{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T07:40:09Z","timestamp":1750750809745,"version":"3.41.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"publisher","award":["2022YFB2703500"],"award-info":[{"award-number":["2022YFB2703500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,5]]},"DOI":"10.1109\/cscwd64889.2025.11033469","type":"proceedings-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T17:24:40Z","timestamp":1750699480000},"page":"123-128","source":"Crossref","is-referenced-by-count":0,"title":["Data Destruction Mechanism Based on AONT-CTR and Blockchain"],"prefix":"10.1109","author":[{"given":"Pengkai","family":"Xia","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Beihang University,Beijing,China"}]},{"given":"Kai","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Beihang University,Beijing,China"}]},{"given":"Jiehua","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Beihang University,Beijing,China"}]},{"given":"Jiang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Beihang University,Beijing,China"}]},{"given":"Cong","family":"Lin","sequence":"additional","affiliation":[{"name":"Yunnan Power Grid Co., Ltd.,Measurement Center,Kunming,China"}]},{"given":"Qingchan","family":"Liu","sequence":"additional","affiliation":[{"name":"Yunnan Power Grid Co., Ltd.,Measurement Center,Kunming,China"}]},{"given":"Yitao","family":"Zhao","sequence":"additional","affiliation":[{"name":"Yunnan Power Grid Co., Ltd.,Measurement Center,Kunming,China"}]},{"given":"Xiyan","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Beihang University,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2024.105997"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2024.3353827"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.12781"},{"key":"ref4","article-title":"Data encryption standard","volume":"112","author":"Standard","year":"1999","journal-title":"Federal Information Processing Standards Publication"},{"issue":"2","key":"ref5","first-page":"1","article-title":"Advanced encryption standard","volume":"6","author":"Selent","year":"2010","journal-title":"Rivier Academic Journal"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IFOST.2011.6021216"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/129902.129904"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2307\/2007884"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/978\/1\/012116"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.29207\/resti.v4i4.2165"},{"key":"ref11","first-page":"77","article-title":"Secure deletion of data from magnetic and solid-state memory","volume-title":"Proc. Sixth USENIX Security Symposium","volume":"14","author":"Gutmann"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/bfb0052348"}],"event":{"name":"2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2025,5,5]]},"location":"Compiegne, France","end":{"date-parts":[[2025,5,7]]}},"container-title":["2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11033175\/11033221\/11033469.pdf?arnumber=11033469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:59:56Z","timestamp":1750748396000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11033469\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/cscwd64889.2025.11033469","relation":{},"subject":[],"published":{"date-parts":[[2025,5,5]]}}}