{"id":"https://openalex.org/W4400943576","doi":"https://doi.org/10.1016/j.csi.2024.103898","title":"Revisiting \u201conline/offline provable data possession\u201d schemes","display_name":"Revisiting \u201conline/offline provable data possession\u201d schemes","publication_year":2024,"publication_date":"2024-07-24","ids":{"openalex":"https://openalex.org/W4400943576","doi":"https://doi.org/10.1016/j.csi.2024.103898"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1016/j.csi.2024.103898","pdf_url":null,"source":{"id":"https://openalex.org/S119630662","display_name":"Computer Standards & Interfaces","issn_l":"0920-5489","issn":["0920-5489","1872-7018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100431356","display_name":"Feng Wang","orcid":"https://orcid.org/0000-0003-0801-8726"},"institutions":[{"id":"https://openalex.org/I83791580","display_name":"Fujian University of Technology","ror":"https://ror.org/03c8fdb16","country_code":"CN","type":"education","lineage":["https://openalex.org/I83791580"]},{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Feng Wang","raw_affiliation_strings":["The Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian, 350007, China","The School of Computer Science and Mathematics, the Fujian Provincial Key Laboratory of Big Data Mining and Applications, Fujian University of Technology, Fuzhou, Fujian, 350118, China"],"affiliations":[{"raw_affiliation_string":"The School of Computer Science and Mathematics, the Fujian Provincial Key Laboratory of Big Data Mining and Applications, Fujian University of Technology, Fuzhou, Fujian, 350118, China","institution_ids":["https://openalex.org/I83791580"]},{"raw_affiliation_string":"The Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian, 350007, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079564012","display_name":"Changlu Lin","orcid":"https://orcid.org/0000-0002-2868-3398"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changlu Lin","raw_affiliation_strings":["The Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian, 350007, China","The School of Mathematics and Statistics, and the Center for Applied Mathematics of Fujian Province, Fujian Normal University, Fuzhou, Fujian, 350007, China"],"affiliations":[{"raw_affiliation_string":"The Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian, 350007, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"The School of Mathematics and Statistics, and the Center for Applied Mathematics of Fujian Province, Fujian Normal University, Fuzhou, Fujian, 350007, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071134021","display_name":"Manli Yuan","orcid":"https://orcid.org/0000-0001-7323-7074"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Manli Yuan","raw_affiliation_strings":["The Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian, 350007, China","The School of Mathematics and Statistics, and the College of Computer and Cyber Security, Fujian Normal University, Fuzhou, Fujian, 350007, China"],"affiliations":[{"raw_affiliation_string":"The Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian, 350007, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"The School of Mathematics and Statistics, and the College of Computer and Cyber Security, Fujian Normal University, Fuzhou, Fujian, 350007, China","institution_ids":["https://openalex.org/I111753288"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100431356"],"corresponding_institution_ids":["https://openalex.org/I83791580","https://openalex.org/I111753288"],"apc_list":{"value":3000,"currency":"USD","value_usd":3000,"provenance":"doaj"},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":85},"biblio":{"volume":"91","issue":null,"first_page":"103898","last_page":"103898"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Security Challenges in Cloud Computing","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Security Challenges in Cloud Computing","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain and Internet of Things Integration","score":0.9911,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/possession","display_name":"Possession (linguistics)","score":0.72898686},{"id":"https://openalex.org/keywords/provable-data-possession","display_name":"Provable Data Possession","score":0.728481},{"id":"https://openalex.org/keywords/remote-data-checking","display_name":"Remote Data Checking","score":0.612037},{"id":"https://openalex.org/keywords/privacy-preserving-computation","display_name":"Privacy-Preserving Computation","score":0.559104},{"id":"https://openalex.org/keywords/searchable-encryption","display_name":"Searchable Encryption","score":0.555533},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure Multi-party Computation","score":0.539287},{"id":"https://openalex.org/keywords/online-and-offline","display_name":"Online and offline","score":0.51561564}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81158155},{"id":"https://openalex.org/C2780193096","wikidata":"https://www.wikidata.org/wiki/Q3543662","display_name":"Possession (linguistics)","level":2,"score":0.72898686},{"id":"https://openalex.org/C2780102126","wikidata":"https://www.wikidata.org/wiki/Q10928179","display_name":"Online and offline","level":2,"score":0.51561564},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40232652},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.05516538},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1016/j.csi.2024.103898","pdf_url":null,"source":{"id":"https://openalex.org/S119630662","display_name":"Computer Standards & Interfaces","issn_l":"0920-5489","issn":["0920-5489","1872-7018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":24,"referenced_works":["https://openalex.org/W1531217702","https://openalex.org/W1653866131","https://openalex.org/W2010507480","https://openalex.org/W2058406610","https://openalex.org/W2102881299","https://openalex.org/W2141347047","https://openalex.org/W2282103651","https://openalex.org/W2310212673","https://openalex.org/W2467335260","https://openalex.org/W2578477031","https://openalex.org/W2579459581","https://openalex.org/W2585855180","https://openalex.org/W2912211337","https://openalex.org/W2995707694","https://openalex.org/W2997037293","https://openalex.org/W2997854921","https://openalex.org/W3113856710","https://openalex.org/W3136156468","https://openalex.org/W3159116648","https://openalex.org/W4205207211","https://openalex.org/W4206805343","https://openalex.org/W4364302695","https://openalex.org/W4365129214","https://openalex.org/W89553247"],"related_works":["https://openalex.org/W931969443","https://openalex.org/W4391375266","https://openalex.org/W4210480003","https://openalex.org/W2748952813","https://openalex.org/W2392139924","https://openalex.org/W2381781572","https://openalex.org/W2350339206","https://openalex.org/W2310251353","https://openalex.org/W2161280172","https://openalex.org/W2093968286"],"abstract_inverted_index":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4400943576","counts_by_year":[],"updated_date":"2024-11-22T14:46:42.554908","created_date":"2024-07-25"}