{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:28:48Z","timestamp":1730233728857,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1109\/icccn54977.2022.9868883","type":"proceedings-article","created":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T16:26:54Z","timestamp":1662395214000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["LiTIV: A Lightweight Traceable Data Integrity Verification Scheme for Version Control Systems"],"prefix":"10.1109","author":[{"given":"Xin","family":"Xu","sequence":"first","affiliation":[{"name":"Institute of Information Engineering,State Key Laboratory of Information Security, CAS,Beijing,China,100084"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,State Key Laboratory of Information Security, CAS,Beijing,China,100084"}]},{"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, University of Science and Technology of China,Hefei,China,230026"}]},{"given":"Zhen","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications,Beijing,China,100876"}]},{"given":"Haoling","family":"Fan","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,State Key Laboratory of Information Security, CAS,Beijing,China,100084"}]},{"given":"Qiongxiao","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,State Key Laboratory of Information Security, CAS,Beijing,China,100084"}]}],"member":"263","reference":[{"journal-title":"Sourceforge","year":"0","key":"ref10"},{"journal-title":"Kernel org Linux Repository Rooted in Hack Attack","year":"0","key":"ref11"},{"journal-title":"Breaching fort apache org - what went wrong?","year":"0","key":"ref12"},{"journal-title":"&#x2018;google&#x2019; hackers had ability to alter source code","year":"0","key":"ref13"},{"journal-title":"The linux backdoor attempt of 2003","year":"0","key":"ref14"},{"journal-title":"Code Spaces Destroyed by Cyber Attack","year":"0","key":"ref15"},{"journal-title":"Git v1 7 9 release notes","year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196523"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22312-0_25"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-191371"},{"journal-title":"DropBox","year":"0","key":"ref4"},{"journal-title":"Concurrent Versions System","year":"0","key":"ref3"},{"journal-title":"Mercurial","year":"0","key":"ref6"},{"journal-title":"SharePoint Online","year":"0","key":"ref5"},{"journal-title":"Github","year":"0","key":"ref8"},{"journal-title":"Bitcoin gold critical warning","year":"0","key":"ref7"},{"journal-title":"Apache Subversion","year":"0","key":"ref2"},{"journal-title":"Git","year":"0","key":"ref1"},{"journal-title":"GitLab","year":"0","key":"ref9"},{"key":"ref20","first-page":"379","article-title":"On omitting commits and committing omissions: Preventing git meta-data tampering that (re) introduces software vulnerabilities","author":"torres-arias","year":"2016","journal-title":"25th USENIX Security Symposium ( USENIX Security 16)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35055-0_17"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190547"},{"key":"ref24","first-page":"362","volume":"62","author":"wang","year":"2013","journal-title":"Privacy-preserving Public Auditing for Data Storage Security in Cloud Computing"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238169"}],"event":{"name":"2022 International Conference on Computer Communications and Networks (ICCCN)","start":{"date-parts":[[2022,7,25]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2022,7,28]]}},"container-title":["2022 International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9868842\/9868856\/09868883.pdf?arnumber=9868883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T17:04:16Z","timestamp":1664211856000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9868883\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icccn54977.2022.9868883","relation":{},"subject":[],"published":{"date-parts":[[2022,7]]}}}