2018 ACM Workshop on The Lifelog Search Challenge. 3--8."},{"key":"key-10.1145\/3368926.3369701-13","unstructured":"Muhammad Naveed, Seny Kamara, and Charles V Wright. 2015. Inference attacks on property-preserving encrypted databases. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 644--655."},{"key":"key-10.1145\/3368926.3369701-14","unstructured":"Dawn Xiaoding Song, David Wagner, and Adrian Perrig. 2000. Practical techniques for searches on encrypted data. In Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000. IEEE, 44--55."},{"key":"key-10.1145\/3368926.3369701-15","unstructured":"Shi-Feng Sun, Xingliang Yuan, Joseph K Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, and Surya Nepal. 2018. Practical backward-secure searchable encryption from symmetric puncturable encryption. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 763--780."},{"key":"key-10.1145\/3368926.3369701-16","unstructured":"Minh-Triet Tran, Thanh-Dat Truong, Tung Dinh Duy, Viet-Khoa Vo-Ho, Quoc-An Luong, and Vinh-Tiep Nguyen. 2018. Lifelog Moment Retrieval with Visual Concept Fusion and Text-based Query Expansion. In Working Notes of CLEF 2018 - Conference and Labs of the Evaluation Forum, France, September 2018."},{"key":"key-10.1145\/3368926.3369701-17","unstructured":"Viet-Khoa Vo-Ho, Quoc-An Luong, Duy-Tam Nguyen, Mai-Khiem Tran, and Minh-Triet Tran. 2018. Personal Diary Generation from Wearable Cameras with Concept Augmented Image Captioning and Wide Trail Strategy. In Proceedings of the Ninth International Symposium on Information and Communication Technology (SoICT 2018). ACM, 367--374."},{"key":"key-10.1145\/3368926.3369701-18","unstructured":"Zhihua Xia, Xinhui Wang, Xingming Sun, and Qian Wang. 2015. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE transactions on parallel and distributed systems 27, 2 (2015), 340--352."},{"key":"key-10.1145\/3368926.3369701-19","unstructured":"Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2016. All your queries are belong to us: The power of file-injection attacks on searchable encryption. In 25th {USENIX} Security Symposium ({USENIX} Security 16). 707--720."},{"key":"key-10.1145\/3368926.3369701-20","doi-asserted-by":"crossref","unstructured":"Bolei Zhou, Agata Lapedriza, Aditya Khosla, Aude Oliva, and Antonio Torralba. 2017. Places: A 10 million Image Database for Scene Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence (2017).","DOI":"10.1109\/TPAMI.2017.2723009"}],"event":{"number":"10","sponsor":["SOICT, School of Information and Communication Technology - HUST","NAFOSTED, The National Foundation for Science and Technology Development"],"acronym":"SoICT 2019","name":"the Tenth International Symposium","start":{"date-parts":[[2019,12,4]]},"location":"Hanoi, Ha Long Bay, Viet Nam","end":{"date-parts":[[2019,12,6]]}},"container-title":["Proceedings of the Tenth International Symposium on Information and Communication Technology  - SoICT 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368926.3369701","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3369701&ftid=2101308&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:51Z","timestamp":1750203891000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3368926.3369701"}},"subtitle":[],"proceedings-subject":"Information and Communication Technology","short-title":[],"issued":{"date-parts":[[2019]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1145\/3368926.3369701","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}