{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:11:16Z","timestamp":1763467876305,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540883128"},{"type":"electronic","value":"9783540883135"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88313-5_15","type":"book-chapter","created":{"date-parts":[[2008,10,4]],"date-time":"2008-10-04T04:41:44Z","timestamp":1223095304000},"page":"223-237","source":"Crossref","is-referenced-by-count":43,"title":["Remote Integrity Check with Dishonest Storage Server"],"prefix":"10.1007","author":[{"given":"Ee-Chien","family":"Chang","sequence":"first","affiliation":[]},{"given":"Jia","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"15_CR1","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/1041680.1041681","volume":"36","author":"S. Androutsellis-Theotokis","year":"2004","unstructured":"Androutsellis-Theotokis, S., Spinellis, D.: A survey of peer-to-peer content distribution technologies. ACM Comput. Surv.\u00a036(4), 335\u2013371 (2004)","journal-title":"ACM Comput. Surv."},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: ACM conf. on Computer and Communications Security, pp. 598\u2013609 (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"15_CR3","unstructured":"Batten, C., Barr, K., Saraf, A., Treptin, S.: pStore: A secure peer-to-peer backup system. LCS Technical Memo 632, MIT Laboratory for Computer Science (2001)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Blum, M., Evans, W., Gemmell, P., Kannan, S., Naor, M.: Checking the correctness of memories. In: IEEE Sym. on Foundations of Comp. Sci, pp. 90\u201399 (1991)","DOI":"10.1109\/SFCS.1991.185352"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., Oprea, A.: Proofs of retrievability: Theory and implementation. Cryptology ePrint Archive, Report 2008\/175 (2008)","DOI":"10.1145\/1655008.1655015"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2007","DOI":"10.1007\/978-3-540-72909-9","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"E.-C. Chang","year":"2007","unstructured":"Chang, E.-C., Mukhopadhyay, S., Xu, J.: Remote integrity check without the original. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622, p. 2007. Springer, Heidelberg (manuscript submitted, 2007), http:\/\/www.comp.nus.edu.sg\/~changec\/publications\/remote.pdf"},{"key":"15_CR7","unstructured":"Filho, D., Barreto, P.: Demonstrating data possession and uncheatable data transfer. Cryptology ePrint Archive, Report 2006\/150 (2006)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Harnik, D., Naor, M.: On the Compressibility of NP Instances and Cryptographic Applications. In: IEEE Sym. on Foundations of Comp. Sci, pp. 719\u2013728 (2006)","DOI":"10.1109\/FOCS.2006.54"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-45760-7_17","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"R. Johnson","year":"2002","unstructured":"Johnson, R., Molnar, D., Song, D.X., Wagner, D.: Homomorphic Signature Schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, pp. 244\u2013262. Springer, Heidelberg (2002)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski Jr., B.S.: Pors: proofs of retrievability for large files. In: ACM conf. on Computer and Communications Security, pp. 584\u2013597 (2007)","DOI":"10.1145\/1315245.1315317"},{"key":"15_CR11","unstructured":"Li, J., Dabek, F.: F2F: reliable storage in open networks. In: Intern. Workshop on Peer-to-Peer Systems (2006)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Naor, M., Rothblum, G.N.: The Complexity of Online Memory Checking. In: IEEE Symp. on Foundations of Comp. Sci., pp. 573\u2013584 (2005)","DOI":"10.1109\/SFCS.2005.71"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. Cryptology ePrint Archive, Report 2008\/073 (2008), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Clarke, D., Gasend, B., van Dijk, M., Devadas, S.: Efficient memory integrity verification and encryption for secure processors. In: IEEE\/ACM Int. Sym. on Microarchitecture, pp. 339\u2013350 (2003)","DOI":"10.1109\/MICRO.2003.1253207"}],"container-title":["Lecture Notes in Computer Science","Computer Security - ESORICS 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88313-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T10:54:19Z","timestamp":1738407259000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88313-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540883128","9783540883135"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88313-5_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}