{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:56:30Z","timestamp":1755795390327,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1109\/wocn.2018.8556130","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T01:00:57Z","timestamp":1543885257000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Forward Secrecy in Authentic and Anonymous Cloud with Time Optimization"],"prefix":"10.1109","author":[{"given":"Muthi","family":"Reddy P.","sequence":"first","affiliation":[]},{"given":"Rekha Rangappa","family":"Dasar","sequence":"additional","affiliation":[]},{"given":"R.","family":"Tanuja","sequence":"additional","affiliation":[]},{"given":"S.H.","family":"Manjula","sequence":"additional","affiliation":[]},{"given":"K.R.","family":"Venugopal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2388446"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2481401"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/TC.2014.2315619","article-title":"Cost-Effective Authentic and Anonymous Data Sharing with Forward secrecy","volume":"64","author":"xinyi","year":"2015","journal-title":"IEEE Transactions on Computers"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2390413"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.1109\/TPDS.2014.2321378","article-title":"Cloud Computing Applications for Smart Grid: A Survey","volume":"26","author":"samaresh","year":"2015","journal-title":"IEEE Transactions on Parallel and Distributed System"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2346023"},{"key":"ref9","first-page":"571586","article-title":"Non Interactive Forward-Secure Threshold Signature without Random Oracles","volume":"28","author":"yu","year":"2012","journal-title":"J Inform Sci Eng"},{"key":"ref1","first-page":"80","article-title":"Secure Data Sharing in Cloud Computing: A Comprehensive Review","volume":"25","author":"muthi","year":"2017","journal-title":"International lournal of Computer (IJC) ISSN 2307&#x2013;4523"}],"event":{"name":"2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN)","start":{"date-parts":[[2018,2,2]]},"location":"Kolkata","end":{"date-parts":[[2018,2,4]]}},"container-title":["2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536335\/8556118\/08556130.pdf?arnumber=8556130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T03:31:29Z","timestamp":1643254289000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8556130\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/wocn.2018.8556130","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}