{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1361981470166519296.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.1109/tpds.2013.284"}},{"identifier":{"@type":"URI","@value":"http://xplorestaging.ieee.org/ielx7/71/6814303/06658753.pdf?arnumber=6658753"}}],"dc:title":[{"@value":"Secure Deduplication with Efficient and Reliable Convergent Key Management"}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1381981470166519297","@type":"Researcher","foaf:name":[{"@value":"Jin Li"}]},{"@id":"https://cir.nii.ac.jp/crid/1381981470166519299","@type":"Researcher","foaf:name":[{"@value":"Xiaofeng Chen"}]},{"@id":"https://cir.nii.ac.jp/crid/1381981470166519298","@type":"Researcher","foaf:name":[{"@value":"Mingqiang Li"}]},{"@id":"https://cir.nii.ac.jp/crid/1381981470166519300","@type":"Researcher","foaf:name":[{"@value":"Jingwei Li"}]},{"@id":"https://cir.nii.ac.jp/crid/1381981470166519296","@type":"Researcher","foaf:name":[{"@value":"Patrick P.C. Lee"}]},{"@id":"https://cir.nii.ac.jp/crid/1381981470166519301","@type":"Researcher","foaf:name":[{"@value":"Wenjing Lou"}]}],"publication":{"publicationIdentifier":[{"@type":"PISSN","@value":"10459219"}],"prism:publicationName":[{"@value":"IEEE Transactions on Parallel and Distributed Systems"}],"dc:publisher":[{"@value":"Institute of Electrical and Electronics Engineers (IEEE)"}],"prism:publicationDate":"2014-06","prism:volume":"25","prism:number":"6","prism:startingPage":"1615","prism:endingPage":"1625"},"reviewed":"false","dc:rights":["https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html"],"url":[{"@id":"http://xplorestaging.ieee.org/ielx7/71/6814303/06658753.pdf?arnumber=6658753"}],"createdAt":"2013-11-19","modifiedAt":"2022-01-12","relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1360567180028912384","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Verifiable Chebyshev maps‐based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios"}]},{"@id":"https://cir.nii.ac.jp/crid/1360567185351138688","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS"}]}],"dataSourceIdentifier":[{"@type":"CROSSREF","@value":"10.1109/tpds.2013.284"},{"@type":"CROSSREF","@value":"10.1109/tcss.2015.2514088_references_DOI_3J20CIKf9alQprDja6lFGhC1nuK"},{"@type":"CROSSREF","@value":"10.1002/cpe.4523_references_DOI_3J20CIKf9alQprDja6lFGhC1nuK"}]}