{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T14:07:18Z","timestamp":1725631638382},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,15]],"date-time":"2019-04-15T00:00:00Z","timestamp":1555286400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1743064, 1717948, 1750704"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,15]]},"DOI":"10.1145\/3302505.3310074","type":"proceedings-article","created":{"date-parts":[[2019,3,25]],"date-time":"2019-03-25T12:18:36Z","timestamp":1553516316000},"page":"118-129","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["VERID"],"prefix":"10.1145","author":[{"given":"Xin","family":"Li","sequence":"first","affiliation":[{"name":"University of California Santa Cruz"}]},{"given":"Minmei","family":"Wang","sequence":"additional","affiliation":[{"name":"University of California Santa Cruz"}]},{"given":"Shouqian","family":"Shi","sequence":"additional","affiliation":[{"name":"University of California Santa Cruz"}]},{"given":"Chen","family":"Qian","sequence":"additional","affiliation":[{"name":"University of California Santa Cruz"}]}],"member":"320","published-online":{"date-parts":[[2019,4,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2004. Intel Lab Data. http:\/\/db.csail.mit.edu\/labdata\/labdata.html. 2004. Intel Lab Data. http:\/\/db.csail.mit.edu\/labdata\/labdata.html."},{"key":"e_1_3_2_1_2_1","unstructured":"2015. https:\/\/github.com\/herumi\/ate-pairing. 2015. https:\/\/github.com\/herumi\/ate-pairing."},{"key":"e_1_3_2_1_3_1","unstructured":"2015. The 10 Biggest Cloud Outages Of 2015. http:\/\/www.crn.com\/slide-shows\/cloud\/300077635\/the-10-biggest-cloud-outages-of-2015-so-far.htm\/pgno\/0\/2. 2015. The 10 Biggest Cloud Outages Of 2015. http:\/\/www.crn.com\/slide-shows\/cloud\/300077635\/the-10-biggest-cloud-outages-of-2015-so-far.htm\/pgno\/0\/2."},{"key":"e_1_3_2_1_4_1","unstructured":"2015. Secure Hash Standard. http:\/\/csrc.nist.gov\/publications\/fips\/fips180-4\/fips-180-4.pdf. 2015. Secure Hash Standard. http:\/\/csrc.nist.gov\/publications\/fips\/fips180-4\/fips-180-4.pdf."},{"key":"e_1_3_2_1_5_1","unstructured":"2018. https:\/\/www.opensensors.io\/. 2018. https:\/\/www.opensensors.io\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2018. Intel SGX. https:\/\/software.intel.com\/en-us\/sgx. 2018. Intel SGX. https:\/\/software.intel.com\/en-us\/sgx."},{"key":"e_1_3_2_1_7_1","unstructured":"2018. Introducing JSON. https:\/\/www.json.org\/. 2018. Introducing JSON. https:\/\/www.json.org\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2018. libsnark. https:\/\/github.com\/scipr-lab\/libsnark. 2018. libsnark. https:\/\/github.com\/scipr-lab\/libsnark."},{"key":"e_1_3_2_1_9_1","unstructured":"2018. M3 Open Node. https:\/\/www.iot-lab.info\/hardware\/m3\/. 2018. M3 Open Node. https:\/\/www.iot-lab.info\/hardware\/m3\/."},{"key":"e_1_3_2_1_10_1","unstructured":"2018. Navigating a Cloudy Sky: Practical Guidance and the State of Cloud Security. https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/executive-summaries\/es-navigating-cloudy-sky.pdf. 2018. Navigating a Cloudy Sky: Practical Guidance and the State of Cloud Security. https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/executive-summaries\/es-navigating-cloudy-sky.pdf."},{"key":"e_1_3_2_1_11_1","unstructured":"2018. OpenSSL. https:\/\/www.openssl.org\/. 2018. OpenSSL. https:\/\/www.openssl.org\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-014-9182-0"},{"key":"e_1_3_2_1_13_1","unstructured":"Mohannad A. Alswailim Hossam S. Hassanein and Mohammad Zulkernine. 2015. CRAWDAD dataset queensu\/crowd_temperature (v. 2015-11-20): derived from roma\/taxi (v. 2014-07-17). Downloaded from https:\/\/crawdad.org\/queensu\/crowd_temperature\/20151120. Mohannad A. Alswailim Hossam S. Hassanein and Mohammad Zulkernine. 2015. CRAWDAD dataset queensu\/crowd_temperature (v. 2015-11-20): derived from roma\/taxi (v. 2014-07-17). Downloaded from https:\/\/crawdad.org\/queensu\/crowd_temperature\/20151120."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978335"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536349.2536353"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"E. Ben-Sasson A. Chiesa D. Genkin E. Tromer and M. Virza. 2013. SNARKs for C: Verifying program executions succinctly and in zero knowledge. In CRYPTO. E. Ben-Sasson A. Chiesa D. Genkin E. Tromer and M. Virza. 2013. SNARKs for C: Verifying program executions succinctly and in zero knowledge. In CRYPTO.","DOI":"10.1007\/978-3-642-40084-1_6"},{"volume-title":"International Conference on Pairing-Based Cryptography.","author":"Beuchat J.","key":"e_1_3_2_1_18_1"},{"volume-title":"In Proc. of EUROCRYPT.","author":"Boneh D.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441853"},{"volume-title":"IFIP Annual Conference on Data and Applications Security and Privacy.","author":"Cheng W.","key":"e_1_3_2_1_21_1"},{"volume-title":"Proc. of IEEE S&P.","year":"2018","author":"Manuel C.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"K. Chung Y. T. Kalai F. Liu and R. Raz. 2011. Memory delegation. In Crypto. K. Chung Y. T. Kalai F. Liu and R. Raz. 2011. Memory delegation. In Crypto.","DOI":"10.1007\/978-3-642-22792-9_9"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/362384.362685"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090245"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.23"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182826"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236414"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"R. Gennaro C. Gentry and B. Parno. 2010. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Cryptology. R. Gennaro C. Gentry and B. Parno. 2010. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Cryptology.","DOI":"10.1007\/978-3-642-14623-7_25"},{"volume-title":"Proc. of IEEE WF-IoT.","author":"Gerla M.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"e_1_3_2_1_32_1","unstructured":"M. T. Goodrich R. Tamassia and N. Triandopoulos. 2008. Super-efficient verification of dynamic outsourced databases. In CT-RSA. M. T. Goodrich R. Tamassia and N. Triandopoulos. 2008. Super-efficient verification of dynamic outsourced databases. In CT-RSA."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"volume-title":"Proc. of USEIX NSDI.","author":"Gupta T.","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287044"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/253260.253274"},{"key":"e_1_3_2_1_37_1","unstructured":"J. Jonsson K. Moriarty B. Kaliski and A. Rusch. 2016. PKCS# 1: RSA Cryptography Specifications Version 2.2. https:\/\/tools.ietf.org\/html\/rfc8017. (2016). J. Jonsson K. Moriarty B. Kaliski and A. Rusch. 2016. PKCS# 1: RSA Cryptography Specifications Version 2.2. https:\/\/tools.ietf.org\/html\/rfc8017. (2016)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142488"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880022.1880026"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2587242"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"X. Li M. Wang H. Wang Y. Yu and C. Qian. 2019. Toward Secure and Efficient Communication for the Internet of Things. IEEE\/ACM ToN (2019). X. Li M. Wang H. Wang Y. Yu and C. Qian. 2019. Toward Secure and Efficient Communication for the Internet of Things. IEEE\/ACM ToN (2019).","DOI":"10.1109\/TNET.2019.2893249"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063509.2063512"},{"volume-title":"Proc. of CRYPTO.","year":"1987","author":"Merkle R. C.","key":"e_1_3_2_1_43_1"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.908985"},{"key":"e_1_3_2_1_45_1","unstructured":"G. M. Morton. 1966. A computer oriented geodetic data base and a new technique in file sequencing. (1966). G. M. Morton. 1966. A computer oriented geodetic data base and a new technique in file sequencing. (1966)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3035934"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/588011.588037"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687718"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660373"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_13"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"volume-title":"IMA International Conference on Cryptography and Coding.","author":"Schabh\u00fcser L.","key":"e_1_3_2_1_52_1"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465359"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/320263.320276"},{"volume-title":"Proc. of IEEE IWQoS.","author":"Wang C.","key":"e_1_3_2_1_55_1"},{"volume-title":"Proc. of IEEE INFOCOM.","author":"Wang C.","key":"e_1_3_2_1_56_1"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241541"},{"key":"e_1_3_2_1_58_1","unstructured":"G. Wang J. Han C. Qian W. Xi H. Ding Z. Jiang and J. Zhao. 2018. Verifiable smart packaging with passive RFID. IEEE TMC (2018). G. Wang J. Han C. Qian W. Xi H. Ding Z. Jiang and J. Zhao. 2018. Verifiable smart packaging with passive RFID. IEEE TMC (2018)."},{"volume-title":"SICS: Secure In-Cloud Service Function Chaining. arXiv preprint arXiv:1606.07079","year":"2016","author":"Wang H.","key":"e_1_3_2_1_59_1"},{"volume-title":"Proc. of IEEE INFOCOM.","author":"Wang M","key":"e_1_3_2_1_60_1"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559849"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2014.88"},{"volume-title":"Proc. of IEEE S&P.","author":"Zhang Y.","key":"e_1_3_2_1_64_1"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813711"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381913.2381927"}],"event":{"name":"IoTDI '19: International Conference on Internet-of-Things Design and Implementation","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","IEEE CS"],"location":"Montreal Quebec Canada","acronym":"IoTDI '19"},"container-title":["Proceedings of the International Conference on Internet of Things Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3302505.3310074","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3302505.3310074","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T16:33:32Z","timestamp":1673195612000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3302505.3310074"}},"subtitle":["towards verifiable IoT data management"],"short-title":[],"issued":{"date-parts":[[2019,4,15]]},"references-count":66,"alternative-id":["10.1145\/3302505.3310074","10.1145\/3302505"],"URL":"https:\/\/doi.org\/10.1145\/3302505.3310074","relation":{},"subject":[],"published":{"date-parts":[[2019,4,15]]},"assertion":[{"value":"2019-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}