{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T13:23:20Z","timestamp":1774877000131,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,9,22]],"date-time":"2008-09-22T00:00:00Z","timestamp":1222041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002809","name":"Generalitat de Catalunya","doi-asserted-by":"publisher","award":["2005 SGR 0446"],"award-info":[{"award-number":["2005 SGR 0446"]}],"id":[{"id":"10.13039\/501100002809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003176","name":"Ministerio de Educaci\u00f3n, Cultura y Deporte","doi-asserted-by":"publisher","award":["TSI2007-65406-C03-01CSD2007-00004"],"award-info":[{"award-number":["TSI2007-65406-C03-01CSD2007-00004"]}],"id":[{"id":"10.13039\/501100003176","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["911NF0410280"],"award-info":[{"award-number":["911NF0410280"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,9,22]]},"DOI":"10.1145\/1460877.1460889","type":"proceedings-article","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T17:33:43Z","timestamp":1254159223000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":666,"title":["Scalable and efficient provable data possession"],"prefix":"10.1145","author":[{"given":"Giuseppe","family":"Ateniese","sequence":"first","affiliation":[{"name":"The Johns Hopkins University"}]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[{"name":"Universitat Rovira i Virgili"}]},{"given":"Luigi V.","family":"Mancini","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Roma \"La Sapienza\""}]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[{"name":"University of California Irvine"}]}],"member":"320","published-online":{"date-parts":[[2008,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA461823"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_10"},{"key":"e_1_3_2_1_4_1","unstructured":"B. Preneel etal NESSIE D21 - performance of optimized implementations of the nessie primitives.  B. Preneel et al. NESSIE D21 - performance of optimized implementations of the nessie primitives."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706031"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/646760.706005"},{"key":"e_1_3_2_1_7_1","series-title":"LNCS","first-page":"114","volume-title":"Proc. of CT-RSA","author":"Black J.","year":"2002","unstructured":"J. Black and P. Rogaway . Ciphers with arbitrary finite domains . In Proc. of CT-RSA , volume 2271 of LNCS , pages 114 -- 130 . Springer-Verlag , 2002 . J. Black and P. Rogaway. Ciphers with arbitrary finite domains. In Proc. of CT-RSA, volume 2271 of LNCS, pages 114--130. Springer-Verlag, 2002."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. of the FOCS '95","author":"Blum M.","year":"1995","unstructured":"M. Blum , W. Evans , P. Gemmell , S. Kannan , and M. Naor . Checking the correctness of memories . In Proc. of the FOCS '95 , 1995 . M. Blum, W. Evans, P. Gemmell, S. Kannan, and M. Naor. Checking the correctness of memories. In Proc. of the FOCS '95, 1995."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/371931.371977"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/506309.506310"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.68"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. of Conference on Integrity and Internal Control in Information Systems (IICIS'03)","author":"Deswarte Y.","year":"2003","unstructured":"Y. Deswarte , J.-J. Quisquater , and A. Saidane . Remote integrity checking . In Proc. of Conference on Integrity and Internal Control in Information Systems (IICIS'03) , November 2003 . Y. Deswarte, J.-J. Quisquater, and A. Saidane. Remote integrity checking. In Proc. of Conference on Integrity and Internal Control in Information Systems (IICIS'03), November 2003."},{"key":"e_1_3_2_1_14_1","volume-title":"IFIP DBSec'03, also in Journal of Computer Security","author":"Devanbu P.","unstructured":"P. Devanbu , M. Gertz , C. Martel , and S. Stubblebine . Authentic third-party data publication . In IFIP DBSec'03, also in Journal of Computer Security , Vol. 11 , No. 3, pages 291--314, 2003, 2003. P. Devanbu, M. Gertz, C. Martel, and S. Stubblebine. Authentic third-party data publication. In IFIP DBSec'03, also in Journal of Computer Security, Vol. 11, No. 3, pages 291--314, 2003, 2003."},{"key":"e_1_3_2_1_15_1","volume-title":"Demonstrating data possession and uncheatable data transfer. IACR ePrint archive","author":"Filho D. L. G.","year":"2006","unstructured":"D. L. G. Filho and P. S. L. M. Baretto . Demonstrating data possession and uncheatable data transfer. IACR ePrint archive , 2006 . Report 2006\/150, http:\/\/eprint.iacr.org\/2006\/150. D. L. G. Filho and P. S. L. M. Baretto. Demonstrating data possession and uncheatable data transfer. IACR ePrint archive, 2006. Report 2006\/150, http:\/\/eprint.iacr.org\/2006\/150."},{"key":"e_1_3_2_1_16_1","volume-title":"The expanding digital universe: A forecast of worldwide information growth through","author":"Gantz J. F.","year":"2010","unstructured":"J. F. Gantz , D. Reinsel , C. Chute , W. Schlichting , J. McArthur , S. Minton , I. Xheneti , A. Toncheva , and A. Manfrediz . The expanding digital universe: A forecast of worldwide information growth through 2010 . IDC white paper---sponsored by EMC. Technical report, March 2007. http:\/\/www.emc.com\/about\/destination\/digital_universe\/. J. F. Gantz, D. Reinsel, C. Chute, W. Schlichting, J. McArthur, S. Minton, I. Xheneti, A. Toncheva, and A. Manfrediz. The expanding digital universe: A forecast of worldwide information growth through 2010. IDC white paper---sponsored by EMC. Technical report, March 2007. http:\/\/www.emc.com\/about\/destination\/digital_universe\/."},{"key":"e_1_3_2_1_17_1","first-page":"120","volume-title":"Financial Cryptography","author":"Golle P.","year":"2002","unstructured":"P. Golle , S. Jarecki , and I. Mironov . Cryptographic primitives enforcing communication and storage complexity . In Financial Cryptography , pages 120 -- 135 , 2002 . P. Golle, S. Jarecki, and I. Mironov. Cryptographic primitives enforcing communication and storage complexity. In Financial Cryptography, pages 120--135, 2002."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009382.1009729"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"e_1_3_2_1_22_1","unstructured":"A. Juels and B. S. Kaliski. http:\/\/www.rsa.com\/rsalabs\/staff\/bios\/ajuels\/presentations\/Proofs_of_Retrievability_CCS.ppt.  A. Juels and B. S. Kaliski. http:\/\/www.rsa.com\/rsalabs\/staff\/bios\/ajuels\/presentations\/Proofs_of_Retrievability_CCS.ppt."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/356989.357007"},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX'03","author":"Lillibridge M.","year":"2003","unstructured":"M. Lillibridge , S. Elnikety , A. Birrell , M. Burrows , and M. Isard . A cooperative internet backup scheme . In USENIX'03 , 2003 . M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard. A cooperative internet backup scheme. In USENIX'03, 2003."},{"key":"e_1_3_2_1_25_1","volume-title":"ISOC NDSS'04","author":"Mykletun E.","year":"2004","unstructured":"E. Mykletun , M. Narasimha , and G. Tsudik . Authentication and integrity in outsourced databases . In ISOC NDSS'04 , 2004 . E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced databases. In ISOC NDSS'04, 2004."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.71"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/937527.937529"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.80"},{"key":"e_1_3_2_1_30_1","volume-title":"June","author":"Shacham H.","year":"2008","unstructured":"H. Shacham and B. Waters . Compact proofs of retrievability. Cryptology ePrint archive , June 2008 . Report 2008\/073. H. Shacham and B. Waters. Compact proofs of retrievability. Cryptology ePrint archive, June 2008. Report 2008\/073."},{"key":"e_1_3_2_1_31_1","volume-title":"April","author":"Shah M.","year":"2008","unstructured":"M. Shah , R. Swaminathan , and M. Baker . Privacy-preserving audit and extraction of digital contents. Cryptology ePrint archive , April 2008 . Report 2008\/186. M. Shah, R. Swaminathan, and M. Baker. Privacy-preserving audit and extraction of digital contents. Cryptology ePrint archive, April 2008. Report 2008\/186."},{"key":"e_1_3_2_1_32_1","volume-title":"Practical techniques for searches on encrypted data","author":"Song D.","year":"2000","unstructured":"D. Song , D. Wagner , and A. Perrig . Practical techniques for searches on encrypted data . In IEEE S &P'00, 2000 . D. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In IEEE S&P'00, 2000."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502002"},{"key":"e_1_3_2_1_34_1","volume-title":"USENIX SEC'00","author":"Waldman M.","year":"2000","unstructured":"M. Waldman , A. Rubin , and L. Cranor . PUBLIUS: a robust, tamper-evident, censorship-resistant web publishing system . In USENIX SEC'00 , 2000 . M. Waldman, A. Rubin, and L. Cranor. PUBLIUS: a robust, tamper-evident, censorship-resistant web publishing system. In USENIX SEC'00, 2000."}],"event":{"name":"Securecomm08: Fourth International Conference On Security on Privacy for communication Networks","location":"Istanbul Turkey","acronym":"Securecomm08","sponsor":["Create-Net","INRIA Institut Natl de Recherche en Info et en Automatique","SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 4th international conference on Security and privacy in communication netowrks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460877.1460889","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1460877.1460889","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:43:49Z","timestamp":1750290229000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460877.1460889"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,22]]},"references-count":33,"alternative-id":["10.1145\/1460877.1460889","10.1145\/1460877"],"URL":"https:\/\/doi.org\/10.1145\/1460877.1460889","relation":{},"subject":[],"published":{"date-parts":[[2008,9,22]]},"assertion":[{"value":"2008-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}