{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:54:16Z","timestamp":1742932456499,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030791995"},{"type":"electronic","value":"9783030792008"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-79200-8_79","type":"book-chapter","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:04:06Z","timestamp":1624471446000},"page":"526-533","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protection Method of Network Data Privacy Security Issues Based on Blockchain Technology"],"prefix":"10.1007","author":[{"given":"Huikui","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Mudan","family":"Gu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,24]]},"reference":[{"key":"79_CR1","doi-asserted-by":"crossref","unstructured":"Sikorski, J.J., Haughton, J., Kraft, M.: Blockchain technology in the chemical industry: machine-to-machine electricity market. Appl. Energy 195(JUN.1), 234\u2013246 (2017)","DOI":"10.1016\/j.apenergy.2017.03.039"},{"issue":"2","key":"79_CR2","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1108\/JFRC-08-2016-0068","volume":"25","author":"P Yeoh","year":"2017","unstructured":"Yeoh, P.: Regulatory issues in blockchain technology. J. Financ. Regul. Compliance 25(2), 196\u2013208 (2017)","journal-title":"J. Financ. Regul. Compliance"},{"issue":"1","key":"79_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.33166\/AETiC.2018.01.001","volume":"2","author":"MH Miraz","year":"2018","unstructured":"Miraz, M.H., Ali, M.: Applications of blockchain technology beyond cryptocurrency. Ann. Emerg. Technol. Comput. 2(1), 1\u20136 (2018)","journal-title":"Ann. Emerg. Technol. Comput."},{"issue":"1","key":"79_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40854-016-0040-y","volume":"2","author":"J Sun","year":"2016","unstructured":"Sun, J., Yan, J., Zhang, K.Z.K.: Blockchain-based sharing services: what blockchain technology can contribute to smart cities. Financ. Innov. 2(1), 1\u20139 (2016). https:\/\/doi.org\/10.1186\/s40854-016-0040-y","journal-title":"Financ. Innov."},{"issue":"6","key":"79_CR5","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/s12599-017-0505-1","volume":"59","author":"R Beck","year":"2017","unstructured":"Beck, R., Avital, M., Rossi, M., Thatcher, J.B.: Blockchain technology in business and information systems research. Bus. Inf. Syst. Eng. 59(6), 381\u2013384 (2017). https:\/\/doi.org\/10.1007\/s12599-017-0505-1","journal-title":"Bus. Inf. Syst. Eng."},{"key":"79_CR6","unstructured":"Sun, H., Luo, H., Sun, Y., et al.: Reversible Image Mosaic Technology Providing Large Protection Size and High Image Quality. 42(3-4), 259\u2013293 (2018)"},{"issue":"4","key":"79_CR7","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/BF03391586","volume":"1","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Luo, X., Luo, H.: A multi-step attack-correlation method with privacy protection. J. Commun. Inf. Netw. 1(4), 133\u2013142 (2016). https:\/\/doi.org\/10.1007\/BF03391586","journal-title":"J. Commun. Inf. Netw."},{"issue":"6","key":"79_CR8","doi-asserted-by":"publisher","first-page":"9794","DOI":"10.1109\/JIOT.2019.2931724","volume":"6","author":"J Cao","year":"2019","unstructured":"Cao, J., Yu, P., Xiang, X., et al.: Anti-quantum fast authentication and data transmission scheme for massive devices in 5g NB-IOT system. IEEE Internet Things J. 6(6), 9794\u20139805 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"79_CR9","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s10776-019-00443-w","volume":"26","author":"Y Zou","year":"2019","unstructured":"Zou, Y., He, W., Zhang, L., Ni, J., Chen, Q.: Research on privacy protection of large-scale network data aggregation process. Int. J. Wireless Inf. Netw. 26(3), 193\u2013200 (2019). https:\/\/doi.org\/10.1007\/s10776-019-00443-w","journal-title":"Int. J. Wireless Inf. Netw."},{"issue":"8","key":"79_CR10","doi-asserted-by":"publisher","first-page":"7032","DOI":"10.1109\/JIOT.2020.2982417","volume":"7","author":"B Mao","year":"2020","unstructured":"Mao, B., Kawamoto, Y., Kato, N.: AI-based joint optimization of qos and security for 6g energy harvesting internet of things. IEEE Internet Things J. 7(8), 7032\u20137042 (2020)","journal-title":"IEEE Internet Things J."}],"container-title":["Advances in Intelligent Systems and Computing","2021 International Conference on Applications and Techniques in Cyber Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79200-8_79","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:39:16Z","timestamp":1624473556000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79200-8_79"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030791995","9783030792008"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79200-8_79","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"24 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ATCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications and Techniques in Cyber Security and Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fuyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"atci2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/atci2021.fynu.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}