{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T11:21:26Z","timestamp":1767612086977,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030736026"},{"type":"electronic","value":"9783030736033"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-73603-3_24","type":"book-chapter","created":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T06:04:19Z","timestamp":1617948259000},"page":"258-266","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Blockchain Transforming Cyber-Attacks: Healthcare Industry"],"prefix":"10.1007","author":[{"given":"Anthony Ugochukwu","family":"Nwosu","sequence":"first","affiliation":[]},{"given":"S. B.","family":"Goyal","sequence":"additional","affiliation":[]},{"given":"Pradeep","family":"Bedi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,10]]},"reference":[{"issue":"1","key":"24_CR1","first-page":"58","volume":"58","author":"J Umeh","year":"2016","unstructured":"Umeh, J.: Blockchain double bubble or double trouble? IT NOW 58(1), 58\u201361 (2016)","journal-title":"IT NOW"},{"key":"24_CR2","unstructured":"Zyskind, G., Nathan, O., Pentland, Enigma, A.: Decentralized Computation Platform with Guaranteed Privacy. CoRR abs\/1506.03471 (2015)"},{"key":"24_CR3","unstructured":"Nakamoto, S.: Bitcoin. A peer-to-peer electronic cash system (2008)"},{"key":"24_CR4","unstructured":"Pilkington, M.: Blockchain technology. Principles and applications: In: The Research Handbook on Digital Transformations. Edward Elgar Publishing"},{"key":"24_CR5","unstructured":"One-way Hash Function. (n.d.). https:\/\/www.aspencrypt.com\/crypto101_hash.html"},{"key":"24_CR6","unstructured":"Krisha, A.: What Is Blockchain Immutability? \u2013 A Secure Tamper Proof Database, 21 May 2018"},{"key":"24_CR7","unstructured":"Swan, M.: Blockchain. Blueprint for a New Economy. O\u2019Reilly Media, Inc. (2015)"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. In: (IEEE International Congress on Big Data (BigData Congress), pp. 557\u2013564. IEEE (2017)","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Daniel, J., Sargolzaei, A., Abdelghani, M., Sargolzaei, S., Amaba, B.: blockchain technology, cognitive computing, and healthcare innovations. J. Adv. Inf. Technol. 8(3) (2017)","DOI":"10.12720\/jait.8.3.194-198"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Wu, T., Liang, X.: Exploration and practice of inter-bank application based on blockchain. In: ICCSE 12th International Conference on Computer Science and Education, pp. 219\u2013224 (2017)","DOI":"10.1109\/ICCSE.2017.8085492"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Hou, H.: The application of blockchain technology in E-government in China. In: 26th International Conference on Computer Communications and Networks, ICCCN 2017 (2017)","DOI":"10.1109\/ICCCN.2017.8038519"},{"issue":"2","key":"24_CR12","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MCE.2017.2776459","volume":"7","author":"D Puthal","year":"2018","unstructured":"Puthal, D., Malik, N., Mohanty, S.P., Kougianos, E., Yang, C.: The blockchain is a decentralized security framework [Future Directions]. IEEE Consumer Electron. Mag. 7(2), 18\u201321 (2018)","journal-title":"IEEE Consumer Electron. Mag."},{"key":"24_CR13","unstructured":"ShoCard: Blockchain revolutionizing identity management (2016). https:\/\/shocard.com\/cpt_news\/blockchain-revolutionizingidentity-management"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Anurag: Impact of blockchain on the healthcare industry, 13 April 2020","DOI":"10.4324\/9780203820735-3"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Saraf, C., Sabadra, S.: Blockchain platforms. A compendium. In: Proceedings of the IEEE International Conference on Innovative Research and Development (ICIRD), Bangkok, Thailand, pp. 1\u20136, May 2018","DOI":"10.1109\/ICIRD.2018.8376323"},{"key":"24_CR16","unstructured":"Ethereum. https:\/\/www.ethereum.org\/. Accessed 20 Oct 2020"},{"key":"24_CR17","unstructured":"Ripple. https:\/\/ripple.com\/. Accessed 20 Oct 2020"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Alexaki, S., et al.: Blockchain-based electronic patient records for regulated circular healthcare jurisdictions. In: IEEE 23rd International Workshop on Computer-Aided (2018)","DOI":"10.1109\/CAMAD.2018.8514954"},{"issue":"8","key":"24_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0997-3","volume":"42","author":"H Li","year":"2018","unstructured":"Li, H., et al.: Blockchain-based data preservation system for medical data %J. J. Med. Syst. 42(8), 1\u20133 (2018)","journal-title":"J. Med. Syst."},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Azaria, A., et al.: MedRec: using blockchain for medical data access and permission management. In: 2nd International Conference on Open and Big Data (OBD) (2016)","DOI":"10.1109\/OBD.2016.11"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Liang, G., Weller, S.R.: Distributed blockchain-based data protection framework for modern power systems against cyber-attacks. IEEE Trans. Smart Grid. (2018)","DOI":"10.1109\/TSG.2018.2819663"},{"key":"24_CR22","unstructured":"Techopedia: \u201cDefinition of Cyberattacks?\u201d. https:\/\/www.techopedia.com\/definition\/24748\/cyberattack. Accessed 30 Sept 2020"},{"key":"24_CR23","unstructured":"US Data Vault (n.d.): Types of cyber-attacks- and how to prevent them. www.usdatavault.com. Accessed 30 Sept 2020"},{"key":"24_CR24","unstructured":"Dobran, B.: Security strategies, Ransomware, data protection: 17 types of cyber-attacks to secure company. https:\/\/phoenixnap.com\/blog\/cyber-security-attack-types. Accessed 12 Feb 2019"}],"container-title":["Advances in Intelligent Systems and Computing","Innovations in Bio-Inspired Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-73603-3_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T06:16:06Z","timestamp":1617948966000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-73603-3_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030736026","9783030736033"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-73603-3_24","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IBICA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovations in Bio-Inspired Computing and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ibica2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/ibica20\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}