{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T06:09:49Z","timestamp":1764655789981},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/tifs.2012.2217331","type":"journal-article","created":{"date-parts":[[2012,9,5]],"date-time":"2012-09-05T18:01:36Z","timestamp":1346868096000},"page":"1890-1899","source":"Crossref","is-referenced-by-count":36,"title":["Coding for Trusted Storage in Untrusted Networks"],"prefix":"10.1109","volume":"7","author":[{"given":"Paulo F.","family":"Oliveira","sequence":"first","affiliation":[]},{"given":"Lu\u00edsa","family":"Lima","sequence":"additional","affiliation":[]},{"given":"Tiago T. V.","family":"Vinhoza","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o","family":"Barros","sequence":"additional","affiliation":[]},{"given":"Muriel","family":"Medard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1109\/TIT.1977.1055721","article-title":"A note on Wyner's wiretap channel (Corresp.)","volume":"23","author":"carleial","year":"1977","journal-title":"IEEE Trans Inf Theory"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1006\/jcom.1994.1021"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181950"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881746"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.928538"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2173631"},{"key":"ref11","article-title":"Weakly secure network coding","author":"bhattad","year":"2005","journal-title":"Proc First Workshop Network Coding Theory and Applications (NETCOD '05)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ITWNIT.2009.5158587"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557282"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2090197"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e91-a.10.2720"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref17","first-page":"313","article-title":"Safeguarding cryptographic keys","volume":"48","author":"blakley","year":"1979","journal-title":"Proc Nat Comput Conf"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/ecja.4410690906"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1007\/BFb0052348","author":"rivest","year":"1997","journal-title":"Fast Software Encryption"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2004.833807"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874535"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2009.5409868"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/0471739219"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2188777"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513795"},{"key":"ref8","author":"subramanian","year":"2009","journal-title":"MDS Codes on the Erasure-Erasure Wiretap Channel"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1984.tb00072.x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ref9","article-title":"Secure network coding","author":"cai","year":"2002","journal-title":"Proc IEEE Int Symp Inform Theory (ISIT)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683473"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/BFb0053428","article-title":"Optimal asymmetric encryption","author":"bellare","year":"1995","journal-title":"Proc Advances in Cryptology (EUROCRYPTO'94)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008304703074"},{"key":"ref21","first-page":"783","article-title":"On the security properties of OAEP as an all-or-nothing transform","author":"boyko","year":"1999","journal-title":"Proc of Advances in Cryptology (CRYPTO99)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_12"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04434-2_2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966449"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10206\/6342844\/06295654.pdf?arnumber=6295654","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:50:31Z","timestamp":1633909831000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6295654\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":34,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2012.2217331","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,12]]}}}