{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:34:29Z","timestamp":1743104069587,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030688509"},{"type":"electronic","value":"9783030688516"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68851-6_22","type":"book-chapter","created":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T07:04:02Z","timestamp":1612422242000},"page":"301-311","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Blockchain-Based Reconstruction Framework for UAV Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4874-3682","authenticated-orcid":false,"given":"Gongzhe","family":"Qiao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0706-0148","authenticated-orcid":false,"given":"Yi","family":"Zhuang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,5]]},"reference":[{"issue":"2018","key":"22_CR1","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.comcom.2018.02.002","volume":"119","author":"J Sanchez-Garcia","year":"2018","unstructured":"Sanchez-Garcia, J., Garcia-Campo, J.M., Arzamendia, M., et al.: A survey on unmanned aerial and aquatic vehicle multi-hop networks: wireless communications, evaluation tools and applications. Comput. Commun. 119(2018), 43\u201365 (2018)","journal-title":"Comput. Commun."},{"issue":"2020","key":"22_CR2","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1016\/j.comcom.2020.01.023","volume":"151","author":"P Mehta","year":"2020","unstructured":"Mehta, P., Gupta, R., Tanwar, S.: Blockchain envisioned UAV networks: challenges, solutions, and comparisons. Comput. Commun. 151(2020), 518\u2013538 (2020)","journal-title":"Comput. Commun."},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Shahriar, H., et al.: Data protection labware for mobile security. In: Wang, G., Feng, J., Bhuiyan, M., Lu, R. (eds.) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019. Lecture Notes in Computer Science, vol. 11611. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-24907-6_15","DOI":"10.1007\/978-3-030-24907-6_15"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., et al.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: IEEE Symposium on Security and Privacy (SP 2016), San Jose, CA, pp. 839\u2013858 (May 2016)","DOI":"10.1109\/SP.2016.55"},{"issue":"2014","key":"22_CR5","first-page":"1","volume":"151","author":"W Gavin","year":"2014","unstructured":"Gavin, W.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151(2014), 1\u201332 (2014)","journal-title":"Ethereum Proj. Yellow Pap."},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference (EuroSys 2018), Porto, Portugal, p. 15 (April 2018). Article No.: 30","DOI":"10.1145\/3190508.3190538"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P., Sun, K.: Efficient self-healing group key distribution with revocation capability. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington D.C., USA, pp. 231\u2013240 (October 2003)","DOI":"10.1145\/948109.948141"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Deng, Z., Chen, S., Tan, X., Song, D., Wu, F.: An efficient provable multi-copy data possession scheme with data dynamics. In: Wang, G., Chen, J., Yang, L. (eds.) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2018. Lecture Notes in Computer Science, vol. 11342. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05345-1_34","DOI":"10.1007\/978-3-030-05345-1_34"},{"issue":"1","key":"22_CR9","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.jnca.2010.09.002","volume":"34","author":"B Tian","year":"2011","unstructured":"Tian, B., Han, S., Jiankun, H., Dillon, T.: A mutual-healing key distribution scheme in wireless sensor networks. J. Netw. Comput. Appl. 34(1), 80\u201388 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"11","key":"22_CR10","doi-asserted-by":"publisher","first-page":"11309","DOI":"10.1109\/TVT.2019.2943118","volume":"68","author":"X Li","year":"2019","unstructured":"Li, X., Wang, Y., Vijayakumar, P., et al.: Blockchain-based mutual-healing group key distribution scheme in unmanned aerial vehicles ad-hoc network. IEEE Trans. Veh. Technol. 68(11), 11309\u201311322 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"101728","DOI":"10.1016\/j.sysarc.2020.101728","volume":"107","author":"C Ge","year":"2020","unstructured":"Ge, C., Ma, X., Liu, Z., et al.: A semi-autonomous distributed blockchain-based framework for UAVs system. J. Syst. Archit. 107, 101728 (2020)","journal-title":"J. Syst. Archit."},{"issue":"10","key":"22_CR12","doi-asserted-by":"publisher","first-page":"5723","DOI":"10.1109\/TII.2019.2922039","volume":"15","author":"V Sharma","year":"2019","unstructured":"Sharma, V., You, I., Nalin, D., et al.: Neural-blockchain-based ultrareliable caching for edge-enabled UAV networks. IEEE Trans. Ind. Inf. 15(10), 5723\u20135736 (2019)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"5","key":"22_CR13","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/JCN.2019.000050","volume":"21","author":"AA Islam","year":"2019","unstructured":"Islam, A.A., Shin, S.Y.: BUAV: a blockchain based secure UAV-assisted data acquisition scheme in Internet of Things. J. Commun. Netw. 21(5), 491\u2013502 (2019)","journal-title":"J. Commun. Netw."},{"issue":"6","key":"22_CR14","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2019.1800722","volume":"57","author":"K Lei","year":"2019","unstructured":"Lei, K., Zhang, Q., Lou, J., et al.: Securing ICN-based UAV ad hoc networks with blockchain. IEEE Commun. Mag. 57(6), 26\u201332 (2019)","journal-title":"IEEE Commun. Mag."},{"key":"22_CR15","doi-asserted-by":"publisher","first-page":"103231","DOI":"10.1109\/ACCESS.2019.2930774","volume":"7","author":"AA Islam","year":"2019","unstructured":"Islam, A.A., Shin, S.Y.: Bus: a blockchain-enabled data acquisition scheme with the assistance of UAV swarm in Internet of Things. IEEE Access 7, 103231\u2013103249 (2019)","journal-title":"IEEE Access"},{"key":"22_CR16","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/ACCESS.2019.2961372","volume":"8","author":"S Tanwar","year":"2019","unstructured":"Tanwar, S., Bhatia, Q., Patel, P., et al.: Machine learning adoption in blockchain-based smart applications: the challenges, and a way forward. IEEE Access 8, 474\u2013488 (2019)","journal-title":"IEEE Access"},{"issue":"4","key":"22_CR17","doi-asserted-by":"publisher","first-page":"4182","DOI":"10.1109\/TVT.2020.2968494","volume":"69","author":"V Hassija","year":"2020","unstructured":"Hassija, V., Chamola, V., Han, G., et al.: DAGIoV: a framework for vehicle to vehicle communication using directed acyclic graph and game theory. IEEE Trans. Veh. Technol. 69(4), 4182\u20134191 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"5","key":"22_CR18","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1109\/TKDE.2019.2895612","volume":"32","author":"X Yang Chi","year":"2019","unstructured":"Yang Chi, X., Xianghua, R.K., et al.: A scalable multi-data sources based recursive approximation approach for fast error recovery in big sensing data on cloud. IEEE Trans. Knowl. Data Eng. 32(5), 841\u2013854 (2019)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"22_CR19","doi-asserted-by":"publisher","first-page":"106997","DOI":"10.1109\/ACCESS.2019.2932259","volume":"7","author":"S Wang","year":"2019","unstructured":"Wang, S., Yuan, J., Li, X., et al.: Active data replica recovery for quality-assurance big data analysis in IC-IoT. IEEE Access 7, 106997\u2013107005 (2019)","journal-title":"IEEE Access"},{"issue":"3","key":"22_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10586-017-0805-8","volume":"20","author":"H Jung","year":"2017","unstructured":"Jung, H., Park, Y., Song, C.-W., et al.: PCS: a parity-based personal data recovery service in cloud. Clust. Comput. 20(3), 1\u20134 (2017)","journal-title":"Clust. Comput."},{"issue":"10","key":"22_CR21","first-page":"2540","volume":"63","author":"Y Weihua","year":"2013","unstructured":"Weihua, Y., Lin, H.: Reliability evaluation of BC networks in terms of the extra vertex and edge-connectivity. IEEE Trans. Comput. 63(10), 2540\u20132548 (2013)","journal-title":"IEEE Trans. Comput."},{"issue":"11","key":"22_CR22","first-page":"2337","volume":"62","author":"Z Qiang","year":"2012","unstructured":"Qiang, Z., Wang, X., Cheng, G.: Reliability evaluation of BC networks. IEEE Trans. Comput. 62(11), 2337\u20132340 (2012)","journal-title":"IEEE Trans. Comput."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68851-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T07:20:13Z","timestamp":1612423213000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68851-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030688509","9783030688516"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68851-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"5 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.spaccs2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"131","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}