{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:53:48Z","timestamp":1729626828143,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/uemcon.2016.7777905","type":"proceedings-article","created":{"date-parts":[[2016,12,12]],"date-time":"2016-12-12T20:35:39Z","timestamp":1481574939000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["Secuirity in cloud storage: An enhanced technique of data storage in cloud using RNS"],"prefix":"10.1109","author":[{"given":"Atreyee","family":"Kar","sequence":"first","affiliation":[]},{"given":"Kathakali","family":"Sur","sequence":"additional","affiliation":[]},{"given":"Suman","family":"Godara","sequence":"additional","affiliation":[]},{"given":"Santanu","family":"Basak","sequence":"additional","affiliation":[]},{"given":"Dipta","family":"Mukherjee","sequence":"additional","affiliation":[]},{"given":"Aninda Sankar","family":"Sukla","sequence":"additional","affiliation":[]},{"given":"Rupayan","family":"Das","sequence":"additional","affiliation":[]},{"given":"Ritwika","family":"Choudhury","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1974.223790"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2003.1231911"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cdt:20060059"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.60"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.1997.680542"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/12.980018"},{"key":"ref16","first-page":"36","article-title":"Adaptive beamformingusingRNSarithmetic","author":"kirsch","year":"1993","journal-title":"Computer Arithmetic"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1973.5009159"},{"journal-title":"Residue Number SystemArithmetic Modern Applications in Digital Signal Processing","year":"1986","author":"soderstrand","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0997-4"},{"key":"ref4","article-title":"Above the clouda: A Berkeley view of cloud computing","author":"armbrust","year":"0","journal-title":"Technical Report"},{"journal-title":"Reference deployment models for eliminating user concerns on cloud&#x201D;","year":"2010","author":"zhao","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1145\/1315245.1315318","article-title":"Provable Data Possession at Untrusted Stores","author":"ateniese","year":"2007","journal-title":"Proc of CCS '07"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.80"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2001.922245"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460889"},{"journal-title":"White Paper on Cloud Computing","year":"2010","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2009.5201385"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0997-4"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"43","DOI":"10.5120\/15792-4551","article-title":"A Proposed Architecture for Residue Number System based 1D 5\/3 Discrete Wavelet Transform using Filter Bank and Lifting Scheme","volume":"90","author":"thakur","year":"2014","journal-title":"International Journal of Computer Applications (0975&#x2013;8887)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1049\/el:20020192"},{"key":"ref23","article-title":"Enhancing Data Storage Security in Cloud Computing Through Steganography","volume":"5","author":"sarkar","year":"2014","journal-title":"International Journal of Security and Networks"}],"event":{"name":"2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","start":{"date-parts":[[2016,10,20]]},"location":"New York City, NY, USA","end":{"date-parts":[[2016,10,22]]}},"container-title":["2016 IEEE 7th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7763653\/7777798\/07777905.pdf?arnumber=7777905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T08:50:31Z","timestamp":1568623831000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7777905\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/uemcon.2016.7777905","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}