{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T17:40:00Z","timestamp":1771609200399,"version":"3.50.1"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030000653","type":"print"},{"value":"9783030000660","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00066-0_45","type":"book-chapter","created":{"date-parts":[[2018,9,4]],"date-time":"2018-09-04T09:13:51Z","timestamp":1536052431000},"page":"381-385","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Anonymized Distributed PHR Using Blockchain for Openness and Non-repudiation Guarantee"],"prefix":"10.1007","author":[{"given":"David","family":"Mendes","sequence":"first","affiliation":[]},{"given":"Irene","family":"Rodrigues","sequence":"additional","affiliation":[]},{"given":"C\u00e9sar","family":"Fonseca","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Lopes","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Manuel","family":"Garc\u00eda-Alonso","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Berrocal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,5]]},"reference":[{"key":"45_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed, A., Ahmed, E.: A survey on mobile edge computing. In: 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1\u20138, January 2016","DOI":"10.1109\/ISCO.2016.7727082"},{"key":"45_CR2","doi-asserted-by":"crossref","unstructured":"Asano, S., Yashiro, T., Sakamura, K.: Device collaboration framework in IoT-aggregator for realizing smart environment. In: TRON Symposium, December 2016","DOI":"10.1109\/TRONSHOW.2016.7842886"},{"issue":"4","key":"45_CR3","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1145\/571637.571640","volume":"20","author":"M Castro","year":"2002","unstructured":"Castro, M., Liskov, B.: Practical byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20(4), 398\u2013461 (2002)","journal-title":"ACM Trans. Comput. Syst."},{"key":"45_CR4","doi-asserted-by":"crossref","unstructured":"Greenstadt, R., Beal, J.: Cognitive security for personal devices. In: Proceedings of the 1st ACM Workshop on Workshop on AISec, AISec 2008, pp. 27\u201330. ACM, New York (2008)","DOI":"10.1145\/1456377.1456383"},{"key":"45_CR5","unstructured":"Holler, J., Tsiatsis, V., Mulligan, C., Karnouskos, S., Boyle, D.: From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence. Elsevier Science (2014)"},{"issue":"7","key":"45_CR6","doi-asserted-by":"publisher","first-page":"e111","DOI":"10.2196\/mhealth.7938","volume":"5","author":"D Ichikawa","year":"2017","unstructured":"Ichikawa, D., Kashiyama, M., Ueno, T.: Tamper-resistant mobile health using blockchain technology. JMIR Mhealth Uhealth 5(7), e111 (2017)","journal-title":"JMIR Mhealth Uhealth"},{"key":"45_CR7","unstructured":"Iroha. Hyperledger Iroha. Accessed 29 Aug 2017"},{"key":"45_CR8","unstructured":"Jacobovitz, O.: Blockchain for identity management. Technical report, The Lynne and William Frankel Center for Computer Science Department of Computer Science, Ben-Gurion University, Beer Sheva, Israel, December 2016. Technical Report #16-02"},{"key":"45_CR9","unstructured":"Jain, S., Kajal, A.: Effective analysis of risks and vulnerabilities in internet of things. Int. J. Comput. Corp. Res. 5(2) (2015)"},{"key":"45_CR10","doi-asserted-by":"crossref","unstructured":"Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., Njilla, L.: Provchain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: 2017 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pp. 468\u2013477, May 2017","DOI":"10.1109\/CCGRID.2017.8"},{"key":"45_CR11","unstructured":"NASDAQ. Byzantine Fault Tolerance. Accessed 13 Apr 2018"},{"key":"45_CR12","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.eswa.2017.06.027","volume":"87","author":"MI Pramanik","year":"2017","unstructured":"Pramanik, M.I., Lau, R.Y., Demirkan, H., Azad, M.A.K.: Smart health: big data enabled health paradigm within smart cities. Expert Syst. Appl. 87, 370\u2013383 (2017)","journal-title":"Expert Syst. Appl."},{"key":"45_CR13","unstructured":"RegEU. Regulation EU No 910\/2014 of the European parliament and of the council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing directive 1999\/93\/EC (eIDAS regulation) (2014). European union: 4459"}],"container-title":["Lecture Notes in Computer Science","Digital Libraries for Open Knowledge"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00066-0_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,4]],"date-time":"2018-09-04T09:43:28Z","timestamp":1536054208000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00066-0_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000653","9783030000660"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00066-0_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}