{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:29:02Z","timestamp":1740148142102,"version":"3.37.3"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862052","61972294","61932016","62172307"],"award-info":[{"award-number":["61862052","61972294","61932016","62172307"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Blockchain Core Technology Strategic Research Program of Ministry of Education of China","award":["2020KJ010301"],"award-info":[{"award-number":["2020KJ010301"]}]},{"name":"Special Project on Science and Technology Program of Hubei Province","award":["2020AEA013"],"award-info":[{"award-number":["2020AEA013"]}]},{"DOI":"10.13039\/501100003819","name":"Natural Science Foundation of Hubei Province","doi-asserted-by":"publisher","award":["2020CFA052"],"award-info":[{"award-number":["2020CFA052"]}],"id":[{"id":"10.13039\/501100003819","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010888","name":"Wuhan Municipal Science and Technology Bureau","doi-asserted-by":"publisher","award":["2020010601012187"],"award-info":[{"award-number":["2020010601012187"]}],"id":[{"id":"10.13039\/501100010888","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Foundation of Qinghai Province","award":["2019-ZJ-7065"],"award-info":[{"award-number":["2019-ZJ-7065"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/jsyst.2021.3116134","type":"journal-article","created":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T21:10:29Z","timestamp":1635887429000},"page":"2172-2182","source":"Crossref","is-referenced-by-count":3,"title":["DssP: Efficient Dual-Server Secret Sharing Protocol Based on Password Authentication for Cloud Storage Services"],"prefix":"10.1109","volume":"16","author":[{"given":"Songsong","family":"Zhang","sequence":"first","affiliation":[{"name":"Department of Computer Technology and Application, Qinghai University, Xining, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0472-5378","authenticated-orcid":false,"given":"Xie","family":"Yong","sequence":"additional","affiliation":[{"name":"Department of Computer Technology and Application, Qinghai University, Xining, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1819-9332","authenticated-orcid":false,"given":"Min","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":false,"given":"Debiao","family":"He","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Cyber Security and the Department of Electrical and Computer Engineering, The University of Texas at San Antonio, San Antonio, TX, USA"}]}],"member":"263","reference":[{"volume-title":"Cloud services may become the biggest source of DDoS attacks","year":"2019","author":"Hui","key":"ref1"},{"key":"ref2","article-title":"Amazon S3 availability event"},{"volume-title":"Appengine outage","year":"2008","author":"Wilson","key":"ref3"},{"volume-title":"Payment processor breach may be largest ever","year":"2009","author":"Krebs","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3403954"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2937764"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-63-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046758"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.16"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2510822"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2000.883724"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.01.013"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046758"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.282"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_15"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0232-5"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2000.883724"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45871-7_7"},{"issue":"4","key":"ref23","first-page":"38","article-title":"Multiowner data sharing using block chain","volume-title":"Proc. Special Issue AICTE Sponsored Int. Conf. Data Sci. Big Data Analytics Sustain.","volume":"4","author":"Kanchana","year":"2020"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03332-3_11"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17656-3_1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41579-2_40"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_17"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897872"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MOBISECSERV.2018.8311441"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_13"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61204-1_3"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.30"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/bf00196725"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2721359"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70700-6_2"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76581-5_15"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2553031"},{"key":"ref39","first-page":"1537","article-title":"Birthday, name and bifacial-security: Understanding passwords of Chinese web users","volume-title":"Proc. 28th Secur. Symp. Secur.","volume":"19","author":"Wang","year":"2019"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_6"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2939836"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76581-5_22"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382252"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2850299"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055717"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/9794630\/09598891.pdf?arnumber=9598891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:38:27Z","timestamp":1705019907000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9598891\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":45,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2021.3116134","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"type":"print","value":"1932-8184"},{"type":"electronic","value":"1937-9234"},{"type":"electronic","value":"2373-7816"}],"subject":[],"published":{"date-parts":[[2022,6]]}}}