{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:32:20Z","timestamp":1725733940877},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/pst.2014.6890954","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T11:43:34Z","timestamp":1410349414000},"page":"314-321","source":"Crossref","is-referenced-by-count":2,"title":["Efficient verification of data encryption on cloud servers"],"prefix":"10.1109","author":[{"given":"Keji","family":"Hu","sequence":"first","affiliation":[]},{"given":"Wensheng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2010","author":"labs","journal-title":"Protecting Your Critical Assets Lessons Learned from Aijoperation Aurora","key":"3"},{"year":"2011","key":"2"},{"year":"2002","author":"cox","journal-title":"The Openssl Project","key":"10"},{"year":"2013","journal-title":"Target Confirms Unauthorized Access to Payment Card Data in U s Stores","key":"1"},{"key":"7","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1145\/1315245.1315317","article-title":"Pors: Proofs of retrievability for large files","author":"juels","year":"2007","journal-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security Ser CCS '07"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/2382196.2382227"},{"key":"5","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/978-3-642-13190-5_2","article-title":"Fully homomorphic encryption over the integers","author":"van dijk","year":"2010","journal-title":"Advances in Cryptology-EUROCRYPT 2010"},{"year":"2009","author":"gentry","journal-title":"A Fully Homomorphic Encryption Scheme","key":"4"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/1943513.1943546"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/1655008.1655015"}],"event":{"name":"2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2014,7,23]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2014,7,24]]}},"container-title":["2014 Twelfth Annual International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6883276\/6890911\/06890954.pdf?arnumber=6890954","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T16:12:51Z","timestamp":1498147971000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6890954\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/pst.2014.6890954","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}