{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T20:12:37Z","timestamp":1761855157137,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030016883"},{"type":"electronic","value":"9783030016890"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01689-0_16","type":"book-chapter","created":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T11:22:22Z","timestamp":1537615342000},"page":"194-208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Light Blockchain Communication Protocol for Secure Data Transfer Integrity"],"prefix":"10.1007","author":[{"given":"Jakub","family":"Guziur","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Pawlak","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7596-0813","authenticated-orcid":false,"given":"Aneta","family":"Poniszewska-Mara\u0144da","sequence":"additional","affiliation":[]},{"given":"Bartosz","family":"Wieczorek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,23]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: routing attacks on cryptocurrencies. In: IEEE Symposium on Security and Privacy (SP), pp. 375\u2013392. IEEE (2017)","DOI":"10.1109\/SP.2017.29"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Atighetchi, M., Soule, N., Pal, P., Loyall, J., Sinclair, A., Grant, R.: Safe configuration of TLS connections. In: International Conference on Communications and Network Security (CNS), pp. 415\u2013422. IEEE (2013)","DOI":"10.1109\/CNS.2013.6682755"},{"issue":"2","key":"16_CR3","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1136\/jamia.1996.96236282","volume":"3","author":"R Barrows","year":"1996","unstructured":"Barrows, R., Paul, D.: Privacy, confidentiality, and electronic medical records. J. Am. Med. Inform. Assoc. 3(2), 139\u2013148 (1996)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 1, pp. 647\u2013651. IEEE (2012)","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"16_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2604-9","volume-title":"Blockchain Basics: A Non-Technical Introduction in 25 Steps","author":"D Drescher","year":"2017","unstructured":"Drescher, D.: Blockchain Basics: A Non-Technical Introduction in 25 Steps. Apress, Frankfurt am Main (2017)"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Elkeelany, O., et al.: Performance analysis of IPSec protocol: encryption and authentication. In: IEEE International Conference on Communications, vol. 2, pp. 1164\u20131168. IEEE (2002)","DOI":"10.1109\/ICC.2002.997033"},{"key":"16_CR7","unstructured":"Gerck, E.: Overview of certification systems: X.509 (2000). http:\/\/www.mcg.org.br\/cert.htm"},{"key":"16_CR8","unstructured":"ISO\/IEC. Information technology - security techniques - information security management systems - requirements (2005)"},{"key":"16_CR9","volume-title":"Network Security: Private Communication in a Public World","author":"C Kaufman","year":"2002","unstructured":"Kaufman, C., Perlman, R., Speciner, M.: Network Security: Private Communication in a Public World. Prentice Hall Press, Upper Saddle River (2002)"},{"issue":"1","key":"16_CR10","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MWC.2010.5416350","volume":"17","author":"M Li","year":"2010","unstructured":"Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1), 51\u201358 (2010)","journal-title":"IEEE Wirel. Commun."},{"key":"16_CR11","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-319-48478-5_4","volume-title":"Business Innovation Through Blockchain","author":"Vincenzo Morabito","year":"2017","unstructured":"Morabito, V.: The security of blockchain systems. In: Business Innovation Through Blockchain, pp. 61\u201378 (2017)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Nyrkov, A., Sokolov, S., Chernyi, S., Chernyakov, A., Karpina, A.: Providing the integrity and availability in the process of data transfer in the electronic documents management systems of transport-logistical clusters. In: 2nd International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM), Chelyabinsk, Russia (2016)","DOI":"10.1109\/ICIEAM.2016.7910915"},{"key":"16_CR13","unstructured":"Poniszewska-Maranda, A., Pawelska, J., Majchrzycka, A.: Selected aspects of security mechanisms for transactions in bitcoin virtual commerce. In: Software Engineering Research for the Practice, pp. 91\u2013104 (2017)"},{"key":"16_CR14","unstructured":"Poornachandran, P., Soman, K.P., Vinayakumar, R.: Evaluating shallow and deep networks for secure shell (SSH) traffic analysis. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India (2017)"},{"key":"16_CR15","unstructured":"Rescorla, E.: HTTP Over TLS (2000). https:\/\/tools.ietf.org\/html\/rfc2818"},{"key":"16_CR16","unstructured":"Rescorla, E.: The transport layer security (TLS) protocol version 1.3 (2018). https:\/\/tools.ietf.org\/html\/draft-ietf-tls-tls13-26"},{"issue":"6","key":"16_CR17","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s12599-017-0506-0","volume":"59","author":"M Risius","year":"2017","unstructured":"Risius, M., Spohrer, K.: A blockchain research framework - what we (don\u2019t) know, where we go from here, and how we will get there. Bus. Inf. Syst. Eng. 59(6), 385\u2013409 (2017)","journal-title":"Bus. Inf. Syst. Eng."},{"key":"16_CR18","unstructured":"Saarinen, O., Aumasson, J.P.: The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC) (2012)"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Sasikala, C., Bindu, C.S.: A study on remote data integrity checking techniques in cloud. In: International Conference on Public Key Infrastructure and its Applications (PKIA), Bangalore, India (2017)","DOI":"10.1109\/PKIA.2017.8278959"},{"key":"16_CR20","unstructured":"Satoshi, N.: Bitcoin: a peer-to-peer electronic cash system (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"16_CR21","unstructured":"Vimalachandran, P., Wang, H., Zhang, Y., Heyward, B., Whittaker, F.: Ensuring data integrity in electronic health records: a quality health care implication. In: International Conference on Orange Technologies (ICOT), Melbourne, Australia, pp. 557\u2013564. IEEE (2018)"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Li, L., Chen, Y., Chen, Z.: An approach to verifying data integrity for cloud storage. In: 13th International Conference on Computational Intelligence and Security, Hong Kong, China (2017)","DOI":"10.1109\/CIS.2017.00135"},{"key":"16_CR23","unstructured":"Ylonen, T., Lonvick, C.: The secure shell (SSH) protocol architecture (2006). https:\/\/www.ietf.org\/rfc\/rfc4251.txt"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Zikratov, I., Kuzmin, A., Akimenko, V., Niculichev, V., Yalansky, L.: Ensuring data integrity using blockchain technology. In: 20th Conference of Open Innovations Association (FRUCT), St. Petersburg, Russia (2017)","DOI":"10.23919\/FRUCT.2017.8071359"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01689-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T19:52:23Z","timestamp":1752004343000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01689-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030016883","9783030016890"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01689-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amalfi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/css2018.di.unisa.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}