{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T22:42:04Z","timestamp":1762641724227},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/tr.2015.2423192","type":"journal-article","created":{"date-parts":[[2015,4,24]],"date-time":"2015-04-24T18:34:20Z","timestamp":1429900460000},"page":"840-851","source":"Crossref","is-referenced-by-count":24,"title":["An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems"],"prefix":"10.1109","volume":"64","author":[{"given":"Shiuan-Tzuo","family":"Shen","sequence":"first","affiliation":[]},{"given":"Hsiao-Ying","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Wen-Guey","family":"Tzeng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874535"},{"key":"ref38","article-title":"An experimental study of the Skype peer-to-peer VoIP system","author":"guha","year":"2006","journal-title":"Proc Int Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420985"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.66"},{"key":"ref37","article-title":"A measurement study of peer-to-peer file sharing systems","author":"saroiu","year":"2002","journal-title":"Proceedings of Multimedia Computing and Networking (MMCN98)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339345"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054295"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133603"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.79"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394538"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866842"},{"key":"ref13","first-page":"693","article-title":"Lt codes-based secure and reliable cloud storage service","author":"cao","year":"2012","journal-title":"Proc 31st IEEE Int Conf Computer Commun (INFOCOM'12)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0314-9"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/978-3-642-00457-5_8","article-title":"Proofs of retrievability via hardness amplification","author":"dodis","year":"2009","journal-title":"Proc Theory of Cryptography Conf (TCC '09)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460889"},{"key":"ref17","first-page":"80","article-title":"Athos: Efficient authentication of outsourced file systems","author":"goodrich","year":"2008","journal-title":"Proc 11th Int'l Conf Information Security (ISC '08)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1456469.1456479"},{"key":"ref19","first-page":"355","article-title":"Enabling public verifiability and data dynamics for storage security in cloud computing","author":"wang","year":"2009","journal-title":"Proc 14th Eur Conf Research in Computer Security (ESORICS'09)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655015"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1145\/1315245.1315318","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"2007","journal-title":"Proc 14th ACM Conf Computer and Commun Security (CCS'07)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.68"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1145\/1315245.1315317","article-title":"Pors, proofs of retrievability for large files","author":"juels","year":"2007","journal-title":"Proc 14th ACM Conf Computer and Commun Security (CCS'07)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866421"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952994"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/978-3-642-25243-3_8","article-title":"Delegable provable data possession for remote data in the clouds","author":"shen","year":"2011","journal-title":"Proc 13th Int Conf Information and Commun Security (ICICS'11)"},{"key":"ref7","first-page":"319","article-title":"Proofs of storage from homomorphic identification protocols","author":"ateniese","year":"2009","journal-title":"Proc 15th Int Conf Theory and Application of Cryptology and Information Security Advances in Cryptology (ASIACRYPT'09)"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1109\/TPDS.2011.252","article-title":"A secure erasure code-based cloud storage system with secure data forwarding","volume":"23","author":"lin","year":"2012","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9129-2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.27"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.183"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.24"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2009.5201385"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382319"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.51"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1456469.1456481"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.57"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/7229405\/07094320.pdf?arnumber=7094320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:03:42Z","timestamp":1642003422000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7094320\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":40,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tr.2015.2423192","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9]]}}}