{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:04:46Z","timestamp":1774159486656,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030057633","type":"print"},{"value":"9783030057640","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05764-0_17","type":"book-chapter","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T02:03:24Z","timestamp":1544061804000},"page":"159-166","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":95,"title":["A Dynamic Scalable Blockchain Based Communication Architecture for IoT"],"prefix":"10.1007","author":[{"given":"Han","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Meikang","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Gerard","family":"Memmi","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"Ming","sequence":"additional","affiliation":[]},{"given":"Meiqin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"17_CR1","volume-title":"Mastering Bitcoin: Unlocking Digital Cryptocurrencies","author":"AM Antonopoulos","year":"2014","unstructured":"Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O\u2019Reilly Media Inc., Newton (2014)"},{"issue":"3","key":"17_CR2","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1109\/TBDATA.2016.2597149","volume":"4","author":"W Dai","year":"2018","unstructured":"Dai, W., Qiu, L., Wu, A., Qiu, M.: Cloud infrastructure resource allocation for big data applications. IEEE Trans. Big Data 4(3), 313\u2013324 (2018)","journal-title":"IEEE Trans. Big Data"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for IoT security and privacy: the case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 618\u2013623. IEEE (2017)","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"17_CR4","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: LSB: a lightweight scalable blockchain for IoT security and privacy. arXiv preprint \narXiv:1712.02969\n\n (2017)"},{"issue":"8","key":"17_CR5","doi-asserted-by":"publisher","first-page":"3590","DOI":"10.1109\/TII.2017.2780885","volume":"14","author":"K Gai","year":"2018","unstructured":"Gai, K., Qiu, M.: Blend arithmetic operations on tensor-based fully homomorphic encryption over real numbers. IEEE Trans. Ind. Inform. 14(8), 3590\u20133598 (2018)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"MA Khan","year":"2018","unstructured":"Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395\u2013411 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-63688-7_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"A Kiayias","year":"2017","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357\u2013388. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-63688-7_12"},{"key":"17_CR8","volume-title":"Reinforcement Learning for Cyber Physical Systems with Cybersecurity Case Studies","author":"C Li","year":"2018","unstructured":"Li, C., Qiu, M.: Reinforcement Learning for Cyber Physical Systems with Cybersecurity Case Studies. Chapman & Hall\/CRC, Boca Raton (2018)"},{"issue":"4","key":"17_CR9","first-page":"309","volume":"1","author":"PN Mahalle","year":"2013","unstructured":"Mahalle, P.N., Anggorojati, B., Prasad, N.R., Prasad, R., et al.: Identity authentication and capability based access control (IACAC) for the Internet of Things. J. Cyber Secur. Mobil. 1(4), 309\u2013348 (2013)","journal-title":"J. Cyber Secur. Mobil."},{"key":"17_CR10","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"17_CR11","volume-title":"Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction","author":"A Narayanan","year":"2016","unstructured":"Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S.: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, Princeton (2016)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Qiu, H., Memmi, G., Noura, H.: An efficient secure storage scheme based on information fragmentation. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 108\u2013113. IEEE (2017)","DOI":"10.1109\/CSCloud.2017.44"},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1016\/j.future.2016.01.006","volume":"80","author":"M Qiu","year":"2018","unstructured":"Qiu, M., Gai, K., Thuraisingham, B., Tao, L., Zhao, H.: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Gener. Comput. Syst. 80, 421\u2013429 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-319-39028-4_9","volume-title":"Open Problems in Network Security","author":"M Vukoli\u0107","year":"2016","unstructured":"Vukoli\u0107, M.: The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. In: Camenisch, J., Kesdo\u011fan, D. (eds.) iNetSec 2015. LNCS, vol. 9591, pp. 112\u2013125. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-39028-4_9"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Wu, D., Arkhipov, D.I., Asmare, E., Qin, Z., McCann, J.A.: UbiFlow: mobility management in urban-scale software defined IoT. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 208\u2013216. IEEE (2015)","DOI":"10.1109\/INFOCOM.2015.7218384"},{"issue":"1","key":"17_CR16","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/JSYST.2015.2460747","volume":"11","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Qiu, M., Tsai, C.W., Hassan, M.M., Alamri, A.: Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 11(1), 88\u201395 (2017)","journal-title":"IEEE Syst. J."},{"key":"17_CR17","unstructured":"Zheng, Z., Xie, S., Dai, H.N., Wang, H.: Blockchain challenges and opportunities: a survey. Work Pap.-2016 (2016)"}],"container-title":["Lecture Notes in Computer Science","Smart Blockchain"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05764-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T02:11:23Z","timestamp":1544062283000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05764-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030057633","9783030057640"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05764-0_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SmartBlock","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Blockchain","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tokyo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"smartblock2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"102","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"17% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}