{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T22:49:22Z","timestamp":1752360562006,"version":"3.40.1"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2020YFA0712300"],"award-info":[{"award-number":["2020YFA0712300"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072305","62132013","62132005","62172162"],"award-info":[{"award-number":["62072305","62132013","62132005","62172162"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"European Union&#x2019;s Horizon Europe Research and Innovation Programme","award":["101073920 (TENSOR)","101070052 (TANGO)","101070627 (REWIRE)","101092912 (MLSysOps)"],"award-info":[{"award-number":["101073920 (TENSOR)","101070052 (TANGO)","101070627 (REWIRE)","101092912 (MLSysOps)"]}]},{"name":"Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1109\/tdsc.2024.3449770","type":"journal-article","created":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T17:40:29Z","timestamp":1724694029000},"page":"1640-1654","source":"Crossref","is-referenced-by-count":1,"title":["MVOC: A Lighter Multi-Client Verifiable Outsourced Computation for Malicious Lightweight Clients"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7625-7932","authenticated-orcid":false,"given":"Xingkai","family":"Wang","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5250-5030","authenticated-orcid":false,"given":"Zhenfu","family":"Cao","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9268-702X","authenticated-orcid":false,"given":"Zhen","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0262-7678","authenticated-orcid":false,"given":"Kaitai","family":"Liang","sequence":"additional","affiliation":[{"name":"Cybersecurity Group, Delft University of Technology, Delft, CD, Netherlands"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/978-3-642-14623-7_25"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/978-3-642-36594-2_28"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-662-46497-7_6"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/SFCS.1986.25"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1536414.1536440"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/978-3-031-17146-8_6"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.3390\/e25081125"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TDSC.2021.3126323"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3338466.3358927"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/SFCS.2001.959888"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-031-15979-4_1"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/2488608.2488678"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/978-3-642-55220-5_32"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/2660267.2660366"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/978-3-030-45388-6_5"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/978-3-030-75248-4_19"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-3-642-42045-0_16"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/978-3-642-38348-9_21"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1049\/iet-ifs.2018.5341"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/2382196.2382279"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/978-3-540-70583-3_40"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/978-3-662-46803-6_8"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/SP.2013.39"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1201\/9781420010756"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/SP.2015.32"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1007\/s00145-019-09319-x"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.46586\/tosc.v2020.i3.46-86"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/10925471\/10646565.pdf?arnumber=10646565","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T21:19:36Z","timestamp":1742246376000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10646565\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":27,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2024.3449770","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,3]]}}}