{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:55:21Z","timestamp":1729666521565,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/iih-msp.2014.249","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T23:09:52Z","timestamp":1419980992000},"page":"795-798","source":"Crossref","is-referenced-by-count":2,"title":["Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage"],"prefix":"10.1109","author":[{"given":"Yongjun","family":"Ren","sequence":"first","affiliation":[]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Liming","family":"Fang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2012.35"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35999-6_4"},{"key":"12","first-page":"93","article-title":"Delegable provable data possession for remote data in the Clouds","volume":"7043","author":"tzuo","year":"2011","journal-title":"ICICS 2011 LNCS"},{"key":"3","first-page":"244","article-title":"Homomorphic signature schemes","author":"johnson","year":"2002","journal-title":"Proc of CT-RSA 2271 of LNCS"},{"key":"2","first-page":"474","article-title":"Simultaneous hardcore bits and cryptography aginst memory attacks","volume":"5444","author":"akavia","year":"2009","journal-title":"TCC 2009 LNCS"},{"key":"1","first-page":"598","author":"ning","year":"2007","journal-title":"Communications Security"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-10366-7_19","article-title":"Proofs of storage from homomorphic identification protocols","volume":"5529","author":"ateniese","year":"2009","journal-title":"ASIACRYPT 2009 of LNCS"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.183"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"},{"key":"5","first-page":"90","article-title":"Compact proofs of retrievability","volume":"5350","author":"waters","year":"2008","journal-title":"Proc ASIACRYPT 2008 Lecture Notes in Computer Science"},{"journal-title":"Provable Data Possession at Untrusted Stores ACM Conference on Computer and","year":"0","author":"ateniese","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943546"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.66"}],"event":{"name":"2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)","start":{"date-parts":[[2014,8,27]]},"location":"Kitakyushu, Japan","end":{"date-parts":[[2014,8,29]]}},"container-title":["2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6990729\/6998244\/06998447.pdf?arnumber=6998447","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T22:55:33Z","timestamp":1498172133000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6998447\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iih-msp.2014.249","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}