{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:09:09Z","timestamp":1742911749181,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044434"},{"type":"electronic","value":"9783642044441"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04444-1_30","type":"book-chapter","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T14:34:44Z","timestamp":1252938884000},"page":"489-504","source":"Crossref","is-referenced-by-count":4,"title":["Corruption-Localizing Hashing"],"prefix":"10.1007","author":[{"given":"Giovanni","family":"Di Crescenzo","sequence":"first","affiliation":[]},{"given":"Shaoquan","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 1\u201315. Springer, Heidelberg (1996)"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Blaze, M.: A Cryptographic File System for UNIX. In: Proc. of 1993 ACM Conference on Computer and Communications and Security (1993)","DOI":"10.1145\/168588.168590"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Blum, M., Kannan, S.: Designing Programs That Check Their Work. In: Proc. of the 1989 ACM Symposium on Theory on Computing (1989)","DOI":"10.1145\/73007.73015"},{"key":"30_CR4","unstructured":"Blum, M., Evans, W., Gemmell, P., Kannan, S., Naor, M.: Checking the Correctness of Memories. In: Proc. of the 1995 IEEE Symposium on Foundations on Computer Science (1995)"},{"key":"30_CR5","unstructured":"Cattaneo, G., Catuogno, L., Del Sorbo, A., Persiano, G.: The Design and Implementation of a Cryptographic File System for UNIX. In: Proc. of 2001 USENIX Annual Technical Conference (2001)"},{"key":"30_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/3-540-39118-5_19","volume-title":"Advances in Cryptology - EUROCRYPT \u201987","author":"I.B. Damg\u00e5rd","year":"1988","unstructured":"Damg\u00e5rd, I.B.: Collision free hash functions and public key signature schemes. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol.\u00a0304, pp. 203\u2013216. Springer, Heidelberg (1988)"},{"key":"30_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/11555827_16","volume-title":"Computer Security \u2013 ESORICS 2005","author":"G. Crescenzo Di","year":"2005","unstructured":"Di Crescenzo, G., Ghosh, A., Talpade, R.: Towards a Theory of Intrusion Detection. In: de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 267\u2013286. Springer, Heidelberg (2005)"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Di Crescenzo, G., Vakil, F.: Cryptographic hashing for Virus Localization. In: Proc. of the 2006 ACM CCS Workshop on Rapid Malcode (2006)","DOI":"10.1145\/1179542.1179550"},{"key":"30_CR9","volume-title":"Combinatorial Group Testing and its Applications","author":"D. Du","year":"2000","unstructured":"Du, D., Hwang, F.: Combinatorial Group Testing and its Applications. World Scientific Publishing Company, Singapore (2000)"},{"issue":"2","key":"30_CR10","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/359205.359227","volume":"44","author":"A. Ghosh","year":"2001","unstructured":"Ghosh, A., Swaminatha, T.: Software security and privacy risks in mobile e-commerce. Communications of the ACM\u00a044(2), 51\u201357 (2001)","journal-title":"Communications of the ACM"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Goldwasser, S., Micali, S.: How to Construct Random Functions. Journal of the ACM\u00a033(4) (1986)","DOI":"10.1145\/6490.6503"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Kim, G., Spafford, E.: The design and implementation of tripwire: a file system integrity checker. In: Proc. of 1994 ACM Conference on Computer and Communications Security (1994)","DOI":"10.1145\/191177.191183"},{"key":"30_CR13","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R. Merkle","year":"1990","unstructured":"Merkle, R.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435. Springer, Heidelberg (1990)"},{"key":"30_CR14","unstructured":"NIST. Secure hash standard. Federal Information Processing Standard, FIPS-180-1 (April 1995)"},{"key":"30_CR15","unstructured":"NIST. Secure Hash Signature Standard (SHS) (FIPS PUB 180-2). United States of America, Federal Information Processing Standard (FIPS) 180-2, August 1 (2002)"},{"key":"30_CR16","unstructured":"NIST, Cryptographic Hash Algorithm Competition, \n                      \n                        http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/index.html"},{"key":"30_CR17","unstructured":"Oprea, A., Reiter, M., Yang, K.: Space-Efficient Block Storage Integrity. In: Proc. of 2005 Network and Distributed System Security Symposium (2005)"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 Message-Digest Algorithm. Request for Comments (RFC 1320). Internet Activities Board, Internet Privacy Task Force (April 1992)","DOI":"10.17487\/rfc1321"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Russell, A.: Necessary and Sufficient Conditions for Collision-Free Hashing. Journal of Cryptology\u00a08(2) (1995)","DOI":"10.1007\/BF00190757"},{"key":"30_CR20","volume-title":"MALWARE: Fighting Malicious Code","author":"E. Skoudis","year":"2004","unstructured":"Skoudis, E.: MALWARE: Fighting Malicious Code. Prentice-Hall, Englewood Cliffs (2004)"},{"key":"30_CR21","volume-title":"The Art of Computer Virus Research and Defense","author":"P. Szor","year":"2005","unstructured":"Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley, Reading (2005)"},{"key":"30_CR22","volume-title":"Computer Security: Theory and Practice","author":"W. Stalling","year":"2007","unstructured":"Stalling, W., Brown, L.: Computer Security: Theory and Practice. Prentice-Hall, Englewood Cliffs (2007)"},{"key":"30_CR23","doi-asserted-by":"crossref","unstructured":"Sivathanu, G., Wright, C., Zadok, E.: Ensuring Data Integrity in Storage: Techniques and Applications. In: Proc. of the 2005 ACM International Workshop on Storage Security and Survivability (2005)","DOI":"10.1145\/1103780.1103784"},{"key":"30_CR24","unstructured":"1st NIST Cryptographic Hash Functions Workshop, \n                      \n                        http:\/\/www.csrc.nist.gov\/pki\/HashWorkshop\/2005\/program.htm"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2009"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04444-1_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:19:24Z","timestamp":1559506764000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04444-1_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044434","9783642044441"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04444-1_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}