{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T04:09:52Z","timestamp":1768968592613,"version":"3.49.0"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/tsc.2013.2295611","type":"journal-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T17:52:31Z","timestamp":1391190751000},"page":"92-106","source":"Crossref","is-referenced-by-count":251,"title":["Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud"],"prefix":"10.1109","volume":"8","author":[{"given":"Boyang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Baochun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866842"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460889"},{"key":"ref30","first-page":"514","article-title":"Short Signatures from the Weil Pairing","author":"boneh","year":"2001","journal-title":"Proc Seventh Int?l Conf the Theory and Application of Cryptology and Information Security Advances in Cryptology (ASIACRYPT?01)"},{"key":"ref36","first-page":"279","article-title":"Dynamic Proofs of Retrievability via Oblivious RAM","author":"cash","year":"2013","journal-title":"Proc 32nd Ann Int?l Conf Theory and Applications of Cryptographic Techniques (EUROCRYPT?13)"},{"key":"ref35","first-page":"584","article-title":"PORs: Proofs of Retrievability for Large Files","author":"juels","year":"2007","journal-title":"Proc 14th Conf Computer and Comm Security (CCS?07)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682701"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.51"},{"key":"ref11","first-page":"693","article-title":"LT Codes-Based Secure and Reliable Cloud Storage Service","author":"cao","year":"2012","journal-title":"Proc IEEE InfoCom"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2484402.2484408"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2012.35"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.46"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435400"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/978-3-642-31284-7_30","article-title":"Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud","author":"wang","year":"2012","journal-title":"Proc 10th Int?l Conf Applied Cryptography and Network Security (ACNS?12)"},{"key":"ref17","first-page":"127","article-title":"Divertible Protocols and Atomic Proxy Cryptography","author":"blaze","year":"1998","journal-title":"Proc International Conf on the Theory and Applications of Cryptographic Techniques (EUROCRYPT"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654808"},{"key":"ref28","year":"0"},{"key":"ref4","first-page":"90","article-title":"Compact Proofs of Retrievability","author":"shacham","year":"2008","journal-title":"Proc 14th Int?l Conf Theory and Application of Cryptology and Information Security Advances in Cryptology (ASIACRYPT?08)"},{"key":"ref27","year":"0"},{"key":"ref3","first-page":"598","article-title":"Provable Data Possession at Untrusted Stores","author":"ateniese","year":"2007","journal-title":"Proc 14th ACM Conf Computer and Comm Security (CCS?07)"},{"key":"ref6","first-page":"355","article-title":"Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing","author":"wang","year":"2009","journal-title":"Proc 14th European Conf Research in Computer Security (ESORICS?09)"},{"key":"ref29","year":"0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2009.5201385"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982514"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.24"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567101"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.60"},{"key":"ref22","first-page":"310","article-title":"Proxy Re-signatures: New Definitions, Algorithms and Applications","author":"ateniese","year":"2005","journal-title":"Proc 12th ACM Conf Computer and Comm Security (CCS?05)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935065"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.331"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1145\/2382196.2382227","article-title":"Hourglass Schemes: How to Prove That Cloud Files are Encrypted","author":"van dijk","year":"2012","journal-title":"Proc ACM Conf Computer and Comm Security (CCS?12)"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/2414456.2414507","article-title":"CL-PRE: A Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with Public Cloud","author":"xu","year":"2012","journal-title":"Proc Seventh ACM Symp Information Computer and Comm Security (ASIACCS?12)"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/978-3-642-00862-7_21","article-title":"Practical Short Signature Batch Verification","author":"ferrara","year":"2009","journal-title":"Proc Cryptographers? Track at the RSA Conf Topics in Cryptology (CT-RSA?09)"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/7029726\/06690209.pdf?arnumber=6690209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T05:02:35Z","timestamp":1688965355000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6690209\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":36,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2013.2295611","relation":{},"ISSN":["1939-1374"],"issn-type":[{"value":"1939-1374","type":"print"}],"subject":[],"published":{"date-parts":[[2015,1]]}}}