{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:50Z","timestamp":1750219790158,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T00:00:00Z","timestamp":1691107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,4]]},"DOI":"10.1145\/3617733.3617767","type":"proceedings-article","created":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T15:24:12Z","timestamp":1698765852000},"page":"205-214","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Privacy-preserving Multi-Dimensional Range Query with Hierarchical Hilbert Code-based Tree"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1906-4819","authenticated-orcid":false,"given":"Yingru","family":"Lu","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Shanghai University of Electric Power, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3862-9803","authenticated-orcid":false,"given":"Xiuxia","family":"Tian","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shanghai University of Electric Power, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,31]]},"reference":[{"issue":"4","key":"e_1_3_2_1_1_1","first-page":"40","article-title":"challenges in database[J]","volume":"14","author":"Rijah M.","year":"2021","unstructured":"Rijah M. Security analysis, threats, & challenges in database[J]. Faculty of Arts and Culture, 2021, 14(4):40-47.","journal-title":"Faculty of Arts and Culture"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103320"},{"key":"e_1_3_2_1_3_1","volume-title":"Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data[C]\/\/in IEEE Transactions on Emerging Topics in Computing","author":"Chen B","year":"2021","unstructured":"Chen B, Wu L, Kumar N, Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data[C]\/\/in IEEE Transactions on Emerging Topics in Computing, 2021, 9(4):1753-1764."},{"key":"e_1_3_2_1_4_1","volume-title":"Distributed and Privacy-Preserving Data Dissemination at the Network Edge via Attribute-Based Searchable Encryption[C]\/\/2022 20th Mediterranean Communication and Computer Networking Conference","author":"Huso I","year":"2022","unstructured":"Huso I, Piro G, Boggia G. Distributed and Privacy-Preserving Data Dissemination at the Network Edge via Attribute-Based Searchable Encryption[C]\/\/2022 20th Mediterranean Communication and Computer Networking Conference. IEEE, 2022: 122-130."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2021.12.004"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2931896"},{"key":"e_1_3_2_1_7_1","volume-title":"Choi S G","author":"Roche D S","year":"2016","unstructured":"Roche D S, Apon D, Choi S G, POPE: Partial order preserving encoding[C]\/\/Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016: 1131-1142."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.08.011"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.02.018"},{"key":"e_1_3_2_1_10_1","first-page":"2305","volume-title":"IEEE\/ACM Transactions on Networking","author":"Li R","year":"2016","unstructured":"Li R, Liu A X, Wang A L, Fast and Scalable Range Query Processing with Strong Privacy Protection for Cloud Computing, in IEEE\/ACM Transactions on Networking, 2016, 24(4), 2305-2318."},{"key":"e_1_3_2_1_11_1","volume-title":"Secure, verifiable, and efficient range queries on outsourced database[C]\/\/2019 IEEE 35th International Conference on Data Engineering","author":"Wu S","year":"2019","unstructured":"Wu S, Li Q, Li G, ServeDB: Secure, verifiable, and efficient range queries on outsourced database[C]\/\/2019 IEEE 35th International Conference on Data Engineering, 2019: 626-637."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2982144"},{"issue":"07","key":"e_1_3_2_1_13_1","first-page":"1032","article-title":"Calculation of N-Dimensional Hilbert Codes[J]","volume":"2006","author":"Li C","unstructured":"Li C , Zhang Y , Feng Y . Calculation of N-Dimensional Hilbert Codes[J]. Journal of Computer-Aided Design & Computer Graphics, 2006(07):1032-1038.","journal-title":"Journal of Computer-Aided Design & Computer Graphics"},{"key":"e_1_3_2_1_14_1","first-page":"96","volume":"2009","author":"Xie K","unstructured":"Xie K Wen J G, Zhang D F, Bloom Filter Query Algorithm[J]. Journal of Software,2009,20(01):96-108.","journal-title":"Journal of Software"},{"key":"e_1_3_2_1_15_1","volume-title":"Feng Yu Cai. Calculation of N-Dimensional Hilbert Codes[J]. Journal of computer-aided design & computer graphics","author":"Li Chen Yang","year":"2006","unstructured":"Li Chen Yang, Zhang Yang, Feng Yu Cai. Calculation of N-Dimensional Hilbert Codes[J]. Journal of computer-aided design & computer graphics, 2006, 18(7):1032-1038."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2982144"},{"key":"e_1_3_2_1_17_1","volume-title":"Secure indexes. Cryptology ePrint Archive","author":"Eu-Jin Goh","year":"2003","unstructured":"Eu-Jin Goh. Secure indexes. Cryptology ePrint Archive, 2003."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.12720\/jait.12.2.142-147"}],"event":{"name":"ICCCM 2023: 2023 The 11th International Conference on Computer and Communications Management","acronym":"ICCCM 2023","location":"Nagoya Japan"},"container-title":["Proceedings of the 2023 11th International Conference on Computer and Communications Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617733.3617767","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617733.3617767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:57Z","timestamp":1750178277000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617733.3617767"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,4]]},"references-count":18,"alternative-id":["10.1145\/3617733.3617767","10.1145\/3617733"],"URL":"https:\/\/doi.org\/10.1145\/3617733.3617767","relation":{},"subject":[],"published":{"date-parts":[[2023,8,4]]},"assertion":[{"value":"2023-10-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}