{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:03:14Z","timestamp":1758268994357},"reference-count":12,"publisher":"Springer Science and Business Media LLC","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["EURASIP Journal on Information Security"],"published-print":{"date-parts":[[2009]]},"DOI":"10.1155\/2009\/716357","type":"journal-article","created":{"date-parts":[[2009,12,27]],"date-time":"2009-12-27T15:30:07Z","timestamp":1261927807000},"page":"1-12","source":"Crossref","is-referenced-by-count":15,"title":["Encrypted Domain DCT Based on Homomorphic Cryptosystems"],"prefix":"10.1186","volume":"2009","author":[{"given":"Tiziano","family":"Bianchi","sequence":"first","affiliation":[]},{"given":"Alessandro","family":"Piva","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Barni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/82790"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/78943"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/83.913598"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2011087"},{"key":"7","series-title":"Lecture Notes in Computer Science","volume-title":"Public-key cryptosystems based on composite degree residuosity classes","volume":"1592","year":"1999"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.859383"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-003-0098-z"},{"key":"13","volume-title":"On data banks and privacy homomorphisms","year":"1978"},{"issue":"2","key":"15","first-page":"270","volume":"28","year":"1984"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/78.960425"},{"issue":"10","key":"20","first-page":"1455","volume":"35","year":"1987"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/31340"}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","deposited":{"date-parts":[[2011,3,2]],"date-time":"2011-03-02T09:15:10Z","timestamp":1299057310000},"score":1,"resource":{"primary":{"URL":"http:\/\/jis.eurasipjournals.com\/content\/2009\/1\/716357"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":12,"alternative-id":["716357","716357"],"URL":"https:\/\/doi.org\/10.1155\/2009\/716357","relation":{},"ISSN":["1687-4161","1687-417X"],"issn-type":[{"value":"1687-4161","type":"print"},{"value":"1687-417X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}