{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T11:35:31Z","timestamp":1761824131527,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030234980"},{"type":"electronic","value":"9783030234997"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-23499-7_8","type":"book-chapter","created":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T23:09:30Z","timestamp":1560812970000},"page":"110-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Efficient Traceable and Anonymous Authentication Scheme for Permissioned Blockchain"],"prefix":"10.1007","author":[{"given":"Qianqian","family":"Su","sequence":"first","affiliation":[]},{"given":"Rui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Xue","sequence":"additional","affiliation":[]},{"given":"You","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,14]]},"reference":[{"key":"8_CR1","unstructured":"Fisco. https:\/\/en.wikipedia.org\/wiki\/FISCO"},{"key":"8_CR2","unstructured":"Hyperledger. https:\/\/www.hyperledger.org"},{"key":"8_CR3","unstructured":"Ripple. https:\/\/en.wikipedia.org\/wiki\/Ripple"},{"issue":"2","key":"8_CR4","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s00145-007-9005-7","volume":"21","author":"D Boneh","year":"2008","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptol. 21(2), 149\u2013177 (2008)","journal-title":"J. Cryptol."},{"key":"8_CR5","first-page":"1","volume":"10","author":"P Gope","year":"2015","unstructured":"Gope, P., Hwang, T.: Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst. J. 10, 1\u201310 (2015)","journal-title":"IEEE Syst. J."},{"key":"8_CR6","first-page":"1","volume":"321","author":"D He","year":"2013","unstructured":"He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Inf. Sci. 321, 1\u20136 (2013)","journal-title":"Inf. Sci."},{"key":"8_CR7","unstructured":"Higgins, S.: Inside R3CEV\u2019s plot to bring distributed ledgers to wall street. https:\/\/www.coindesk.com\/r3cev-distributed-ledger-wall-street"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/JIOT.2014.2306673","volume":"1","author":"C Lai","year":"2014","unstructured":"Lai, C., Li, H., Liang, X., Lu, R., Zhang, K., Shen, X.: CPAL: A conditional privacy-preserving authentication with access linkability for roaming service. Internet Things J. IEEE 1, 46\u201357 (2014)","journal-title":"Internet Things J. IEEE"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/TVT.2011.2162864","volume":"61","author":"R Lu","year":"2012","unstructured":"Lu, R., Lin, X., Luan, T.H., Liang, X., Shen, X.: Pseudonym changing at social spots: an effective strategy for location privacy in vanets. Veh. Technol. IEEE Transact. 61, 86\u201396 (2012)","journal-title":"Veh. Technol. IEEE Transact."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Ni, J., Zhang, K., Lin, X., Yang, H., Shen, X.: AMA: Anonymous mutual authentication with traceability in carpooling systems. pp. 1\u20136, May 2016","DOI":"10.1109\/ICC.2016.7511196"},{"key":"8_CR11","unstructured":"Satoshi, N.: A peer-to-peer electronic cash system (2008)"},{"key":"8_CR12","first-page":"1","volume":"13","author":"J Shen","year":"2017","unstructured":"Shen, J., Zhou, T., Chen, X., Li, J., Susilo, W.: Anonymous and traceable group data sharing in cloud computing. IEEE Transact. Inf. Forensics Secur. 13, 1\u20131 (2017)","journal-title":"IEEE Transact. Inf. Forensics Secur."},{"key":"8_CR13","volume-title":"Blockchain: Blueprint for a New Economy","author":"M Swan","year":"2015","unstructured":"Swan, M.: Blockchain: Blueprint for a New Economy. O\u2019Reilly Media, Sebastopol (2015)"},{"issue":"3","key":"8_CR14","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.1007\/s11277-013-1246-1","volume":"73","author":"JL Tsai","year":"2013","unstructured":"Tsai, J.L., Lo, N.W., Wu, T.C.: Secure handover authentication protocol based on bilinear pairings. Wirel. Pers. Commun. 73(3), 1037\u20131047 (2013)","journal-title":"Wirel. Pers. Commun."},{"key":"8_CR15","first-page":"1","volume":"15","author":"D Wang","year":"2016","unstructured":"Wang, D., Wang, P.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Transact. Dependable Secure Comput. 15, 1\u201322 (2016)","journal-title":"IEEE Transact. Dependable Secure Comput."},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"3527","DOI":"10.1002\/sec.1558","volume":"9","author":"F Wu","year":"2016","unstructured":"Wu, F., et al.: A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks: a novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Sec. Commun. Netw. 9, 3527\u20133542 (2016)","journal-title":"Sec. Commun. Netw."},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1109\/TWC.2010.01.081219","volume":"9","author":"G Yang","year":"2010","unstructured":"Yang, G., Huang, Q., Wong, D., Deng, X.: Universal authentication protocols for anonymous wireless communications. Trans. Wireless. Comm. 9, 168\u2013174 (2010)","journal-title":"Trans. Wireless. Comm."},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/TCE.2004.1277867","volume":"50","author":"J Zhu","year":"2004","unstructured":"Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Transact. Consum. Electron. 50, 231\u2013235 (2004)","journal-title":"IEEE Transact. Consum. Electron."}],"container-title":["Lecture Notes in Computer Science","Web Services \u2013 ICWS 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23499-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:04:16Z","timestamp":1687046656000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-23499-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030234980","9783030234997"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23499-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"14 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICWS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Diego, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icws2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icws.org\/2019\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}