{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:36Z","timestamp":1740099156825,"version":"3.37.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000141"},{"type":"electronic","value":"9783030000158"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00015-8_48","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T12:14:23Z","timestamp":1536754463000},"page":"553-562","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Design of Mobile Phone Privacy Protection Based on Block Chain"],"prefix":"10.1007","author":[{"given":"Kun","family":"Yang","sequence":"first","affiliation":[]},{"given":"Mingzhe","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yaming","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"issue":"2018","key":"48_CR1","first-page":"395","volume":"82","author":"MA Khan","year":"2017","unstructured":"Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82(2018), 395\u2013411 (2017)","journal-title":"Future Gener. Comput. Syst."},{"issue":"99","key":"48_CR2","doi-asserted-by":"publisher","first-page":"14757","DOI":"10.1109\/ACCESS.2017.2730843","volume":"5","author":"Q Xia","year":"2017","unstructured":"Xia, Q., Sifah, E.B., Asamoah, K.O., et al.: MeDShare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5(99), 14757\u201314767 (2017)","journal-title":"IEEE Access"},{"issue":"2017","key":"48_CR3","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/j.pmcj.2017.05.006","volume":"42","author":"L Maccari","year":"2017","unstructured":"Maccari, L., Facchi, N., Baldesi, L.: Optimized P2P streaming for wireless distributed networks. Pervasive Mob. Comput. 42(2017), 335\u2013350 (2017)","journal-title":"Pervasive Mob. Comput."},{"issue":"2017","key":"48_CR4","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.comnet.2017.08.001","volume":"127","author":"CC Hu","year":"2017","unstructured":"Hu, C.C., Lai, C.F., Hou, J.G.: Timely scheduling algorithm for P2P streaming over MANETs. Comput. Netw. 127(2017), 56\u201367 (2017)","journal-title":"Comput. Netw."},{"issue":"2","key":"48_CR5","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/info8020044","volume":"8","author":"Q Xia","year":"2017","unstructured":"Xia, Q., Sifah, E., Smahi, A., Amofa, S., Xiaosong, Z.: BBDS: blockchain-based data sharing for electronic medical records in cloud environments. Information 8(2), 44 (2017)","journal-title":"Information"},{"issue":"3","key":"48_CR6","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s12599-017-0467-3","volume":"59","author":"N Michael","year":"2017","unstructured":"Michael, N., Peter, G., Oliver, H., Dirk, S.: Blockchain. Bus. Inf. Syst. Eng. 59(3), 183\u2013187 (2017)","journal-title":"Bus. Inf. Syst. Eng."},{"issue":"2018","key":"48_CR7","first-page":"850","volume":"78","author":"H Huang","year":"2016","unstructured":"Huang, H., Chen, X., Wu, Q., et al.: Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener. Comput. Syst. 78(2018), 850\u2013858 (2016)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"48_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S1353-4858(17)30011-9","volume":"2017","author":"C Yuan","year":"2017","unstructured":"Yuan, C., Xu, M.X., Si, X.M.: Research on a new signature scheme on blockchain. Secur. Commun. Netw. 2017(2), 1\u201310 (2017)","journal-title":"Secur. Commun. Netw."},{"issue":"4","key":"48_CR9","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1016\/j.clsr.2017.03.016","volume":"33","author":"C Sullivan","year":"2017","unstructured":"Sullivan, C., Burger, E.: E-residency and blockchain. Comput. Law Secur. Rev. 33(4), 470\u2013481 (2017)","journal-title":"Comput. Law Secur. Rev."},{"key":"48_CR10","doi-asserted-by":"crossref","unstructured":"Yan, Z., Gan, G., Riad, K.: BC-PDS: protecting privacy and self-sovereignty through BlockChains for OpenPDS. In: 11th International Symposium on Service-Oriented System Engineering. IEEE Computer Society, San Francisco (2017)","DOI":"10.1109\/SOSE.2017.30"},{"key":"48_CR11","doi-asserted-by":"crossref","unstructured":"Azaria, A., Ariel, E., Thiago, V., Andrew, Li.: MedRec: using blockchain for medical data access and permission management. In: 2nd International Conference on Open and Big Data. IEEE Computer Society, Vienna (2016)","DOI":"10.1109\/OBD.2016.11"},{"key":"48_CR12","doi-asserted-by":"crossref","unstructured":"Bozic, N., Pujolle, G., Secci, S.: A tutorial on blockchain and applications to secure network control-planes. In: 3rd Smart Cloud Networks and Systems, pp. 1\u20138. IEEE Computer Society, Dubai (2016)","DOI":"10.1109\/SCNS.2016.7870552"},{"key":"48_CR13","doi-asserted-by":"crossref","unstructured":"Huh, S., Cho, S., Kim, S.: Managing IoT devices using blockchain platform. In: International Conference on Advanced Communications Technology, pp. 464\u2013467. IEEE Computer Society, Bongpyeong-myeon, Korea (South) (2017)","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"48_CR14","doi-asserted-by":"crossref","unstructured":"Teslya, N., Ryabchikov, I.: Blockchain-based platform architecture for industrial IoT. In: Proceeding of the 21st Conference of FRUCT Association, pp. 321\u2013329. IEEE Xplore, Helsinki (2017)","DOI":"10.23919\/FRUCT.2017.8250199"},{"key":"48_CR15","first-page":"87","volume":"38","author":"L Hao","year":"2017","unstructured":"Hao, L., Lianming, Z., Wenhua, H.: Topology optimization algorithm based on resource sharing gravitation in P2P network. J. Chin. Comput. Syst. 38, 87\u201391 (2017)","journal-title":"J. Chin. Comput. Syst."},{"issue":"12","key":"48_CR16","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/MCOM.2017.1700879","volume":"55","author":"A Dorri","year":"2017","unstructured":"Dorri, A., Steger, M., Kanhere, S.S., et al.: BlockChain: a distributed solution to automotive security and privacy. IEEE Commun. Mag. 55(12), 119\u2013125 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"6","key":"48_CR17","doi-asserted-by":"publisher","first-page":"1832","DOI":"10.1109\/JIOT.2017.2740569","volume":"4","author":"A Lei","year":"2017","unstructured":"Lei, A., Cruickshank, H., Cao, Y., et al.: Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J. 4(6), 1832\u20131843 (2017)","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00015-8_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T23:50:58Z","timestamp":1571874658000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00015-8_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000141","9783030000158"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00015-8_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}