{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:02:25Z","timestamp":1755993745714,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T00:00:00Z","timestamp":1721779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"This research was supported by the National Natural Science Foundation of China (Grant No.62202390) , the Science and Technology Fund of Sichuan Province (Grant No.2023YFG0306 and No.2024NSFTD0008)."}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,24]]},"DOI":"10.1145\/3688636.3688670","type":"proceedings-article","created":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T18:26:22Z","timestamp":1728671182000},"page":"148-154","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Privacy-Preserving Medical Record Query Scheme Over Oblivious Transfer in Wireless Body Area Network"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-9223-1526","authenticated-orcid":false,"given":"Tao","family":"Zhao","sequence":"first","affiliation":[{"name":"School of Computer and Software Engineering, Xihua University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6419-2685","authenticated-orcid":false,"given":"Lu","family":"Xiong","sequence":"additional","affiliation":[{"name":"China United Network Communications Co., Ltd. Hefei Branch, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8519-5147","authenticated-orcid":false,"given":"Enzhi","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computer and Software Engineering, Xihua University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9900-2978","authenticated-orcid":false,"given":"Ling","family":"Xiong","sequence":"additional","affiliation":[{"name":"School of Computer and Software Engineering, Xihua University, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,10,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECAI58670.2023.10176838"},{"key":"e_1_3_2_1_2_1","first-page":"216","volume-title":"2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA), IEEE","author":"Moni D.","year":"2022","unstructured":"S. S. Moni, D. Gupta, Secure and efficient privacy-preserving authentication scheme using cuckoo filter in remote patient monitoring network, in: 2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA), IEEE, 2022, pp.208\u2013216."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CBD58033.2022.00024"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3152395"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3288453"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJISE.2022.123577"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10000905"},{"key":"e_1_3_2_1_8_1","first-page":"552","volume-title":"USA","author":"Bellare A.","year":"2007","unstructured":"M. Bellare, A. Boldyreva, A. O'Neill, Deterministic and efficiently searchable encryption, in: Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings 27, Springer, 2007, pp. 535\u2013552."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2017.8288341"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.005"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2020.3007488"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3070544"},{"key":"e_1_3_2_1_13_1","article-title":"Tao, Secure and lightweight user authentication scheme for cloud-assisted internet of things","author":"Wang D.","year":"2023","unstructured":"C. Wang, D. Wang, Y. Duan, X. Tao, Secure and lightweight user authentication scheme for cloud-assisted internet of things, IEEE Transactions on Information Forensics and Security (2023).","journal-title":"IEEE Transactions on Information Forensics and Security ("},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3118879"},{"key":"e_1_3_2_1_15_1","first-page":"625","volume-title":"International Conference on Frontiers in Cyber Security","author":"Tang L.","year":"2023","unstructured":"Y. Tang, L. Xiong, M. He, L. Chen, Lightweight privacy-preserving medical diagnostic scheme for internet of things healthcare, in: International Conference on Frontiers in Cyber Security, Springer, 2023, pp. 613\u2013625."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3070544"}],"event":{"name":"ICCBN 2024: 2024 12th International Conference on Communications and Broadband Networking","acronym":"ICCBN 2024","location":"Nyingchi China"},"container-title":["Proceedings of the 2024 12th International Conference on Communications and Broadband Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3688636.3688670","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3688636.3688670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:44:36Z","timestamp":1755913476000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3688636.3688670"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,24]]},"references-count":16,"alternative-id":["10.1145\/3688636.3688670","10.1145\/3688636"],"URL":"https:\/\/doi.org\/10.1145\/3688636.3688670","relation":{},"subject":[],"published":{"date-parts":[[2024,7,24]]},"assertion":[{"value":"2024-10-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}