{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:09:49Z","timestamp":1773655789536,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/cns.2014.6997518","type":"proceedings-article","created":{"date-parts":[[2014,12,31]],"date-time":"2014-12-31T04:15:04Z","timestamp":1419999304000},"page":"481-489","source":"Crossref","is-referenced-by-count":38,"title":["A tunable proof of ownership scheme for deduplication using Bloom filters"],"prefix":"10.1109","author":[{"given":"Jorge","family":"Blasco","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]},{"given":"Agustin","family":"Orfila","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Sorniotti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1145\/1315245.1315318","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"2007","journal-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security Ser CCS '07"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1456469.1456471"},{"key":"18","article-title":"Message-locked encryption and secure deduplication","author":"bellare","year":"2012","journal-title":"Cryptology EPrint Archive Report 2012\/631"},{"key":"15","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/2484313.2484340","article-title":"Weak leakage-resilient client-side deduplication of encrypted data in cloud storage","author":"xu","year":"2013","journal-title":"Proceedings of the 8th ACM SIGSAC Symposium on Information Computer and Communications Security Ser ASIA CCS '13"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1002\/sec.784"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2245361"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133603"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_21"},{"key":"12","author":"juels","year":"0","journal-title":"Method and System for Preventing De-duplication Side-channel Attacks in Cloud Storage Systems"},{"key":"21","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1145\/1315245.1315317","article-title":"PoRs: Proofs of retrievability for large files","author":"juels","year":"2007","journal-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security Ser CCS '07"},{"key":"3","year":"2013","journal-title":"Ciphertite High Security Online Backup"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460889"},{"key":"2","year":"2013","journal-title":"Bitcasa Infinite Storage"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.84"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.09.003"},{"key":"7","author":"der laan","year":"2013","journal-title":"Dropship"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.187"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2060451"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2012.6232381"},{"key":"9","first-page":"81","article-title":"Boosting efficiency and security in proof of ownership for deduplication","author":"di pietro","year":"2012","journal-title":"Proceedings of the 7th ACM Symposium on Information Computer and Communications Security ACM"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046765"}],"event":{"name":"2014 IEEE Conference on Communications and Network Security (CNS)","location":"San Francisco, CA, USA","start":{"date-parts":[[2014,10,29]]},"end":{"date-parts":[[2014,10,31]]}},"container-title":["2014 IEEE Conference on Communications and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6982337\/6997445\/06997518.pdf?arnumber=6997518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:31:41Z","timestamp":1602685901000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6997518"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cns.2014.6997518","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}