{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:12:22Z","timestamp":1743073942127,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685267"},{"type":"electronic","value":"9783319685274"}],"license":[{"start":{"date-parts":[[2017,9,24]],"date-time":"2017-09-24T00:00:00Z","timestamp":1506211200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-68527-4_8","type":"book-chapter","created":{"date-parts":[[2017,9,23]],"date-time":"2017-09-23T02:39:20Z","timestamp":1506134360000},"page":"73-78","source":"Crossref","is-referenced-by-count":2,"title":["Comments on Yu et al\u2019s Shared Data Integrity Verification Protocol"],"prefix":"10.1007","author":[{"given":"Tsu-Yang","family":"Wu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yueshan","family":"Lin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"King-Hang","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chien-Ming","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeng-Shyang","family":"Pan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,9,24]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp. 213\u2013229. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"issue":"21","key":"8_CR2","doi-asserted-by":"crossref","first-page":"13077","DOI":"10.1007\/s11042-015-2594-5","volume":"75","author":"D Kim","year":"2016","unstructured":"Kim, D., Kwon, H., Hahn, C., Hur, J.: Privacy-preserving public auditing for educational multimedia data in cloud computing. Multimedia Tools Appl. 75(21), 13077\u201313091 (2016)","journal-title":"Multimedia Tools Appl."},{"issue":"7","key":"8_CR3","doi-asserted-by":"crossref","first-page":"1482","DOI":"10.3390\/s17071482","volume":"17","author":"CT Li","year":"2017","unstructured":"Li, C.T., Wu, T.Y., Chen, C.L., Lee, C.C., Chen, C.M.: An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system. Sensors 17(7), 1482 (2017)","journal-title":"Sensors"},{"issue":"10","key":"8_CR4","doi-asserted-by":"crossref","first-page":"2760","DOI":"10.1109\/TPDS.2013.199","volume":"25","author":"J Ni","year":"2014","unstructured":"Ni, J., Yu, Y., Mu, Y., Xia, Q.: On the security of an efficient dynamic auditing protocol in cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(10), 2760\u20132761 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"8_CR5","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s12652-015-0295-6","volume":"7","author":"C Wan","year":"2016","unstructured":"Wan, C., Zhang, J., Pei, B., Chen, C.: Efficient privacy-preserving third-party auditing for ambient intelligence systems. J. Ambient Intell. Humaniz. Comput. 7(1), 21\u201327 (2016)","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"issue":"1","key":"8_CR6","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/TCC.2014.2299807","volume":"2","author":"B Wang","year":"2014","unstructured":"Wang, B., Li, B., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2(1), 43\u201356 (2014)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Wang, B., Li, H., Li, M.: Privacy-preserving public auditing for shared cloud data supporting group dynamics. In: 2013 IEEE International Conference on Communications (ICC), pp. 1946\u20131950. IEEE (2013)","DOI":"10.1109\/ICC.2013.6654808"},{"issue":"2","key":"8_CR8","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2013","unstructured":"Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362\u2013375 (2013)","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"8_CR9","first-page":"343","volume":"7","author":"Y Xu","year":"2016","unstructured":"Xu, Y., Zhong, H., Cui, J.: An improved identity-based multi-proxy multi-signature scheme. J. Inf. Hiding Multimedia Sig. Process. 7(2), 343\u2013351 (2016)","journal-title":"J. Inf. Hiding Multimedia Sig. Process."},{"issue":"9","key":"8_CR10","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/TPDS.2012.278","volume":"24","author":"K Yang","year":"2013","unstructured":"Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717\u20131726 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"6","key":"8_CR11","first-page":"1274","volume":"7","author":"SL Yin","year":"2016","unstructured":"Yin, S.L., Li, H., Liu, J.: A new provable secure certificateless aggregate signcryption scheme. J. Inf. Hiding Multimedia Sig. Process. 7(6), 1274\u20131281 (2016)","journal-title":"J. Inf. Hiding Multimedia Sig. Process."},{"issue":"10","key":"8_CR12","doi-asserted-by":"crossref","first-page":"2877","DOI":"10.1002\/cpe.3484","volume":"28","author":"Y Yu","year":"2016","unstructured":"Yu, Y., Ni, J., Xia, Q., Wang, X., Yang, H., Zhang, X.: SDIVIP\n            $$^2$$\n          : shared data integrity verification with identity privacy preserving in mobile clouds. Pract. Exp. Concurr. Comput. 28(10), 2877\u20132888 (2016)","journal-title":"Pract. Exp. Concurr. Comput."},{"issue":"1","key":"8_CR13","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s10586-015-0514-0","volume":"19","author":"J Zhang","year":"2016","unstructured":"Zhang, J., Zhao, X.: Efficient chameleon hashing-based privacy-preserving auditing in cloud storage. Cluster Comput. 19(1), 47\u201356 (2016)","journal-title":"Cluster Comput."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68527-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,27]],"date-time":"2017-09-27T06:08:29Z","timestamp":1506492509000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68527-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,24]]},"ISBN":["9783319685267","9783319685274"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68527-4_8","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,9,24]]}}}