{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T06:09:08Z","timestamp":1769148548879,"version":"3.49.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030325824","type":"print"},{"value":"9783030325831","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-32583-1_11","type":"book-chapter","created":{"date-parts":[[2020,1,28]],"date-time":"2020-01-28T07:04:16Z","timestamp":1580195056000},"page":"245-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Biometric Blockchain: A Secure Solution for Intelligent Vehicle Data Sharing"],"prefix":"10.1007","author":[{"given":"Bing","family":"Xu","sequence":"first","affiliation":[]},{"given":"Tobechukwu","family":"Agbele","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,29]]},"reference":[{"issue":"4","key":"11_CR1","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1109\/TITS.2011.2156406","volume":"12","author":"G Yan","year":"2011","unstructured":"G. Yan, S. Olariu, A probabilistic analysis of link duration in vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 12(4), 1227\u20131236 (2011)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"11_CR2","doi-asserted-by":"publisher","unstructured":"D. Singh, M. Singh, I. Singh, H.J. Lee, Secure and reliable cloud networks for smart transportation services, in The 17th International Conference on Advanced Communication Technology (ICACT 2015), Seoul, 2015, pp. 358\u2013362. \nhttps:\/\/doi.org\/10.1109\/ICACT.2015.7224819","DOI":"10.1109\/ICACT.2015.7224819"},{"issue":"7\u20139","key":"11_CR3","first-page":"1","volume":"11","author":"S Olariu","year":"2011","unstructured":"S. Olariu, M. Eltoweissy, M. Younis, Toward autonomous vehicular clouds. ICST Trans. Mobile Commun. Comput. 11(7\u20139), 1\u201311 (2011)","journal-title":"ICST Trans. Mobile Commun. Comput."},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"C. Wang, Q. Wang, K. Ren, W. Lou, Privacy-preserving public auditing for data storage security in cloud computing, in Proceedings of the IEEE INFOCOM, San Diego, CA, 2010, pp. 1\u20139","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"11_CR5","doi-asserted-by":"publisher","unstructured":"M. Singh, D. Singh, A. Jara, Secure cloud networks for connected & automated vehicles, in 2015 International Conference on Connected Vehicles and Expo (ICCVE, Shenzhen, 2015), pp. 330\u2013335. \nhttps:\/\/doi.org\/10.1109\/ICCVE.2015.94","DOI":"10.1109\/ICCVE.2015.94"},{"key":"11_CR6","unstructured":"S. Nakomoto, Bitcoin: a peer-to-peer electronic cash system (2009). BITCOIN.ORG, p. 3"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Y. Yuan, F.-Y. Wang, Towards blockchainbased intelligent transportation systems, in 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Windsor Oceanico Hotel, Rio de Janerio, Brazil, 1\u20134 Nov 2016","DOI":"10.1109\/ITSC.2016.7795984"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"B. Leiding, P. Memarmoshrefi, D. Hogrefe, Self-managed and blockchain-based vehicular ad-hoc networks, in Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct (UbiComp \u201916) (ACM, New York, 2016), pp. 137\u2013140","DOI":"10.1145\/2968219.2971409"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/MCOM.2017.1700879","volume":"55","author":"A Dorri","year":"2017","unstructured":"A. Dorri, M. Steger, S.S. Kanhere, R. Jurdak, Blockchain: a distributed solution to automotive security and privacy. IEEE Commun. Mag. 55, 119 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"11_CR10","unstructured":"S. Rowan, M. Clear, M. Huggard, C. Mc Goldrick, Securing vehicle to vehicle data sharing using blockchain through visible light and acoustic side-channels, eprint arXiv:1704.02553, 2017"},{"key":"11_CR11","unstructured":"M. Crosby et al., BlockChain technology: beyond bitcoin, Sutardja Center for Entrepreneurship & Technology Technical Report, University of California, Berkeley, 2015"},{"key":"11_CR12","volume-title":"Blockchain: background and policy issues","author":"C Jaikaran","year":"2018","unstructured":"C. Jaikaran, Blockchain: background and policy issues (Congressional Research Service, Washington, DC, 2018)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"H. Kakavand et al., The blockchain revolution: an analysis of regulation and technology related to distributed ledger technologies, Luther Systems & DLA Piper, 2016","DOI":"10.2139\/ssrn.2849251"},{"key":"11_CR14","unstructured":"O. Mazonka et al., Blockchain: simple explanation, J. Ref., 2016, \nhttp:\/\/jrxv.net\/x\/16\/chain.pdf"},{"key":"11_CR15","volume-title":"Blockchain revolution: how the technology behind bitcoin is changing money, business and the world","author":"D Tapscott","year":"2016","unstructured":"D. Tapscott, A. Tapscott, Blockchain revolution: how the technology behind bitcoin is changing money, business and the world (Portfolio Penguin, London, 2016)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"K. Saito, H. Yamada, What\u2019s so different about blockchain? Blockchain is a probabilistic state machine, in IEEE 36th International Conference on Distributed Computing Systems Workshops, Nara, Japan, 2016, pp. 168\u2013175","DOI":"10.1109\/ICDCSW.2016.28"},{"key":"11_CR17","volume-title":"Decentralized applications: harnessing bitcoin\u2019s blockchain technology","author":"S Raval","year":"2016","unstructured":"S. Raval, Decentralized applications: harnessing bitcoin\u2019s blockchain technology (Oreilly, Beijing, 2016). ISBN 9781491924549"},{"key":"11_CR18","volume-title":"Mastering blockchain","author":"I Bashir","year":"2017","unstructured":"I. Bashir, Mastering blockchain (Packet Publishing, Birmingham, 2017)"},{"issue":"4","key":"11_CR19","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MCE.2018.2816299","volume":"7","author":"D Puthal","year":"2018","unstructured":"D. Puthal et al., Everything you wanted to know about the blockchain. IEEE Consum. Electron. Mag. 7(4), 6\u201314 (2018)","journal-title":"IEEE Consum. Electron. Mag."},{"key":"11_CR20","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S0969-4765(18)30067-5","volume":"5","author":"P Garcia","year":"2018","unstructured":"P. Garcia, Biometrics on the blockchain. Biometric Technol. Today 5, 5\u20137 (2018)","journal-title":"Biometric Technol. Today"},{"key":"11_CR21","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.patcog.2017.02.003","volume":"67","author":"R Jiang","year":"2017","unstructured":"R. Jiang et al., Emotion recognition from scrambled facial images via many graph embedding. Pattern Recognit. 67, 245\u2013251 (2017)","journal-title":"Pattern Recognit."},{"issue":"8","key":"11_CR22","doi-asserted-by":"publisher","first-page":"1807","DOI":"10.1109\/TIFS.2016.2555792","volume":"11","author":"R Jiang","year":"2016","unstructured":"R. Jiang et al., Face recognition in the scrambled domain via salience-aware ensembles of many kernels. IEEE Trans. Inf. Forensics Security 11(8), 1807\u20131817 (2016)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"issue":"4","key":"11_CR23","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1109\/TFUZZ.2015.2486803","volume":"24","author":"R Jiang","year":"2016","unstructured":"R. Jiang et al., Privacy-protected facial biometric verification via fuzzy forest learning. IEEE Trans. Fuzzy Syst. 24(4), 779\u2013790 (2016)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"5","key":"11_CR24","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1109\/TSMCC.2010.2050476","volume":"40","author":"R Jiang","year":"2010","unstructured":"R. Jiang et al., Multimodal biometric human recognition for perceptual human\u2013computer interaction. IEEE Trans. Syst. Man Cybern. Part C 40(5), 676 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C"},{"issue":"3","key":"11_CR25","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1109\/TIFS.2010.2051544","volume":"5","author":"R Jiang","year":"2010","unstructured":"R. Jiang et al., Face recognition in global harmonic subspace. IEEE Trans. Inf. Forensics Security 5(3), 416\u2013424 (2010)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"11_CR26","doi-asserted-by":"publisher","first-page":"2219","DOI":"10.1109\/TBME.2010.2045376","volume":"57","author":"RM Jiang","year":"2010","unstructured":"R.M. Jiang et al., Live-cell tracking using SIFT features in DIC microscopic videos. IEEE Tran. Biomed Eng. 57, 2219\u20132228 (2010)","journal-title":"IEEE Tran. Biomed Eng."},{"key":"11_CR27","doi-asserted-by":"publisher","first-page":"67972","DOI":"10.1109\/ACCESS.2019.2917000","volume":"7","author":"Z Jiang","year":"2019","unstructured":"Z. Jiang et al., Social behavioral phenotyping of drosophila with a 2D-3D hybrid CNN framework. IEEE Access 7, 67972\u201367982 (2019)","journal-title":"IEEE Access"},{"key":"11_CR28","doi-asserted-by":"publisher","first-page":"121655","DOI":"10.1109\/ACCESS.2019.2937285","volume":"7","author":"Gary Storey","year":"2019","unstructured":"G. Storey, R. Jiang, S. Keogh, A. Bouridane, C-T Li, 3DPalsyNet: A facial palsy grading and motion recognition framework using fully 3D convolutional neural networks, IEEE Access, Vol.7, 2019. \nhttps:\/\/doi.org\/10.1109\/ACCESS.2019.2937285","journal-title":"IEEE Access"},{"key":"11_CR29","doi-asserted-by":"publisher","first-page":"74442","DOI":"10.1109\/ACCESS.2018.2882227","volume":"6","author":"G Storey","year":"2018","unstructured":"G. Storey et al., Integrated deep model for face detection and landmark localisation from \u2018in the wild\u2019 images. IEEE Access 6, 74442\u201374452 (2018)","journal-title":"IEEE Access"},{"key":"11_CR30","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1049\/htl.2017.0023","volume":"4","author":"G Storey","year":"2017","unstructured":"G. Storey et al., Role for 2D image generated 3D face models in the rehabilitation of facial palsy. IET Healthcare Technol. Lett. 4, 145 (2017)","journal-title":"IET Healthcare Technol. Lett."}],"container-title":["Unsupervised and Semi-Supervised Learning","Deep Biometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32583-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,28]],"date-time":"2020-01-28T07:17:08Z","timestamp":1580195828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32583-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030325824","9783030325831"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32583-1_11","relation":{},"ISSN":["2522-848X","2522-8498"],"issn-type":[{"value":"2522-848X","type":"print"},{"value":"2522-8498","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}