{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T22:10:09Z","timestamp":1750803009534,"version":"3.41.0"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319654812"},{"type":"electronic","value":"9783319654829"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65482-9_31","type":"book-chapter","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T18:08:09Z","timestamp":1502388489000},"page":"441-451","source":"Crossref","is-referenced-by-count":2,"title":["Cloud Multimedia Files Assured Deletion Based on Bit Stream Transformation with Chaos Sequence"],"prefix":"10.1007","author":[{"given":"Wenbin","family":"Yao","sequence":"first","affiliation":[]},{"given":"Yijie","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Dongbin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,11]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Perlman R.: File system design with assured deletion. In: International Security in Storage Workshop, Third IEEE International, pp. 83\u201388. IEEE (2005)","DOI":"10.1109\/SISW.2005.5"},{"key":"31_CR2","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1007\/978-3-642-16161-2_22","volume-title":"Security and Privacy in Communication Networks","author":"Y Tang","year":"2010","unstructured":"Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.: FADE: secure overlay cloud storage with file assured deletion. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 380\u2013397. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-16161-2_22"},{"key":"31_CR3","unstructured":"Geambasu, R., Kohno, T., Levy, A.A., Levy, H.M.: Vanish: increasing data privacy with self-destructing data. In: Conference on Usenix Security Symposium, pp. 299\u2013316. USENIX Association (2009)"},{"issue":"2","key":"31_CR4","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/j.jcss.2012.05.008","volume":"79","author":"G Wang","year":"2013","unstructured":"Wang, G., Yue, F., Liu, Q.: A secure self-destructing scheme for electronic data. J. Comput. Syst. Sci. 79(2), 279\u2013290 (2013)","journal-title":"J. Comput. Syst. Sci."},{"issue":"11","key":"31_CR5","first-page":"108","volume":"36","author":"K Zhang","year":"2015","unstructured":"Zhang, K., Yang, C., Ma, J.F., Zhang, J.W.: Novel cloud data assured deletion approach based on cipher text sample slice. J. Commun. 36(11), 108\u2013111 (2015)","journal-title":"J. Commun."},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Mo, Z., Qiao, Y., Chen, S.: Two-party fine-grained assured deletion of outsourced data in cloud systems. In: International Conference on Distributed Computing Systems, pp. 308\u2013317. IEEE (2014)","DOI":"10.1109\/ICDCS.2014.39"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Mo, Z., Xiao, Q., Zhou, Y., Chen, S.: On deletion of outsourced data in cloud computing. In: International Conference on Cloud Computing, pp. 344\u2013351. IEEE (2014)","DOI":"10.1109\/CLOUD.2014.54"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Reardon, J., Ritzdorf, H., Basin, D., Capkun, S.: Secure data deletion from persistent media. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 271\u2013284. ACM (2013)","DOI":"10.1145\/2508859.2516699"},{"issue":"10","key":"31_CR9","doi-asserted-by":"crossref","first-page":"2755","DOI":"10.1016\/j.cnsns.2009.11.010","volume":"15","author":"V Patidar","year":"2010","unstructured":"Patidar, V., Pareek, N.K., Purohit, G., Sud, K.K.: Modified substitution\u2013diffusion image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 15(10), 2755\u20132765 (2010)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65482-9_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T21:48:36Z","timestamp":1750801716000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65482-9_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319654812","9783319654829"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65482-9_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}