{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:14:46Z","timestamp":1730272486628,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,7]]},"DOI":"10.1109\/iscc.2008.4625600","type":"proceedings-article","created":{"date-parts":[[2008,9,18]],"date-time":"2008-09-18T19:09:41Z","timestamp":1221764981000},"page":"304-309","source":"Crossref","is-referenced-by-count":0,"title":["Efficient disk encryption and verification through trusted nonce"],"prefix":"10.1109","author":[{"family":"Fangyong Hou","sequence":"first","affiliation":[]},{"family":"Dawu Gu","sequence":"additional","affiliation":[]},{"family":"Nong Xiao","sequence":"additional","affiliation":[]},{"family":"Zhiping Cai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/35037.35059"},{"year":"0","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-007-0046-1"},{"journal-title":"CBC + Elephant diffiuser A Disk Encryption Algorithm for Windows Vista Bitlocker","year":"2006","author":"niels ferguson","key":"13"},{"key":"14","first-page":"3","volume":"2","year":"0","journal-title":"IEEE P1619 1"},{"key":"11","first-page":"79","article-title":"unifying file system protection","author":"stein","year":"2001","journal-title":"2001 USENIX Annual Technical Conference"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/IWIAS.2003.1192462"},{"key":"3","first-page":"122","article-title":"protocols for public key cryptography","author":"merkle","year":"1980","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.24"},{"article-title":"hardware mechanisms for memory integrity checking","year":"2003","author":"suh","key":"1"},{"key":"10","article-title":"how to build a trusted database system on untrusted storage","author":"maheshwari","year":"2000","journal-title":"4th USENIX Symposium on Operationg System Design and Implementation"},{"journal-title":"Microsoft Security Model for the Next-Generation Secure Computing","year":"0","key":"7"},{"journal-title":"Tripwire","year":"0","key":"6"},{"article-title":"cryptfs: a stackable vnode level encryption file system","year":"1998","author":"zadok","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2003.1183547"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.2001.990070"},{"journal-title":"Fast and secure distributed read-only file system","year":"2000","author":"fu","key":"8"}],"event":{"name":"2008 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2008,7,6]]},"location":"Marrakech","end":{"date-parts":[[2008,7,9]]}},"container-title":["2008 IEEE Symposium on Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4607772\/4625572\/04625600.pdf?arnumber=4625600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T15:43:40Z","timestamp":1489765420000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4625600\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iscc.2008.4625600","relation":{},"subject":[],"published":{"date-parts":[[2008,7]]}}}