{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:42:59Z","timestamp":1762004579986,"version":"build-2065373602"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/ntms.2014.6814002","type":"proceedings-article","created":{"date-parts":[[2014,5,16]],"date-time":"2014-05-16T22:40:53Z","timestamp":1400280053000},"page":"1-7","source":"Crossref","is-referenced-by-count":41,"title":["A Secure Client Side Deduplication Scheme in Cloud Storage Environments"],"prefix":"10.1109","author":[{"given":"Nesrine","family":"Kaaniche","sequence":"first","affiliation":[]},{"given":"Maryline","family":"Laurent","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCAS.2010.5581996"},{"key":"16","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/2484313.2484340","article-title":"Weak leakage-resilient client-side deduplication of encrypted data in cloud storage","author":"xu","year":"2013","journal-title":"Proceedings of the 8th ACM SIGSAC Symposium on Information Computer and Communications Security ASIA CCS 13"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1456469.1456471"},{"journal-title":"The Openssl Project","year":"2003","key":"14"},{"key":"11","first-page":"369","article-title":"A digital signature based on a conventional encryption function","author":"merkle","year":"1988","journal-title":"A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology CRYPTO 87"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2245361"},{"key":"3","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/2414456.2414504","article-title":"Boosting efficiency and security in proof of ownership for deduplication","author":"di pietro","year":"2012","journal-title":"Proceedings of the 7th ACM Symposium on Information Computer and Communications Security ASIACCS 12"},{"journal-title":"On the Implementation of Pairing-based Cryptosystems","year":"2007","author":"ben","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.187"},{"journal-title":"Foundations of Cryptography Basic Tools","year":"2000","author":"goldreich","key":"7"},{"journal-title":"GNU Multiple Precision Arithmetic Library 4 1 2","year":"2002","key":"6"},{"key":"5","article-title":"Understanding data deduplication ratios","author":"dutch","year":"2008","journal-title":"SNIA White Paper"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022312"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2003","author":"hankerson","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046765"}],"event":{"name":"2014 6th International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2014,3,30]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2014,4,2]]}},"container-title":["2014 6th International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6812500\/6813963\/06814002.pdf?arnumber=6814002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T13:21:55Z","timestamp":1498137715000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6814002\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ntms.2014.6814002","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}