{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T03:28:46Z","timestamp":1778210926167,"version":"3.51.4"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030616373","type":"print"},{"value":"9783030616380","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61638-0_2","type":"book-chapter","created":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T23:08:28Z","timestamp":1602630508000},"page":"24-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Secure Management of IoT Devices Based on Blockchain Non-fungible Tokens and Physical Unclonable Functions"],"prefix":"10.1007","author":[{"given":"Javier","family":"Arcenegui","sequence":"first","affiliation":[]},{"given":"Rosario","family":"Arjona","sequence":"additional","affiliation":[]},{"given":"Iluminada","family":"Baturone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,14]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"MA Khan","year":"2018","unstructured":"Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open issues. Future Gener. Comput. Syst. 82, 395\u2013411 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1109\/COMST.2019.2962586","volume":"22","author":"M Stoyanova","year":"2020","unstructured":"Stoyanova, M., Nikoloudakis, Y., Panagiotakis, S., Pallis, E., Markakis, K.: A survey on the Internet of Things (IoT) forensics: challenges, approaches, and open issues. IEEE Commun. Surv. Tutor. 22, 1191\u20131221 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"2_CR3","unstructured":"Buterin, V.: Ethereum whitepaper (2013). \nhttps:\/\/ethereum.org\/whitepaper\/\n\n. Accessed 19 Aug 2020"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the Internet of Things. IEEE Access 4, 2292\u20132303 (2016)","journal-title":"IEEE Access"},{"key":"2_CR5","unstructured":"Popov, S.: IOTA: feeless and free. IEEE Blockchain Technical Briefs (2019)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Prada-Delgado, M.A., Baturone, I., Dittmann, G., Jelitto, J., Kind, A.: PUF-derived IoT identities in a zero-knowledge protocol for blockchain. Internet Things 9 (2020)","DOI":"10.1016\/j.iot.2019.100057"},{"key":"2_CR7","unstructured":"Raiden Network. \nhttps:\/\/raiden.network\/\n\n. Accessed 19 Aug 2020"},{"key":"2_CR8","unstructured":"ERC-721. \nhttp:\/\/www.erc721.org\n\n. Accessed 19 Aug 2020"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-642-41395-7_5","volume-title":"Physically Unclonable Functions","author":"R Maes","year":"2013","unstructured":"Maes, R.: PUF-based entity identification and authentication. In: Maes, R. (ed.) Physically Unclonable Functions, pp. 117\u2013141. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-41395-7_5"},{"key":"2_CR10","unstructured":"Remix. \nhttps:\/\/remix.ethereum.org\n\n. Accessed 19 Aug 2020"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.dcan.2019.01.007","volume":"6","author":"M Westerkamp","year":"2020","unstructured":"Westerkamp, M., Victor, F., K\u00fcpper, A.: Tracing manufacturing processes using blockchain-based token compositions. Digit. Commun. Netw. 6, 167\u2013176 (2020)","journal-title":"Digit. Commun. Netw."},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.jmsy.2020.05.017","volume":"56","author":"M Hasan","year":"2020","unstructured":"Hasan, M., Binil, S.: Decentralized cloud manufacturing-as-a-service (CMaaS) platform architecture with configurable digital assets. J. Manuf. Syst. 56, 157\u2013174 (2020)","journal-title":"J. Manuf. Syst."},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Vala\u0161t\u00edn, V., et al.: Blockchain based car-sharing platform. In: IEEE International Symposium ELMAR (2019)","DOI":"10.1109\/ELMAR.2019.8918650"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Le, T., Yoohwan, K., Ju-Yeon, J.: Implementation of a blockchain-based event reselling system. In: 6th IEEE International Conference on Computational Science\/Intelligence and Applied Informatics (CSII) (2019)","DOI":"10.1109\/CSII.2019.00016"},{"key":"2_CR15","unstructured":"Wickstr\u00f6m, J., Magnus, W., G\u00f6ran, P.: Rethinking IoT security: a protocol based on blockchain smart contracts for secure and automated IoT deployments. arXiv preprint \narXiv:2007.02652\n\n (2020)"},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1007\/s10586-020-03058-6","volume":"23","author":"U Khalid","year":"2020","unstructured":"Khalid, U., Asim, M., Baker, T., Hung, P.C.K., Tariq, M.A., Rafferty, L.: A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Cluster Comput. 23, 2067\u20132087 (2020). \nhttps:\/\/doi.org\/10.1007\/s10586-020-03058-6","journal-title":"Cluster Comput."},{"key":"2_CR17","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/978-3-030-38181-3_2","volume-title":"Blockchain Cybersecurity, Trust and Privacy","author":"A Sghaier Omar","year":"2020","unstructured":"Sghaier Omar, A., Basir, O.: Capability-based non-fungible tokens approach for a decentralized AAA framework in IoT. In: Choo, K.-K.R., Dehghantanha, A., Parizi, R.M. (eds.) Blockchain Cybersecurity, Trust and Privacy. AIS, vol. 79, pp. 7\u201331. Springer, Cham (2020). \nhttps:\/\/doi.org\/10.1007\/978-3-030-38181-3_2"},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"157113","DOI":"10.1109\/ACCESS.2019.2949951","volume":"7","author":"P Cui","year":"2019","unstructured":"Cui, P., Dixon, J., Guin, U., Dimase, D.: A blockchain-based framework for supply chain provenance. IEEE Access 7, 157113\u2013157125 (2019)","journal-title":"IEEE Access"},{"key":"2_CR19","unstructured":"Xu, X., Rahman, F., Shakya, B., Vassilev, A., Forte, D., Tehranipoor, M.: Electronics supply chain integrity enabled by blockchain. ACM Trans. Des. Autom. Electron. Syst. 24, 1\u201325 (2019). Article 31"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MCE.2019.2953758","volume":"9","author":"SP Mohanty","year":"2020","unstructured":"Mohanty, S.P., Yanambaka, V.P., Kougianos, E., Puthal, D.: PUFchain: A hardware-assisted blockchain for sustainable simultaneous device and data security in the Internet of Everything (IoE). IEEE Consum. Electron. Mag. 9, 8\u201316 (2020)","journal-title":"IEEE Consum. Electron. Mag."},{"key":"2_CR21","unstructured":"Islam, M.N., Kundu, S.: Enabling IC traceability via blockchain pegged to embedded PUF. ACM Trans. Des. Autom. Electron. Syst. 24, 1\u201323 (2019). Article 36"},{"key":"2_CR22","doi-asserted-by":"publisher","first-page":"2653","DOI":"10.1109\/TIFS.2015.2471279","volume":"10","author":"I Baturone","year":"2015","unstructured":"Baturone, I., Prada-Delgado, M.A., Eiroa, S.: Improved generation of identifiers, secret keys, and random numbers From SRAMs. IEEE Trans. Inf. Forensics Secur. 10, 2653\u20132668 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63\u201380. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-74735-2_5"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-85053-3_12","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"C B\u00f6sch","year":"2008","unstructured":"B\u00f6sch, C., Guajardo, J., Sadeghi, A.-R., Shokrollahi, J., Tuyls, P.: Efficient helper data key extractor on FPGAs. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 181\u2013197. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-85053-3_12"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61638-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T23:21:05Z","timestamp":1602631265000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-61638-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030616373","9783030616380"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61638-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/di.uniroma1.it\/ACNS2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"214","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.7","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic the conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}