{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:44:29Z","timestamp":1751093069298,"version":"3.41.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/icc.2017.7997106","type":"proceedings-article","created":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T20:39:10Z","timestamp":1501533550000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["IPOR: An efficient IDA-based proof of retrievability scheme for cloud storage systems"],"prefix":"10.1109","author":[{"given":"Yuhan","family":"Li","sequence":"first","affiliation":[]},{"given":"Anmin","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Gongxuan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1145\/1315245.1315317","article-title":"PORs; Proofs of retrievability for large files","author":"jules","year":"2007","journal-title":"Proc CCS'07"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9129-2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364056"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1145\/3014812.3014890","article-title":"Certificateless Public Verification Scheme with Privacy-preserving and Message Recovery for Dynamic Group","author":"huang","year":"2017","journal-title":"Proc ACSW'17"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1513","DOI":"10.1109\/TIFS.2015.2416688","article-title":"Privacy-preserving public auditing for regenerating-code-based cloud storage","volume":"10","author":"liu","year":"2015","journal-title":"IEEE Trans on Information Forensics and Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2423192"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2299807"},{"journal-title":"The java pairing based cryptography library (jpbc) Benchmark","year":"0","key":"ref19"},{"key":"ref4","first-page":"2353","article-title":"Privacy-Preserving Public Auditing for Multiple Managers Shared Data in the Cloud","volume":"52","author":"fu","year":"2015","journal-title":"Journal of Computer research and development"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1145\/1315245.1315318","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"2007","journal-title":"Proc CCS'07"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460889"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.68"},{"key":"ref8","first-page":"2334","article-title":"Privacy-preserving public auditing for dynamic group based on hierarchical tree","volume":"53","author":"huang","year":"2016","journal-title":"Journal of Computer research and development"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2577036"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511323"},{"key":"ref9","first-page":"355","article-title":"Enabling public verifiability and data dynamics for storage security in cloud computing","author":"wang","year":"2009","journal-title":"Proc ESORICS '09"}],"event":{"name":"ICC 2017 - 2017 IEEE International Conference on Communications","start":{"date-parts":[[2017,5,21]]},"location":"Paris, France","end":{"date-parts":[[2017,5,25]]}},"container-title":["2017 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7985734\/7996317\/07997106.pdf?arnumber=7997106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T19:15:47Z","timestamp":1750792547000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7997106\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icc.2017.7997106","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}