{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:34:16Z","timestamp":1725852856716},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319318103"},{"type":"electronic","value":"9783319318110"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31811-0_12","type":"book-chapter","created":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T06:59:22Z","timestamp":1459493962000},"page":"188-206","source":"Crossref","is-referenced-by-count":0,"title":["POR-2P: Network Coding-Based POR for Data Provision-Payment System"],"prefix":"10.1007","author":[{"given":"Kazumasa","family":"Omote","sequence":"first","affiliation":[]},{"given":"Tran Phuong","family":"Thao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,2]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski, B.: PORs: Proofs of retrievability for large files. In: Proceedings of 14th ACM Conference on Computer and Communications Security - CCS 2007, pp. 584\u2013597 (2007)","DOI":"10.1145\/1315245.1315317"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-89255-7_7","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H Shacham","year":"2008","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90\u2013107. Springer, Heidelberg (2008)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Bowers, K., Juels, A., Oprea, A.: Proofs of retrievability: theory and implementation. In: Proceedings of Workshop on Cloud Computing Security - CCSW 2009, pp. 43\u201354 (2009)","DOI":"10.1145\/1655008.1655015"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Bolosky, W.J., Douceur, J.R., Ely, D., Theimer, M.: Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs. In: Proceedings of ACM Conference on Measurement and Modeling of Computation Systems - SIGMETRICS 2000, pp. 34\u201343 (2000)","DOI":"10.1145\/345063.339345"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Khan, O., Burns, R., Ateniese, G.: MR-PDP: multiple-replica provable data possession. In: Proceedings of 28th Conference on Distributed Computing Systems, pp. 411\u2013420 (2008)","DOI":"10.1109\/ICDCS.2008.68"},{"key":"12_CR6","unstructured":"Aguilera, M.K., Janakiraman, R., Xu, L.: Efficient fault-tolerant distributed storage using erasure codes, Technical report. Washington University in St. Louis (2004)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Bowers, K., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of 16th ACM Conference on Computer and Communications Security - CCS 2009, pp. 187\u2013198 (2009)","DOI":"10.1145\/1653662.1653686"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Shi, E., Stefanov, E., Papamanthou, C.: Practical dynamic proofs of retrievability. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security - CCS 2013, pp. 325\u2013336 (2013)","DOI":"10.1145\/2508859.2516669"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-642-38348-9_17","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"D Cash","year":"2013","unstructured":"Cash, D., K\u00fcp\u00e7\u00fc, A., Wichs, D.: Dynamic proofs of retrievability via oblivious RAM. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 279\u2013295. Springer, Heidelberg (2013)"},{"issue":"4","key":"12_CR10","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R Ahlswede","year":"2000","unstructured":"Ahlswede, R., Cai, N., Li, S., Yeung, R.: Network information flow. IEEE Trans. Inf. Theor. 46(4), 1204\u20131216 (2000)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"2","key":"12_CR11","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TIT.2002.807285","volume":"49","author":"SYR Li","year":"2003","unstructured":"Li, S.Y.R., Yeung, R.W., Cai, N.: Linear network coding. IEEE Trans. Inf. Theor. 49(2), 371\u2013381 (2003)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"9","key":"12_CR12","doi-asserted-by":"publisher","first-page":"4539","DOI":"10.1109\/TIT.2010.2054295","volume":"56","author":"A Dimakis","year":"2010","unstructured":"Dimakis, A., Godfrey, P., Wu, Y., Wainwright, M., Ramchandran, K.: Network coding for distributed storage systems. IEEE Trans. Inf. Theor. 56(9), 4539\u20134551 (2010)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"12_CR13","unstructured":"Acedanski, S., Deb, S., Medard, M., Koetter, R.: How good is random linear coding based distributed networked storage? In: Workshop on Network Coding, Theory and Applications - NETCOD 2005 (2005)"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-642-01957-9_18","volume-title":"Applied Cryptography and Network Security","author":"S Agrawal","year":"2009","unstructured":"Agrawal, S., Boneh, D.: Homomorphic MACs: MAC-based integrity for network coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 292\u2013305. Springer, Heidelberg (2009)"},{"issue":"10","key":"12_CR15","doi-asserted-by":"publisher","first-page":"2096","DOI":"10.1109\/TC.2012.135","volume":"62","author":"C Cheng","year":"2012","unstructured":"Cheng, C., Jiang, T.: An efficient homomorphic MAC with small key size for authentication in network coding. IEEE Trans. Comput. 62(10), 2096\u20132100 (2012)","journal-title":"IEEE Trans. Comput."},{"issue":"9","key":"12_CR16","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/JSAC.2013.SUP.0513026","volume":"31","author":"C Cheng","year":"2013","unstructured":"Cheng, C., Jiang, T., Zhang, Q.: TESLA-based homomorphic MAC for authentication in P2P system for live streaming with network coding. IEEE J. Sel. Areas Commun. 31(9), 291\u2013298 (2013)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-45760-7_17","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"R Johnson","year":"2002","unstructured":"Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244\u2013262. Springer, Heidelberg (2002)"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1007\/978-3-642-30057-8_41","volume-title":"Public Key Cryptography \u2013 PKC 2012","author":"DM Freeman","year":"2012","unstructured":"Freeman, D.M.: Improved security for linearly homomorphic signatures: a generic framework. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 697\u2013714. Springer, Heidelberg (2012)"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Li, J., Yang, S., Wang, X., Xue, X., Li, B.: Tree-structured Data Regeneration in Distributed Storage Systems with Network Coding. In: Proceedings of 29th Conference on Information Communications - INFOCOM 2010, pp. 2892\u20132900 (2010)","DOI":"10.1109\/INFCOM.2010.5462122"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Chen, B., Curtmola, R., Ateniese, G., Burns, R.: Remote data checking for network coding-based distributed storage systems. In: Proceedings of ACM Cloud Computing Security Workshop - CCSW 2010, pp. 31\u201342 (2010)","DOI":"10.1145\/1866835.1866842"},{"issue":"1","key":"12_CR21","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/TC.2013.167","volume":"63","author":"HCH Chen","year":"2014","unstructured":"Chen, H.C.H., Hu, Y., Lee, P.P.C., Tang, Y.: NCCloud: a network-coding-based storage system in a cloud-of-clouds. IEEE Trans. Comput. 63(1), 31\u201344 (2014)","journal-title":"IEEE Trans. Comput."},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Le, A., Markopoulou, A.: NC-Audit: auditing for network coding storage. In: International Symposium on Network Coding - NetCod 2012, pp. 155\u2013160 (2012)","DOI":"10.1109\/NETCOD.2012.6261901"},{"key":"12_CR23","first-page":"14","volume":"2015","author":"K Omote","year":"2015","unstructured":"Omote, K., Thao, T.P.: MD-POR: Multi-source and direct repair for network coding-based proof of retrievability. Int. J. Distrib. Sens. Network. (IJDSN) 2015, 14 (2015). Article ID: 586720","journal-title":"Int. J. Distrib. Sens. Network. (IJDSN)"},{"issue":"3","key":"12_CR24","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1016\/j.comcom.2011.10.012","volume":"35","author":"W Yan","year":"2012","unstructured":"Yan, W., Yang, M., Li, L., Fang, H.: Short signature scheme for multi-source network coding. Comput. Commun. 35(3), 344\u2013351 (2012)","journal-title":"Comput. Commun."},{"issue":"5","key":"12_CR25","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1109\/TNET.2003.818197","volume":"11","author":"R Koetter","year":"2003","unstructured":"Koetter, R., Medard, M.: An algebraic approach to network coding. IEEE\/ACM Trans. Network. 11(5), 782\u2013795 (2003)","journal-title":"IEEE\/ACM Trans. Network."},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Le, A., Markopoulou, A.: On detecting pollution attacks in inter-session network coding. In: Proceedings of 31st IEEE Conference on Computer Communications - INFOCOM 2012, pp. 343\u2013351 (2012)","DOI":"10.1109\/INFCOM.2012.6195771"}],"container-title":["Lecture Notes in Computer Science","Risks and Security of Internet and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31811-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:56:40Z","timestamp":1559415400000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31811-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319318103","9783319318110"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31811-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}