{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:43:22Z","timestamp":1729615402028,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icis.2014.6912119","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T16:27:14Z","timestamp":1412094434000},"page":"125-129","source":"Crossref","is-referenced-by-count":6,"title":["Query integrity verification based-on MAC chain in cloud storage"],"prefix":"10.1109","author":[{"given":"Jun","family":"Hong","sequence":"first","affiliation":[]},{"given":"Tao","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Quan","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Sheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066204"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099604"},{"key":"ref12","article-title":"Server transparent query authentication of outsourced database [j]","volume":"1 28","author":"min","year":"2010","journal-title":"Journal of Computer research and development"},{"key":"ref13","first-page":"135","article-title":"Cads: Continuous authentication on data streams","author":"papadopoulos","year":"2007","journal-title":"Proceedings of the 33rd International Conference on Very Large Data Bases"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1353343.1353384"},{"journal-title":"HMAC Keyed-Hashing for Message Authentication","year":"1997","author":"krawczyk","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460050406"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2010.5588290"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2011.03958"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2004.1320027"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_21"},{"key":"ref8","first-page":"407","article-title":"Super-efficient verification of dynamic outsourced databases","author":"michael","year":"2008","journal-title":"Topics in Cryptology-CT-RSA 2008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142488"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","article-title":"A view of cloud computing","volume":"53","author":"michael","year":"2010","journal-title":"Communications of the ACM"},{"key":"ref9","first-page":"2077","article-title":"Query results authentication of outsourced append-only databases","volume":"49","author":"wen","year":"2012","journal-title":"Journal of Computer research and development"}],"event":{"name":"2014 IEEE\/ACIS 13th International Conference on Computer and Information Science (ICIS)","start":{"date-parts":[[2014,6,4]]},"location":"Taiyuan, China","end":{"date-parts":[[2014,6,6]]}},"container-title":["2014 IEEE\/ACIS 13th International Conference on Computer and Information Science (ICIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6905924\/6912089\/06912119.pdf?arnumber=6912119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:31:26Z","timestamp":1498152686000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6912119\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icis.2014.6912119","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}