{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:18:29Z","timestamp":1725704309693},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/icnidc.2012.6418752","type":"proceedings-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T17:53:56Z","timestamp":1359568436000},"page":"242-246","source":"Crossref","is-referenced-by-count":3,"title":["Attacks and improvements on Data Integrity as a Service protocols"],"prefix":"10.1109","author":[{"given":"Hui","family":"Xu","sequence":"first","affiliation":[]},{"given":"Rui","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.187"},{"key":"2","first-page":"524","article-title":"Cloud computing - Issues, research and implementations","author":"sengupta","year":"2008","journal-title":"30th International Conference on Information Technology Interfaces"},{"journal-title":"Diffe-hellman Key Exchange","year":"0","key":"10"},{"journal-title":"Above the Clouds A Berkeley View of Cloud Computing","year":"2009","author":"armbust","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"},{"key":"6","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1145\/1315245.1315317","article-title":"Pors: Proofs of retrievability for large files","author":"juels","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security (CCS '07)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460889"},{"key":"4","first-page":"598","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"0","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security (CCS '07)"},{"key":"9","article-title":"The Ephemerizer: Making data disappear","author":"perlman","year":"2005","journal-title":"Sun Microsystems Whitepaper"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.35"}],"event":{"name":"2012 3rd IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC 2012)","start":{"date-parts":[[2012,9,21]]},"location":"Beijing, China","end":{"date-parts":[[2012,9,23]]}},"container-title":["2012 3rd IEEE International Conference on Network Infrastructure and Digital Content"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6410480\/6418700\/06418752.pdf?arnumber=6418752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T02:42:46Z","timestamp":1498012966000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6418752\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icnidc.2012.6418752","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}