{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:38:27Z","timestamp":1767184707728,"version":"build-2238731810"},"reference-count":0,"publisher":"Inderscience Publishers","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJGUC"],"published-print":{"date-parts":[[2016]]},"DOI":"10.1504\/ijguc.2016.080186","type":"journal-article","created":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T07:30:09Z","timestamp":1478590209000},"page":"184","source":"Crossref","is-referenced-by-count":3,"title":["The verifiable secure schemes for resisting attacks in cloud deduplication services"],"prefix":"10.1504","volume":"7","author":[{"given":"Xuan","family":"Li","sequence":"first","affiliation":[]},{"given":"Yongluo","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"378","container-title":["International Journal of Grid and Utility Computing"],"original-title":[],"language":"en","deposited":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T07:30:22Z","timestamp":1478590222000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.inderscience.com\/link.php?id=80186"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":0,"aliases":["10.1504\/ijguc.2016.10000991"],"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016]]}},"URL":"https:\/\/doi.org\/10.1504\/ijguc.2016.080186","relation":{},"ISSN":["1741-847X","1741-8488"],"issn-type":[{"value":"1741-847X","type":"print"},{"value":"1741-8488","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"article-number":"80186"}}