{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期部分”:[[2024,2,13]],“日期时间”:“2024-02-13T12:02:04Z”,“时间戳”:170782572430},“参考计数”:46,“出版商”:“电气与电子工程师学会(IEEE)”,“问题”:“4”,“许可证”:[{“开始”:{-“日期部分“:[2018,7,1]],”时间”:“2018-07-01T00:00:00Z”,“timestamp”:1530403200000},“content-version”:“vor”,“delay-in-days”:0,“URL”:“https:\/\/ieeexplore.iee.org\/Xplorehelp\/downloads\/license-information\/ieee.html”}],“funder”:[{“name”:“Natural Science and Engineering Research Council”},{“name”:“Care in-Motion(CIM)Inc.,Canada”}],“crossmark-restriction”:false},“short-container-title”:[“IEEE Trans.Dependable and Secure Comput.”],“published-print”:{“date-parts”:[[2018,7,1]]},”DOI“:”10.1109\/tdsc.2016.26288“,”type“:”journal-article“,”created“:{”date-parts.[[2016,11,8]],“date-time”:“2016-11-08T19:20:55Z”,“timestamp”:1478632855000},《page》:“607-620”,“源”:“Crossref”,“is-referenced-by-count”:29,“title”:[“利用社交网络加强人与人之间的感染分析而不泄露隐私”],“前缀”:“10.1109”,“卷”:“15”,“作者”:[{“ORCID”:“http://\/ORCID.org\/00000-0002-4262-153X”,“authenticated-ORCID”:false,“给定”:“Kuan”,“family”:“Zhang”,“sequence”:“first”,“affiliation”:[]},{“OR CID”:“http://\/orcid.org\/00000-0003-4064-2393”,“authenticated-orcid”:false,“given”:“Xiaohui”,“family”:“Liang”,“sequence”:“additional”,“affiliation”:[]},{“orcid”:“family”:“Yang”,“sequence”:“additional”,“affiliation”:[]},{“given”:“Xuemin”,“family”:“Shen”,“sequence”:“addressive”,“filiation“:[]2],“member”:“263”,“reference”:[{“key”:”ref39“,”first page“:”1“,”article-title“:”Proxy cryptography reviewed“,”author“ivan”,“year”:“2003”,“journal-title”:“Proc-Symp Network and Distributed System Security”},“{”key:“ref38”,“doi-as被插入“:“publisher”,“DOI”:“10.1007\/3-540-39568-7_2”},{“key”:“ref33”,“DOI-asserted-by”:“publicher”,“DI:”10.1073\/pnas.0307506101.2014.2314119“},{”key“:”ref30“,”DOI-asserted-by“:”publisher“,”DOI“:“10.1109\/JSTSP.2015.2427113”},{“key”:“ref37”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/1536414.1536440”}“doi”:“10.1109\/TCSS.2016.2519819”},{“key”:“ref34”,“doi-asserted-by”:“publisher”,“doi”:“10.1038\/nature04017”},{“key”:“ref10”,“doo-asserted-by”:”publisher“,”doi“:”10.1109\/TDSC.2015.2399291“},“key“:10.1109\/TPDS.2012.97“},{“key”:“ref12”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/1128817.1128824”},{“密钥”:“ref13”,“首页”:“129”,“文章标题”:“实现绅士的完全同态加密方案”,“作者”:“绅士”,“年份”:“2011”,“新闻标题”:《欧洲密码》}ted-by“:”publisher“,”doi“:“10.1109\/TPDS.2014.2346212”},{“key”:“ref16”,“doi-asserted-by”:“publisher”,“doi”:“10.109\/JBHI.2015.2407157”}{“key”:“ref19”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/CVPR.2004.1315249”},{“key”:“ref28”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/TPDS.2013.18”},{“密钥”:“ref4”,“doi-asserte-by”:“publisher”,“DI:”10.1073\/pnas.1008895108“},}“密钥“:”ref27“,”首页“:”165“,”article-title“:”有效的公钥密码系统可证明对活动对手安全”,“年份”:“1999”,“journal-title”:“Proc Int Conf Theory Appl Cryptology Inf Secure Advances Cryptoology”},{“key”:“ref3”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/2783258.2783324”}.226“},{”key“:”ref5“,”doi-asserted-by“:”publisher“,“DOI”:“10.1109\/MWC.2015.7224734”},{“key”:“ref8”,“DOI-asserted-by”:“publisher”,“DOI:”10.1109\/MCOM.2017.1600267CM“}”,{”key“:”ref7“,”DOI-assert-by“:”publisher“,”DOI“:”10.1109 \/TDSC.2014.2355824.0906910106“},{”key“:”ref9“,”DOI-asserted-by“:”publisher“,”DOI“:“10.1109\/MCOM.2014.6766086”},{“key”:“ref1”,“year”:“2013”}密文上的2-DNF公式“,”卷“:”2“,”作者“:”e goh“,”年份“:”2005“,”杂志标题“:“Proc 2nd Theory Cryptography Conf”},{“key”:“ref21”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/INFOCOM.2015.7218391”}、{“密钥”:“ref42”、“doi-sserted-by“:”publisher“,”doi“:”10.1145\/800070.802212,“年份”:“2012”,“journal-title”:“Proc 15th Int Conf Inf Security Cryptol”},{“key”:“ref41”,“doi-asserted-by”:“publisher”,“doi”:“10.1007\/978-3-540-30539-2_36”}by“:”publisher“,”doi“:”10.1109\/TKDE.2014.2364027“},{”key“:”ref43“,“doi断言者”:“publisher”,“doi”:“10.1504\/IJACT.2008.017048”},{“key”:“ref25”,“doi断言者”:“publisher”,“doi”:“10.1109\/TIFS.2011.2108650”}],“容器标题”:[“IEEE可靠和安全计算事务”],“原始标题”:[],“链接”:[{“URL”:“http:\/\/exploresting.IEEE.org/ielx7\/8588\/88408571\/0738429.pdf?arnumber=7738429英寸,“content-type”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[2022,1,12]],“date-time”:”2022-01-12T16:26:00Z“,”timestamp“:1642004760000},“score”:1,“resource”:{primary“:{”URL“https:\/\ieeeexplore.iee.org\/document\/7738429\/“}”,“substitle”:[],“短标题”:[],“已发布”:{“日期-部分”用法:[[2018,7,1]]},“references-count”:46,“journal-issue”:{“issue”:“4”},”URL“:”http://\/dx.doi.org\/10.109\/tdsc.2016.26288“,”relationship“:{},‘ISSN’:[”1545-5971“,”1941-0018“,”2160-9209“],“ISSN-type”:[{“value”:“1545-5971',”type“:”print“},{“value”:”1941-001“,”type“:”electronic“},{”value“:“2160-9209”,“type”:“electronics”}],“subject”:[],“published”:{“日期部分”:[[2018,7,1]]}}