{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:36Z","timestamp":1738777236808,"version":"3.37.0"},"reference-count":7,"publisher":"Academy Publisher","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.8.12.2713-2720","type":"journal-article","created":{"date-parts":[[2013,12,10]],"date-time":"2013-12-10T07:08:09Z","timestamp":1386659289000},"source":"Crossref","is-referenced-by-count":1,"title":["Dynamic Data Possession Checking for Secure Cloud Storage Service"],"prefix":"10.4304","volume":"8","author":[{"given":"Wenzhe","family":"Jiao","sequence":"first","affiliation":[]},{"given":"Guoqing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhengjun","family":"Zhai","sequence":"additional","affiliation":[]},{"given":"Xiaoxue","family":"Ye","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2013,12,10]]},"reference":[{"key":"ref1","first-page":"109","article-title":"Proofs of retrievability via hardness amplification","volume-title":"Proc of TCC 09","author":"Dodis","year":"2009","unstructured":"[7] Y. Dodis, S. Vadhan and D. Wichs, \"Proofs of retrievability via hardness amplification\", Proc. of TCC'09, pp. 109-127, 2009."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.183"},{"key":"ref4","first-page":"584","article-title":"Dynamic provable data possession","volume-title":"Proc CCS 07","author":"Erway","year":"2006","unstructured":"[12] C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, \"Dynamic provable data possession\", Proc. CCS'07, pp. 584\u2013597, 2006."},{"key":"ref5","first-page":"290","article-title":"An improved dynamic provable data possession model","volume-title":"Proc of IEEE CCIS 2011","author":"Liu","year":"2011","unstructured":"[13] F. Liu, D. Gu and H. Lu, \"An improved dynamic provable data possession model\", Proc. of IEEE CCIS 2011, pp. 290-295, 2011"},{"key":"ref6","first-page":"122","article-title":"Protocols for public key cryptosystems","volume-title":"Proc of IEEE Symposium on Security and Privacy","volume":"80","author":"Merkle","year":"1980","unstructured":"[14] R. C. Merkle, \"Protocols for public key cryptosystems\", Proc. of IEEE Symposium on Security and Privacy'80, pp. 122-133, 1980."},{"key":"ref7","first-page":"514","article-title":"Short signatures from the weil pairing","volume-title":"Proc of ASIACRYPT 01","author":"Boneh","year":"2001","unstructured":"[15] D. Boneh, B. Lynn, and H. Shacham, \"Short signatures from the weil pairing\", Proc. of ASIACRYPT'01, London, UK: Springer-Verlag, pp. 514-532, 2001"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:03:55Z","timestamp":1738775035000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,10]]},"references-count":7,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2013,12,10]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.8.12.2713-2720","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2013,12,10]]}}}