{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T06:53:34Z","timestamp":1757573614763,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/iccchina.2016.7636866","type":"proceedings-article","created":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T20:23:33Z","timestamp":1477340613000},"page":"1-6","source":"Crossref","is-referenced-by-count":13,"title":["Secure outsourced data transfer with integrity verification in cloud storage"],"prefix":"10.1109","author":[{"given":"Jianbing","family":"Ni","sequence":"first","affiliation":[]},{"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Kuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xuemin Sherman","family":"Shen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848154"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.199"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516699"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2423684"},{"journal-title":"Cloudsfer","article-title":"Migrate & backup your files from any cloud to any cloud","year":"2015","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2015.44"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"ref4","article-title":"7 critical cloud service attributes","author":"chang","year":"2014","journal-title":"Information Week Network Computing"},{"journal-title":"Cisco white paper","article-title":"Cisco global cloud index: forecast and methodology, 2013-2018","year":"2014","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5510914"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2535728"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2371239"},{"journal-title":"Cloud Security Alliance","article-title":"Top threats to cloud computing","year":"2010","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2406704"},{"key":"ref1","article-title":"NIST cloud computing program","author":"mell","year":"2009","journal-title":"NIST"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.87"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_34"},{"key":"ref22","first-page":"413","article-title":"Remark on the threshold RSA signature scheme","volume":"773","author":"li","year":"1993","journal-title":"Proc Crypto 1993"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_17"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054122"}],"event":{"name":"2016 IEEE\/CIC International Conference on Communications in China (ICCC)","start":{"date-parts":[[2016,7,27]]},"location":"Chengdu, China","end":{"date-parts":[[2016,7,29]]}},"container-title":["2016 IEEE\/CIC International Conference on Communications in China (ICCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7592393\/7636714\/07636866.pdf?arnumber=7636866","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,16]],"date-time":"2016-11-16T14:43:21Z","timestamp":1479307401000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7636866\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iccchina.2016.7636866","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}