{"id":"https://openalex.org/W2758297442","doi":"https://doi.org/10.1007/978-3-319-68527-4_8","title":"Comments on Yu et al\u2019s Shared Data Integrity Verification Protocol","display_name":"Comments on Yu et al\u2019s Shared Data Integrity Verification Protocol","publication_year":2017,"publication_date":"2017-09-23","ids":{"openalex":"https://openalex.org/W2758297442","doi":"https://doi.org/10.1007/978-3-319-68527-4_8","mag":"2758297442"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-68527-4_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-68527-4_8","pdf_url":null,"source":{"id":"https://openalex.org/S2764905038","display_name":"Advances in intelligent systems and computing","issn_l":"2194-5357","issn":["2194-5357","2194-5365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Intelligent Systems and Computing","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077673436","display_name":"Tsu\u2010Yang Wu","orcid":"https://orcid.org/0000-0001-8970-2452"},"institutions":[{"id":"https://openalex.org/I83791580","display_name":"Fujian University of Technology","ror":"https://ror.org/03c8fdb16","country_code":"CN","type":"education","lineage":["https://openalex.org/I83791580"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tsu-Yang Wu","raw_affiliation_strings":["Fujian Provincial Key Lab of Big Data Mining and Applications, Fujian University of Technology, Fuzhou, 350118, China","National Demonstration Center for Experimental Electronic Information and Electrical Technology Education, Fujian University of Technology, Fuzhou, 350118, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Lab of Big Data Mining and Applications, Fujian University of Technology, Fuzhou, 350118, China","institution_ids":["https://openalex.org/I83791580"]},{"raw_affiliation_string":"National Demonstration Center for Experimental Electronic Information and Electrical Technology Education, Fujian University of Technology, Fuzhou, 350118, China","institution_ids":["https://openalex.org/I83791580"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008634525","display_name":"Yueshan Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yueshan Lin","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology - Shenzhen, Shenzhen, 518055, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology - Shenzhen, Shenzhen, 518055, China","institution_ids":["https://openalex.org/I158809036","https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036470946","display_name":"King-Hang Wang","orcid":"https://orcid.org/0000-0002-4475-7596"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"King-Hang Wang","raw_affiliation_strings":["Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068618830","display_name":"Chien\u2010Ming Chen","orcid":"https://orcid.org/0000-0002-6502-472X"},"institutions":[{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chien-Ming Chen","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology - Shenzhen, Shenzhen, 518055, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology - Shenzhen, Shenzhen, 518055, China","institution_ids":["https://openalex.org/I158809036","https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019810689","display_name":"Jeng\u2010Shyang Pan","orcid":"https://orcid.org/0000-0002-3128-9025"},"institutions":[{"id":"https://openalex.org/I83791580","display_name":"Fujian University of Technology","ror":"https://ror.org/03c8fdb16","country_code":"CN","type":"education","lineage":["https://openalex.org/I83791580"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jeng-Shyang Pan","raw_affiliation_strings":["Fujian Provincial Key Lab of Big Data Mining and Applications, Fujian University of Technology, Fuzhou, 350118, China","Fujian University of Technology, Fuzhou, Fujian, China","National Demonstration Center for Experimental Electronic Information and Electrical Technology Education, Fujian University of Technology, Fuzhou, 350118, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Lab of Big Data Mining and Applications, Fujian University of Technology, Fuzhou, 350118, China","institution_ids":["https://openalex.org/I83791580"]},{"raw_affiliation_string":"Fujian University of Technology, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I83791580"]},{"raw_affiliation_string":"National Demonstration Center for Experimental Electronic Information and Electrical Technology Education, Fujian University of Technology, Fuzhou, 350118, China","institution_ids":["https://openalex.org/I83791580"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5077673436"],"corresponding_institution_ids":["https://openalex.org/I83791580"],"apc_list":null,"apc_paid":null,"fwci":0.9096,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.77282261,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"73","last_page":"78"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7543896436691284},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.6281394958496094},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5997779369354248},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5938098430633545},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.524518609046936},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5043338537216187},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.48216480016708374},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.41401752829551697}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7543896436691284},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.6281394958496094},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5997779369354248},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5938098430633545},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.524518609046936},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5043338537216187},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.48216480016708374},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.41401752829551697},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-319-68527-4_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-68527-4_8","pdf_url":null,"source":{"id":"https://openalex.org/S2764905038","display_name":"Advances in intelligent systems and computing","issn_l":"2194-5357","issn":["2194-5357","2194-5365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Intelligent Systems and Computing","raw_type":"book-chapter"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-88693","is_oa":false,"landing_page_url":"http://repository.hkust.edu.hk/ir/Record/1783.1-88693","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5799999833106995,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W798567151","https://openalex.org/W1987504295","https://openalex.org/W1994788755","https://openalex.org/W1995571756","https://openalex.org/W2041547341","https://openalex.org/W2080212406","https://openalex.org/W2080488820","https://openalex.org/W2137291214","https://openalex.org/W2152924492","https://openalex.org/W2258229734","https://openalex.org/W2656881249","https://openalex.org/W3046668262","https://openalex.org/W3046733265"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W4312814274","https://openalex.org/W2906845177","https://openalex.org/W4200107511","https://openalex.org/W2891427086","https://openalex.org/W2573831620","https://openalex.org/W1968625315"],"abstract_inverted_index":null,"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
