{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T18:33:09Z","timestamp":1768588389957,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,6,20]],"date-time":"2016-06-20T00:00:00Z","timestamp":1466380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation","award":["NRF2015-NCR- NCR002-001"],"award-info":[{"award-number":["NRF2015-NCR- NCR002-001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,6,20]]},"DOI":"10.1145\/2909827.2930795","type":"proceedings-article","created":{"date-parts":[[2016,6,10]],"date-time":"2016-06-10T13:57:38Z","timestamp":1465567058000},"page":"69-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation"],"prefix":"10.1145","author":[{"given":"Hung","family":"Dang","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Yun Long","family":"Chong","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Francois","family":"Brun","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Ee-Chien","family":"Chang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2016,6,20]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455526.1455531"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655024"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_16"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_16"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1760749.1760788"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00862-7_9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653678"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.112"},{"key":"e_1_3_2_1_11_1","unstructured":"C.-K. Chu S. S. M. Chow W.-G. Tzeng J. Zhou and R. H. Deng. Supplementary material for key-aggregate cryptosystem for scalable data sharing in cloud storage 2014.  C.-K. Chu S. S. M. Chow W.-G. Tzeng J. Zhou and R. H. Deng. Supplementary material for key-aggregate cryptosystem for scalable data sharing in cloud storage 2014."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590342"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/188105.188198"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_15_1","unstructured":"J. A. Hartigan. Clustering algorithms. 1975.   J. A. Hartigan. Clustering algorithms. 1975."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516241.1516350"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1982.1163863"},{"key":"e_1_3_2_1_18_1","volume-title":"PKC.","author":"Hohenberger S.","year":"2013"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.23"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"S. A. Manavski and G. Valle. Cuda compatible gpu cards as efficient hardware accelerators for smith-waterman sequence alignment. BMC bioinformatics 2008.  S. A. Manavski and G. Valle. Cuda compatible gpu cards as efficient hardware accelerators for smith-waterman sequence alignment. BMC bioinformatics 2008.","DOI":"10.1186\/1471-2105-9-S2-S10"},{"key":"e_1_3_2_1_21_1","first-page":"4120","article-title":"The kerberos network authentication service (v5)","author":"Neuman C.","year":"2005","journal-title":"RFC"},{"key":"e_1_3_2_1_22_1","volume-title":"ACSC","author":"Pirzada A. A.","year":"2004"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/16.1.30"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"T. F. Smith and M. S. Waterman. Identification of common molecular subsequences. Journal of molecular biology 1981.  T. F. Smith and M. S. Waterman. Identification of common molecular subsequences. Journal of molecular biology 1981.","DOI":"10.1016\/0022-2836(81)90087-5"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"key":"e_1_3_2_1_27_1","volume-title":"Networks","author":"Tarjan R. E.","year":"1977"},{"key":"e_1_3_2_1_28_1","volume-title":"CNS","author":"Tong Y.","year":"2013"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.979981"}],"event":{"name":"IH&MMSec '16: ACM Information Hiding and Multimedia Security Workshop","location":"Vigo Galicia Spain","acronym":"IH&MMSec '16","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2909827.2930795","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2909827.2930795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:23Z","timestamp":1750220603000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2909827.2930795"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,20]]},"references-count":27,"alternative-id":["10.1145\/2909827.2930795","10.1145\/2909827"],"URL":"https:\/\/doi.org\/10.1145\/2909827.2930795","relation":{},"subject":[],"published":{"date-parts":[[2016,6,20]]},"assertion":[{"value":"2016-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}