{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:52:12Z","timestamp":1730224332725,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/glocomw.2013.6825036","type":"proceedings-article","created":{"date-parts":[[2014,6,17]],"date-time":"2014-06-17T01:53:24Z","timestamp":1402970004000},"page":"494-499","source":"Crossref","is-referenced-by-count":0,"title":["Secured data storage on cloud systems via wavefront multiplexing"],"prefix":"10.1109","author":[{"given":"Donald","family":"Chang","sequence":"first","affiliation":[]},{"given":"Joe","family":"Lee","sequence":"additional","affiliation":[]},{"family":"Hen-Geul Yeh","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Steve K.","family":"Chen","sequence":"additional","affiliation":[]},{"family":"Kung Yao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Novel Karaoke and Multi-Channel Data Recording \/Transmission Techniques Via Wavefront Multiplexing and Demultiplexing","year":"0","key":"17"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503707"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/WTS.2013.6566242"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2013.6504093"},{"journal-title":"Apparatus and the Method for Remote Beam Forming for Satellite Broadcasting Systems","year":"0","key":"14"},{"journal-title":"Communication System for Dynamically Combining Power from A Plurality of Propagation Channels in Order to Improve Power Levels of Transmitted Signals Without Affecting Receiver and Propagation Segment","year":"0","key":"11"},{"year":"0","key":"12"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"key":"1","first-page":"14","article-title":"Understanding cloud computing vulnerabilities","author":"grobauer","year":"2012","journal-title":"IEEE Cloud Computing Magazine"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1080\/19393551003649016"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.232"},{"key":"6","first-page":"127","article-title":"Image based steganography and cryptography","volume":"1","author":"bloisi","year":"2007","journal-title":"Proceedings of the Second International Conference on Computer Vision Theory and Applications"},{"key":"5","first-page":"626","article-title":"Cryptography and steganography-A survey","volume":"2","author":"joseph raphael","year":"2011","journal-title":"International Journal of Computer Applications in Technology"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205898"},{"key":"8","article-title":"Deterministic regenerating codes for distributed storage","author":"wu","year":"2007","journal-title":"Allerton Conference on Control Computing and Communication"}],"event":{"name":"2013 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2013,12,9]]},"location":"Atlanta, GA","end":{"date-parts":[[2013,12,13]]}},"container-title":["2013 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6820092\/6824917\/06825036.pdf?arnumber=6825036","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T20:58:17Z","timestamp":1490302697000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6825036\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2013.6825036","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}