{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:54:00Z","timestamp":1725472440313},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642321146"},{"type":"electronic","value":"9783642321153"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32115-3_15","type":"book-chapter","created":{"date-parts":[[2012,7,26]],"date-time":"2012-07-26T02:25:16Z","timestamp":1343269516000},"page":"132-141","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Data Integrity Verification Method Supporting Multi-granular Operation with Commutative Hash"],"prefix":"10.1007","author":[{"given":"Long","family":"Chen","sequence":"first","affiliation":[]},{"given":"Banglan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"15_CR1","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"W. Qian","year":"2011","unstructured":"Qian, W., Cong, W., Kui, R., Wenjing, L., Jin, L.: Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE Transactions on Parallel and Distributed Systems\u00a022(5), 847\u2013859 (2011)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"5","key":"15_CR2","doi-asserted-by":"publisher","first-page":"847","DOI":"10.3724\/SP.J.1016.2011.00847","volume":"34","author":"C. Long","year":"2011","unstructured":"Long, C., Guoyin, W.: An Efficient Integrity Check Method for Fine-Grained Data over Galois Field. Chinese Journal of Computers\u00a034(5), 847\u2013855 (2011)","journal-title":"Chinese Journal of Computers"},{"issue":"4","key":"15_CR3","first-page":"902","volume":"20","author":"C. Long","year":"2009","unstructured":"Long, C., Guoyin, W.: An integrity check method for fine-grained data. Journal of Software\u00a020(4), 902\u2013909 (2009)","journal-title":"Journal of Software"},{"issue":"2","key":"15_CR4","first-page":"8","volume":"6","author":"W. Guoyin","year":"2007","unstructured":"Guoyin, W., Qinghua, Z., Jun, H.: An overview of granular computing. CAAI Transactions on Intelligence Systems\u00a06(2), 8\u201325 (2007)","journal-title":"CAAI Transactions on Intelligence Systems"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Tsauyoung, L.: Granular computing: practices, theories, and future directions. In: Encyclopedia of Complexity and Systems Science, pp. 4339\u20134355 (2009)","DOI":"10.1007\/978-0-387-30440-3_256"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Yiyu, Y.: Granular Computing: Past, Present and Future. In: 2008 IEEE International Conference on Granular Computing, vol.\u00a08, pp. 80\u201385 (2008)","DOI":"10.1109\/GRC.2008.4664800"},{"key":"15_CR7","unstructured":"Cong, W., Qian, W., Kui, R., Wenjing, L.: Privacy-preserving public auditing for data storage security in cloud computing. In: InfoCom2010. IEEE (2010)"},{"key":"15_CR8","unstructured":"Goodrich, M., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and communitative hashing. In: Proceedings of DARPA DISCEX II (June 2001)"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1007\/3-540-48285-7_24","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"J. Benaloh","year":"1994","unstructured":"Benaloh, J., de Mare, M.: One-Way Accumulators: A Decentralized Alternative to Digital Signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 274\u2013285. Springer, Heidelberg (1994)"},{"issue":"9","key":"15_CR10","first-page":"1432","volume":"23","author":"H. Zhuo","year":"2011","unstructured":"Zhuo, H., Sheng, Z., Nenghai, Y.: Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability. IEEE \u00a023(9), 1432\u20131437 (2011)","journal-title":"IEEE"},{"key":"15_CR11","unstructured":"Giuseppe, A., Randal, B., Reza, C.: Provable data possession at untrusted stores. In: De Capitani di Vimercati, S., Syverson, P. (eds.) Proceedings of CCS 2007, vol.\u00a010, pp. 598\u2013609. ACM Press (2007)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Sravan, K.R., Ashutosh, S.: Data Integrity Proofs in Cloud Storage. In: Third InternationalConference on Communication Systems and Networks (COMSNETS), vol.\u00a01, pp. 1\u20134 (2011)","DOI":"10.1109\/COMSNETS.2011.5716422"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1145\/1653662.1653688","volume-title":"Proc. of CCS 2009","author":"C. Chris Erway","year":"2009","unstructured":"Chris Erway, C., Alptekin, K., Charalampos, P., Roberto, T.: Dynamic Provable Data Possession. In: Proc. of CCS 2009, pp. 213\u2013222. ACM, Chicago (2009)"}],"container-title":["Lecture Notes in Computer Science","Rough Sets and Current Trends in Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32115-3_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:55:27Z","timestamp":1620129327000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32115-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642321146","9783642321153"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32115-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}