{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:16:08Z","timestamp":1740132968508,"version":"3.37.3"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Purdue Cyber Center"},{"name":"US National Science Foundation (NSF)","award":["CNS-1111512","IIS-0964639"],"award-info":[{"award-number":["CNS-1111512","IIS-0964639"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2018,5,1]]},"DOI":"10.1109\/tkde.2017.2776221","type":"journal-article","created":{"date-parts":[[2017,11,22]],"date-time":"2017-11-22T19:24:36Z","timestamp":1511378676000},"page":"866-879","source":"Crossref","is-referenced-by-count":20,"title":["Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases"],"prefix":"10.1109","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0498-6175","authenticated-orcid":false,"given":"Muhammad U.","family":"Arshad","sequence":"first","affiliation":[]},{"given":"Ashish","family":"Kundu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4029-7051","authenticated-orcid":false,"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3707-8173","authenticated-orcid":false,"given":"Arif","family":"Ghafoor","sequence":"additional","affiliation":[]},{"given":"Chinmay","family":"Kundu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-003-1076-8"},{"key":"ref32","first-page":"218","article-title":"A certified digital signature","author":"merkle","year":"1989","journal-title":"Proc Annu Int Cryptology Conf"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.56"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2104"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557564"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2200\/S00431ED1V01Y201207DTM028"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067740"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2365203"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2011.153"},{"article-title":"Amazon web services","year":"2010","author":"amazon","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.drudis.2010.10.003"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10822-011-9438-9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389955"},{"key":"ref18","article-title":"Efficient leakage-free authentication of trees, graphs and forests","volume":"2012","author":"kundu","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453876"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4226"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2013.42"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2409"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.259"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2002.994695"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1996.548510"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1024694.1024697"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2399292"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2401036"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2583425"},{"key":"ref9","first-page":"73","article-title":"Privacy and integrity are possible in the untrusted cloud","volume":"35","author":"feldman","year":"2012","journal-title":"IEEE Data Eng Bull"},{"year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13708-2_6"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1201\/b17668","author":"katz","year":"2014","journal-title":"Introduction to Modern Cryptography"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1739041.1739114"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2246"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/11935230_3"},{"journal-title":"Algorithms (Fourth Edition Deluxe)","year":"2016","author":"sedgewick","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.1999.805073"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/69\/8329400\/8118163-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/8329400\/08118163.pdf?arnumber=8118163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:49:09Z","timestamp":1649443749000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8118163\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,1]]},"references-count":34,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2017.2776221","relation":{},"ISSN":["1041-4347"],"issn-type":[{"type":"print","value":"1041-4347"}],"subject":[],"published":{"date-parts":[[2018,5,1]]}}}