{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期部分”:[[2024,12]],“日期时间”:“2024-01-12T23:46:15Z”,“时间戳”:1705103175070},“引用-计数”:13,“发布者”:“Elsevier BV”,“问题”:“2”,“许可证”:[{“开始”:“日期部分-01T00:00:00Z“,“时间戳”:1138752000000},“content-version”:“tdm”,“delay-in-days”:0,“URL”:“https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/”},{“start”:{“date-parts”:[[2013,7,17]],“date-time”:“2013-07-17T00:00:00Z”,“timestamp”:1374019200000},“content-version”:“vor”,“delay-in-days”:2723,“URL”:“http://\/www.elsevier.com/”/open-access\/userlicense\/1.0\/“}],”内容域“:{”域“:[],“crossmark-restriction”:false},“short-container-title”:[“Information and Calculation”],“published-print”:{“date-parts”:[[2006,2]},”DOI“:”10.1016\/j.ic.2005.11.001“,”type“:”journal-article“,”created“:{”date-part“:[[2006,1,7]],”date-time“:”2006-01-07T12:21:54Z“,”timestamp“:1136636514000}”,“page”:“291-337”,“source”:“交叉参考”,“is-referenced-by-count”:8,“title”:[“获得历史独立性的上下限”],“prefix”:“10.1016”,“volume”:“204”,“author”:[{“给定”:“Niv”,“family”:“Buchbinder”,“sequence”:“first”,“affiliation”:[]},{“given”::“10.1016\/j.ic.2005.11.001_bib1”,“doi-asserted-by”:“crossref”,“unstructured”:“A.Andersson,T.Ottmann,Faster uniquely resentative dictionarys,in:《第32届IEEE计算机科学基础研讨会论文集》,1991年,第642\u2013649页。”,“doi”:“10.1109\/SFCS.1991.185430”},{“key”:“101016\/j.ic.005.11.01_bib”,“doi-asserted-by”:“crossref”,“unstructured”:“M.Bellare,O.Goldreich,S.Goldwasser,Incremental cryptography and application to virus protection,in:第27届年度ACM计算机理论研讨会论文集,1995年,第45\u201356页。”,“DOI”:“10.1145\/225058.225080”},{“key”:“101016\/j.ic.2005.11.001_bib3”,“DOI-asserted-by”:“crostref”,“非结构化”:“N。Buchbinder,E.Petrank,《获得历史独立性的下限和上限》,载于:《第23届国际密码会议论文集》(CRYPTO 2003),2003年,第445\u2013462页。“,”DOI“:”10.1007\/978-3-540-45146-4_26“},{“key”:“10.1016\/j.ic.2005.11.001_bib4”,“series-title”:“算法简介”,“author”:“Cormen”,“year”:“1992年“},{“key”:“10.1016\/j.ic.2005.11.001_bib5”,“doi-asserted-by”:“crossref”,“首页”:“269”,“doi”:“101007\/BF01386390”,“article-title”:“关于图的两个问题的注释”,“volume”:”1“,”author“:”Dijkstra“,”year“1959”,”journal-title“:”Numerische Mathematik“}”,{”key“:”10.1016\/j.ic.2005.11.001_bb6“,”doi-asserted-by“:”crossref“,”非结构化”:“J.D.Hartline,E.S.Hong,A.E.Mohr,W.R.Pentney,E.C.Roke,《描述与历史无关的数据结构》,ISAAC,2002年,第229\u2013240页。”,“DOI”:“10.1007\/3-540-36136-7_21”},{“issue”:“1”,“key”:“101016\/J.ic.2005.11.001_bib7”,“DOI-asserted-by”:“crossref”,“first page”:”86“,“DOI:”10.1016\/0022-0000(89)90034-2“,”article-title“:”Making data structures persistent“,”volume“:”38“,”author“:”Driscoll“,”year“:”1989“,”journal-title”:“journal of Computer and System Sciences”},{“key”:“10.1016\/j.ic.2005.11.001_bib8”,“doi-serted-by”:“crossref”,“first page”:”701“,”doi“:”10.1145\/355588.365103“,”article-title“”:“Algorithm 245(TREESORT)”,“volume”:第7“,“作者”:“Floyd“,”year“:”1964“,”journal-title“:”ACM的通信“},{“key”:“10.1016\/j.ic.2005.11.001_bib9”,“doi-asserted-by”:“crossref”,“unstructured”:“D.Micciancio,《遗忘数据结构:密码学应用》,载于:第29届ACM计算理论研讨会论文集,1997年,第456\u2013464页。”,“doi”:“101145\/258533.258638”},}“”issue“:”3“,”key“:”10.1016\/j.ic.2005.11.001_bib10“,”doi-asserted-by“:”crossref“,”first page“:“431”,“doi”:“10.1145\/233551.233553”,“article-title”:“不经意闸板的软件保护和模拟”,“volume”:“43”,“author”:“Goldreich”,“year”:“1996”,“journal-title“:”journal of the ACM“},{“key”:”10.116\/j.ic.2005.11.0 01_bib11“,”doi-asserted-by“:”crossref“,”unstructured“:”M.Naor,V.Teague,Anti-persistence:history independent data structures,in:《第33届ACM计算理论研讨会论文集》,2001年。“,”DOI“:”10.1145\/380752.380844“},{“key”:“10.1016\/j.ic.2005.11.001_bib12”,“DOI-asserted-by”:“crossreff”,“first page”:”1389“,”DOI“:“10.1002\/j.1538-7305.1957.tb01515.x”,“article-title“:”最短连接网络和一些泛化“,”volume“:”36“,”author“:”Prim“,”year“:”1957“,”journal-title”:“Bell System Technical journal”},{“key”:“10.1016\/j.ic.2005.11.001_bib13”,“first page”:”347“,“article-title”:“Algorithm 232(HEAPSORT)”,“volume”:ACM的通信“}],”container-title“:[”Information and Computation“],”original-title”:[],”language“:”en“,”link“:[{”URL“:”https:\/\/api.elsevier.com/content\/article\/PII:S0890540105001896?httpAccept=text\/xml“,”content-type“:”text\/xml“,”content-version“:”vor“,”intended-application“:”text-mining“},”{“URL”:“”https:\/\/api.elsevier.com\/content\/article\/PII:S08890540105001896?httpAccept=text\/plain“,”content-type“:”text\/prain“,“content-version”:“vor”,“intended-application”:“text-mining”}],“deposed”:{“date-parts”:[[2020,4,12],“date-time”:“2020-04-12T00:32:48Z”,“timestamp”:1586651568000},“score”:1,“resource”:{primary“URL”:“https:\\/linkinghub.elsevier.com/retrieve\/pii\/S08905 40105001896“}},”副标题“:[],”shorttitle“:[],”issued“:{”date-parts“:[[2006,2]]},”references-count“:13,”journal-issue“:{“issue”:“2”,”published-print“:{”date-ports“:[[2006,2]]}},“alternative-id”:[“S0890540105001896”],“URL”:“http://\/dx.doi.org\/10.10016\/j.ic.2005.11.001”,“relation”:{}、“ISSN”:[”0890-5401“],”ISSN-type“:[{”value“:”0890-5401“,”type“:”print“}],”subject“:[],“发布了“:{“date-parts”:[[2006,2]}}}