{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T13:06:01Z","timestamp":1746536761379},"reference-count":14,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icde.2004.1320028","type":"proceedings-article","created":{"date-parts":[[2004,9,28]],"date-time":"2004-09-28T09:50:22Z","timestamp":1096365022000},"page":"572-583","source":"Crossref","is-referenced-by-count":6,"title":["Hiding data accesses in steganographic file system"],"prefix":"10.1109","author":[{"family":"Xuan Zhou","sequence":"first","affiliation":[]},{"family":"HweeHwa Pang","sequence":"additional","affiliation":[]},{"family":"Kian-Lee Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"ACM","year":"2000","author":"kubiatowicz","key":"ref10"},{"key":"ref11","first-page":"294","article-title":"Private information storage","author":"ostrovsky","year":"1997","journal-title":"Proceedings of the 29th Annual ACM Symposium on Theory of Computing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2003.1260829"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167260"},{"key":"ref14","first-page":"7","article-title":"Traffic analysis: Protocols, attacks, design issues and open problems","author":"raymond","year":"2000","journal-title":"ICSI"},{"journal-title":"FIPS 180&#x2013;2","article-title":"Secure Hashing Algorithm. National Institute of Science and Technology","year":"2001","key":"ref4"},{"journal-title":"FIPS-197","article-title":"Advanced Encryption Standard. National Institute of Science and Technology","year":"2001","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-49380-8_6","article-title":"The steganographic file system","author":"anderson","year":"1998","journal-title":"International Workshop in Information Hiding"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-48000-6_21"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1006\/jnca.2000.0110"},{"journal-title":"Drivecrypt secure hard disk encryption","year":"0","key":"ref2"},{"journal-title":"The DataGrid Project","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"}],"event":{"name":"Proceedings. 20th International Conference on Data Engineering","acronym":"ICDE-04","location":"Boston, MA, USA"},"container-title":["Proceedings. 20th International Conference on Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9217\/29235\/01320028.pdf?arnumber=1320028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T06:25:53Z","timestamp":1497594353000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1320028\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icde.2004.1320028","relation":{},"subject":[]}}