{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:37Z","timestamp":1738777237003,"version":"3.37.0"},"reference-count":7,"publisher":"Academy Publisher","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.11.2892-2904","type":"journal-article","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T01:56:03Z","timestamp":1414979763000},"source":"Crossref","is-referenced-by-count":0,"title":["Pollution-Free Regenerating Codes With Fast Reconstruction Verification for Verifiable Cloud Storage"],"prefix":"10.4304","volume":"9","author":[{"given":"Juan","family":"C. Corena","sequence":"first","affiliation":[]},{"given":"Tomoaki","family":"Ohtsuki","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[1969,12,31]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054295"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831485"},{"key":"ref4","first-page":"109","article-title":"Proofs of Retrievability via Hardness Amplification.","volume-title":"Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography (TCC 09)","author":"Dodis","year":"2009","unstructured":"[11] Y. Dodis, S. Vadhan, and D. Wichs. Proofs of Retrievability via Hardness Amplification. In Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography (TCC '09), Springer-Verlag, Berlin, Heidelberg, 109-127, 2009."},{"key":"ref5","first-page":"783","article-title":"\"Coding constructions for blacklisting problems without computational assumptions,\" in Advances in Cryptology CRYPTO 99, ser.","author":"Kumar","year":"1999","unstructured":"[13] R. Kumar, S. Rajagopalan, and A. Saha, \"Coding constructions for blacklisting problems without computational assumptions,\" in Advances in Cryptology CRYPTO 99, ser. Lecture Notes in Computer Science, pp. 783\u2013783, 1999.","journal-title":"Lect Notes Comput Sci","ISSN":"https:\/\/id.crossref.org\/issn\/0302-9743","issn-type":"print"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177731363"},{"key":"ref7","volume-title":"Combinatorial group testing and its applications","author":"Ding Zhu","year":"1993","unstructured":"[20] D. Ding Zhu, and F. Hwang. \"Combinatorial group testing and its applications\". World Scientific, 1993."}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:08:28Z","timestamp":1738775308000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1969,12,31]]},"references-count":7,"journal-issue":{"issue":"11","published-online":{"date-parts":[[1969,12,31]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.11.2892-2904","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[1969,12,31]]}}}