{"id":"https://openalex.org/W2802684278","doi":"https://doi.org/10.1155/2018/3839254","title":"Conjunctive and Disjunctive Keyword Search over Encrypted Mobile Cloud Data in Public Key System","display_name":"Conjunctive and Disjunctive Keyword Search over Encrypted Mobile Cloud Data in Public Key System","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2802684278","doi":"https://doi.org/10.1155/2018/3839254","mag":"2802684278"},"language":"en","primary_location":{"id":"doi:10.1155/2018/3839254","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/3839254","pdf_url":"http://downloads.hindawi.com/journals/misy/2018/3839254.pdf","source":{"id":"https://openalex.org/S152111507","display_name":"Mobile Information Systems","issn_l":"1574-017X","issn":["1574-017X","1875-905X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/misy/2018/3839254.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038349704","display_name":"Yu Zhang","orcid":"https://orcid.org/0000-0001-8261-0627"},"institutions":[{"id":"https://openalex.org/I130750295","display_name":"Xinyang Normal University","ror":"https://ror.org/0190x2a66","country_code":"CN","type":"education","lineage":["https://openalex.org/I130750295"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Zhang","raw_affiliation_strings":["School of Computer and Information Technology, Xinyang Normal University, Xinyang 464000, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Technology, Xinyang Normal University, Xinyang 464000, China","institution_ids":["https://openalex.org/I130750295"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100451133","display_name":"Yin Li","orcid":"https://orcid.org/0000-0002-9529-8481"},"institutions":[{"id":"https://openalex.org/I130750295","display_name":"Xinyang Normal University","ror":"https://ror.org/0190x2a66","country_code":"CN","type":"education","lineage":["https://openalex.org/I130750295"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yin Li","raw_affiliation_strings":["School of Computer and Information Technology, Xinyang Normal University, Xinyang 464000, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Technology, Xinyang Normal University, Xinyang 464000, China","institution_ids":["https://openalex.org/I130750295"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100398547","display_name":"Yifan Wang","orcid":"https://orcid.org/0000-0002-1255-3273"},"institutions":[{"id":"https://openalex.org/I185443292","display_name":"Wayne State University","ror":"https://ror.org/01070mq45","country_code":"US","type":"education","lineage":["https://openalex.org/I185443292"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yifan Wang","raw_affiliation_strings":["Wayne State University, 42 W. Warren Ave., Detroit, MI 48202, USA"],"affiliations":[{"raw_affiliation_string":"Wayne State University, 42 W. Warren Ave., Detroit, MI 48202, USA","institution_ids":["https://openalex.org/I185443292"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5038349704"],"corresponding_institution_ids":["https://openalex.org/I130750295"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":2.5343,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.91717319,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"2018","issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8737167119979858},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.807633638381958},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6615328788757324},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.6325153708457947},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5821057558059692},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5697067379951477},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.45836859941482544},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.43806692957878113},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.35368281602859497},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3258267641067505},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21453002095222473},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08885908126831055}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8737167119979858},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.807633638381958},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6615328788757324},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.6325153708457947},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5821057558059692},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5697067379951477},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.45836859941482544},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.43806692957878113},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.35368281602859497},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3258267641067505},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21453002095222473},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08885908126831055},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2018/3839254","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/3839254","pdf_url":"http://downloads.hindawi.com/journals/misy/2018/3839254.pdf","source":{"id":"https://openalex.org/S152111507","display_name":"Mobile Information Systems","issn_l":"1574-017X","issn":["1574-017X","1875-905X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Information Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d34422b9d8c64b3f961f6a78d9b8ae9b","is_oa":true,"landing_page_url":"https://doaj.org/article/d34422b9d8c64b3f961f6a78d9b8ae9b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Mobile Information Systems, Vol 2018 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2018/3839254","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/3839254","pdf_url":"http://downloads.hindawi.com/journals/misy/2018/3839254.pdf","source":{"id":"https://openalex.org/S152111507","display_name":"Mobile Information Systems","issn_l":"1574-017X","issn":["1574-017X","1875-905X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Information Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2991064361","display_name":null,"funder_award_id":"61402393","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3175719295","display_name":null,"funder_award_id":"AGK201607","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4491460931","display_name":null,"funder_award_id":"61601396","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G46996605","display_name":null,"funder_award_id":"61402393 and 61601396","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4713543433","display_name":null,"funder_award_id":"61402","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320330184","display_name":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2802684278.pdf","grobid_xml":"https://content.openalex.org/works/W2802684278.grobid-xml"},"referenced_works_count":8,"referenced_works":["https://openalex.org/W1979493600","https://openalex.org/W1998930836","https://openalex.org/W2007877577","https://openalex.org/W2107081597","https://openalex.org/W2132257180","https://openalex.org/W2282819945","https://openalex.org/W2344811709","https://openalex.org/W2490265015"],"related_works":["https://openalex.org/W2147754652","https://openalex.org/W2373836497","https://openalex.org/W2392085618","https://openalex.org/W2553824135","https://openalex.org/W2385229064","https://openalex.org/W2381555924","https://openalex.org/W4380303202","https://openalex.org/W2011723639","https://openalex.org/W2354283558","https://openalex.org/W1503401473"],"abstract_inverted_index":{"The":[0,105],"searchable":[1],"encryption":[2,44,86,97],"scheme":[3,45,87,98,111],"can":[4,65],"perform":[5],"keywords":[6,71],"search":[7,52],"operation":[8],"directly":[9],"over":[10],"encrypted":[11],"data":[12],"without":[13],"decryption,":[14],"which":[15],"is":[16,33,112],"crucial":[17],"to":[18,38,83],"cloud":[19,128],"storage,":[20],"and":[21,48,69,101,118],"has":[22],"attracted":[23],"a":[24,49,60,73,79,84,93],"lot":[25],"of":[26],"attention":[27],"in":[28,115],"these":[29],"years.":[30],"However,":[31],"it":[32],"still":[34],"an":[35,40],"open":[36],"problem":[37],"develop":[39],"efficient":[41,114],"public":[42,95],"key":[43,96],"supporting":[46,88],"conjunctive":[47,100],"disjunctive":[50,102],"keyword":[51,61,103],"simultaneously.":[53],"To":[54],"achieve":[55],"this":[56],"goal,":[57],"we":[58,91],"introduce":[59],"conversion":[62],"method":[63],"that":[64,109],"transform":[66],"the":[67,126,131],"query":[68],"index":[70],"into":[72],"vector":[74,80],"space":[75,81,119],"model.":[76],"Through":[77],"applying":[78],"model":[82],"predicate":[85],"inner":[89],"product,":[90],"propose":[92],"novel":[94],"with":[99,130],"search.":[104],"experiment":[106],"result":[107],"demonstrates":[108],"our":[110],"more":[113,123],"both":[116],"time":[117],"as":[120,122],"well":[121],"suitable":[124],"for":[125],"mobile":[127],"compared":[129],"state-of-art":[132],"schemes.":[133]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
