{"id":"https://openalex.org/W4416965643","doi":"https://doi.org/10.1109/tdsc.2025.3639688","title":"Collusion-Resistant and Time-Aware Co-Verification for Edge Data Integrity","display_name":"Collusion-Resistant and Time-Aware Co-Verification for Edge Data Integrity","publication_year":2025,"publication_date":"2025-12-03","ids":{"openalex":"https://openalex.org/W4416965643","doi":"https://doi.org/10.1109/tdsc.2025.3639688"},"language":null,"primary_location":{"id":"doi:10.1109/tdsc.2025.3639688","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3639688","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014898958","display_name":"Yao Zhao","orcid":"https://orcid.org/0000-0002-5870-7370"},"institutions":[{"id":"https://openalex.org/I71270174","display_name":"Victoria University","ror":"https://ror.org/04j757h98","country_code":"AU","type":"education","lineage":["https://openalex.org/I71270174"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Yao Zhao","raw_affiliation_strings":["College of Arts, Business, Law, Education, and Information Technology, Victoria University, Melbourne, VIC, Australia","College of Arts, Business, Law, Education, and Information Technology, Victoria University, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"College of Arts, Business, Law, Education, and Information Technology, Victoria University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I71270174"]},{"raw_affiliation_string":"College of Arts, Business, Law, Education, and Information Technology, Victoria University, VIC, Australia","institution_ids":["https://openalex.org/I71270174"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040772796","display_name":"Youyang Qu","orcid":"https://orcid.org/0000-0002-2944-4647"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Youyang Qu","raw_affiliation_strings":["Key Laboratory of Computing Power Network and Information Security, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Ministry of Education, Jinan, China","Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computing Power Network and Information Security, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Ministry of Education, Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]},{"raw_affiliation_string":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100374415","display_name":"Bo Li","orcid":"https://orcid.org/0000-0002-3226-388X"},"institutions":[{"id":"https://openalex.org/I71270174","display_name":"Victoria University","ror":"https://ror.org/04j757h98","country_code":"AU","type":"education","lineage":["https://openalex.org/I71270174"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Bo Li","raw_affiliation_strings":["College of Arts, Business, Law, Education, and Information Technology, Victoria University, Melbourne, VIC, Australia","College of Arts, Business, Law, Education, and Information Technology, Victoria University, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"College of Arts, Business, Law, Education, and Information Technology, Victoria University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I71270174"]},{"raw_affiliation_string":"College of Arts, Business, Law, Education, and Information Technology, Victoria University, VIC, Australia","institution_ids":["https://openalex.org/I71270174"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041529079","display_name":"Lu Zhao","orcid":"https://orcid.org/0000-0001-5172-359X"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lu Zhao","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100404363","display_name":"Feifei Chen","orcid":"https://orcid.org/0000-0001-5455-3792"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Feifei Chen","raw_affiliation_strings":["School of Information Technology, Deakin University, Burwood, VIC, Australia","School of Information Technology, Deakin University, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Information Technology, Deakin University, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051297830","display_name":"Yong Xiang","orcid":"https://orcid.org/0000-0003-3545-7863"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yong Xiang","raw_affiliation_strings":["School of Information Technology, Deakin University, Burwood, VIC, Australia","School of Information Technology, Deakin University, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Information Technology, Deakin University, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012293028","display_name":"Longxiang Gao","orcid":"https://orcid.org/0000-0002-3026-7537"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longxiang Gao","raw_affiliation_strings":["Key Laboratory of Computing Power Network and Information Security, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Ministry of Education, Jinan, China","Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computing Power Network and Information Security, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Ministry of Education, Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]},{"raw_affiliation_string":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5014898958"],"corresponding_institution_ids":["https://openalex.org/I71270174"],"apc_list":null,"apc_paid":null,"fwci":7.2171,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.96983604,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"23","issue":"2","first_page":"3667","last_page":"3680"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.4359000027179718,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.4359000027179718,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.1137000024318695,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.1062999963760376,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.5943999886512756},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5396000146865845},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5325999855995178},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5037999749183655},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.41600000858306885},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.3878999948501587},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.3801000118255615},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.3391000032424927},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.33329999446868896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7774999737739563},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.5943999886512756},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5396000146865845},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5325999855995178},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5037999749183655},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4805000126361847},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.41600000858306885},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.3878999948501587},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.3801000118255615},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3747999966144562},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36559998989105225},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.3391000032424927},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.33329999446868896},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.3301999866962433},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.328900009393692},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.3253999948501587},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3206999897956848},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3068000078201294},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3046000003814697},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2870999872684479},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.2847000062465668},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.2824999988079071},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28209999203681946},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.26899999380111694},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.25690001249313354},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.2540000081062317},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.2515999972820282}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2025.3639688","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3639688","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/30899339","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal contribution"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/30899339","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal contribution"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W2016068847","https://openalex.org/W2043719859","https://openalex.org/W2102881299","https://openalex.org/W2103315535","https://openalex.org/W2578477031","https://openalex.org/W2982516999","https://openalex.org/W2982578497","https://openalex.org/W2998166806","https://openalex.org/W3004055934","https://openalex.org/W3013719659","https://openalex.org/W3036470329","https://openalex.org/W3110587988","https://openalex.org/W3111967092","https://openalex.org/W3132069591","https://openalex.org/W3181129449","https://openalex.org/W3199763178","https://openalex.org/W4226081952","https://openalex.org/W4281668395","https://openalex.org/W4290878311","https://openalex.org/W4293468291","https://openalex.org/W4312858731","https://openalex.org/W4317796730","https://openalex.org/W4327852047","https://openalex.org/W4384519400","https://openalex.org/W4386174973","https://openalex.org/W4387319320","https://openalex.org/W4389509728","https://openalex.org/W4391853594","https://openalex.org/W4395680423","https://openalex.org/W4399205598","https://openalex.org/W4401396935","https://openalex.org/W4403390897","https://openalex.org/W4405182979","https://openalex.org/W4405303665"],"related_works":[],"abstract_inverted_index":{"<underline":[0,3,6,47,50,53,65,68,71,133,137,140,143],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[1,4,7,48,51,54,66,69,72,102,128,134,138,141,144,148,208,215,225,248,262,274,298],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">M</u>obile":[2],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">E</u>dge":[5,49],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">C</u>omputing":[8],"(MEC)":[9],"has":[10],"incentivized":[11],"App":[12],"vendors":[13],"to":[14,20,37,78,105,113,153,174,178,239,284],"outsource":[15],"various":[16],"services":[17],"and":[18,40,136,162,195,201,234,257,280,289,305,314,317,324],"applications":[19],"distributed":[21],"edge":[22,119,155,176,205,295],"nodes":[23,34,177],"for":[24,115],"low":[25],"access":[26],"latency.":[27],"However,":[28,81],"the":[29,84,89,116,199,230,235,254],"data":[30],"cached":[31],"on":[32,61],"these":[33,123],"is":[35,278],"vulnerable":[36],"both":[38],"intentional":[39],"accidental":[41],"corruption,":[42],"necessitating":[43],"periodic":[44],"audits":[45,161],"of":[46,91,118,204,246,260,311,321],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">D</u>ata":[52],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">I</u>ntegrity":[55],"(EDI).":[56],"Existing":[57],"solutions":[58],"either":[59],"rely":[60],"a":[62,100,132,190,213,221],"\u201cfully":[63],"trustworthy\u201d":[64],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">T</u>hird":[67],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">P</u>arty":[70],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">A</u>uditor":[73],"(TPA)":[74],"or":[75],"leverage":[76],"blockchain":[77,173],"enhance":[79,106],"trust.":[80],"they":[82,98,111],"overlook":[83],"security":[85,168],"risks":[86],"brought":[87],"by":[88,108],"use":[90],"blockchain,":[92],"particularly":[93],"collusion":[94,187,258],"attacks.":[95],"Furthermore,":[96],"while":[97,158,185],"employ":[99],"<italic":[101,214],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">challenge-response</i>":[103],"mechanism":[104,218],"efficiency":[107,309,319],"batch":[109,163],"verification,":[110],"fail":[112],"account":[114],"heterogeneity":[117,157,203],"nodes.":[120],"To":[121],"address":[122],"challenges,":[124],"we":[125],"propose":[126],"<inline-formula":[127,147,207,224,247,261,273,297],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[129,149,209,226,249,263,275,299],"notation=\"LaTeX\">$\\mathtt":[130,150,210,264,276,300],"{CTCV}$</tex-math></inline-formula>,":[131,265],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">C</u>ollusion-resistant":[135],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">T</u>ime-aware":[139],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">C</u>ollaborative":[142],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">V</u>erification":[145],"framework.":[146],"{CTCV}$</tex-math></inline-formula>":[151,211,277,301],"aims":[152],"accommodate":[154],"node":[156],"enabling":[159],"public":[160],"verification":[164,196,231],"without":[165,182],"introducing":[166],"additional":[167],"risks.":[169],"Specifically,":[170],"it":[171],"incorporates":[172],"allow":[175],"collaboratively":[179],"verify":[180],"EDI":[181],"trust":[183],"dependencies,":[184],"mitigating":[186],"attacks":[188],"through":[189],"carefully":[191],"designed":[192],"proof":[193,237],"generation":[194],"approach.":[197],"Considering":[198],"resource":[200],"state":[202],"nodes,":[206,296],"employs":[212],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">time-constrained":[216],"challenge-response</i>":[217],"that":[219,272],"sets":[220],"time":[222],"threshold":[223],"notation=\"LaTeX\">$\\mathcal":[227,250],"{T}$</tex-math></inline-formula>":[228],"between":[229],"request":[232],"issuance":[233],"integrity":[236],"inspection":[238],"avoid":[240],"excessive":[241],"delays.":[242],"The":[243],"selection":[244],"guideline":[245],"{T}$</tex-math></inline-formula>,":[251],"along":[252],"with":[253,307],"correctness,":[255],"efficiency,":[256],"resistance":[259],"are":[266],"rigorously":[267],"analyzed.":[268],"Extensive":[269],"experiments":[270],"validate":[271],"computationally":[279],"communicationally":[281],"efficient":[282],"compared":[283],"three":[285],"baselines:":[286],"EdgeWatch,":[287,303],"EDI-S,":[288,304],"EDI-V.":[290],"On":[291],"average,":[292],"given":[293],"10":[294],"outperforms":[302],"EDI-V":[306],"computation":[308],"improvements":[310],"7.9,":[312],"9.0,":[313],"5.0":[315],"times,":[316,326],"communication":[318],"improvement":[320],"2063.0,":[322],"4.8,":[323],"2.6":[325],"respectively.":[327]},"counts_by_year":[{"year":2026,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-12-03T00:00:00"}
