{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:42:57Z","timestamp":1725702177166},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_2","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"11-22","source":"Crossref","is-referenced-by-count":3,"title":["Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation"],"prefix":"10.1007","author":[{"given":"B. R.","family":"Purushothama","sequence":"first","affiliation":[]},{"given":"B. B.","family":"Amberker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1496091.1496100","volume":"39","author":"L.M. Vaquero","year":"2009","unstructured":"Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M.: A break in the clouds: towards a cloud definition. ACM SIGCOMM Computer Communication Review\u00a039, 50\u201355 (2009)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"2_CR2","unstructured":"Amazon Elastic Compute Cloud (Amazon EC2), http:\/\/aws.amazon.com\/ec2\/"},{"key":"2_CR3","unstructured":"Microsoft Windows Azure Platform, http:\/\/www.microsoft.com\/windowsazure"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-540-88313-5_15","volume-title":"Computer Security - ESORICS 2008","author":"E.-C. Chang","year":"2008","unstructured":"Chang, E.-C., Xu, J.: Remote Integrity Check with Dishonest Storage Server. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 223\u2013237. Springer, Heidelberg (2008)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy preserving public auditing for data storage security in cloud computing. In: 29th Conference on Information Communications, pp. 525\u2013533 (2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski, B.S.: POR: Proofs of Retrievability for Large Files. In: 14th ACM Conference on Computer and Communication Security, pp. 584\u2013597 (2007)","DOI":"10.1145\/1315245.1315317"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., Oprea, A.: Proofs of Retrievability: Theory and Implementation: Report 2008\/175, Cryptology ePrint Archive (2008)","DOI":"10.1145\/1655008.1655015"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Di Piotro, R., Mancini, L.F., Tsudik, G.: Scalable and efficient provable data possession. In: 4th International Conference on Security and Privacy in Communication Networks, pp. 1\u201310 (2008)","DOI":"10.1145\/1460877.1460889"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: 14th ACM Conference on Computer and Communications Security, pp. 598\u2013609 (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"2_CR10","volume-title":"Introduction to finite fields and their applications","author":"R. Lidl","year":"1986","unstructured":"Lidl, R., Niederreiter, H.: Introduction to finite fields and their applications. Press Syndicate of the University of Cambridge, Cambridge Britain (1986)"},{"key":"2_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-49244-5","volume-title":"Introduction to Cryptography, Principles and Applications","author":"H. Delfs","year":"2007","unstructured":"Delfs, H., Knebl, H.: Introduction to Cryptography, Principles and Applications. Springer, Heidelberg (2007)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T14:35:46Z","timestamp":1643380546000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}