{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T20:08:08Z","timestamp":1770581288659,"version":"3.49.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030965266","type":"print"},{"value":"9783030965273","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96527-3_4","type":"book-chapter","created":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T14:02:33Z","timestamp":1644328953000},"page":"43-58","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["New Gold Mine: Harvesting IoT Data Through DeFi in a Secure Manner"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7662-2119","authenticated-orcid":false,"given":"Lei","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4592-6603","authenticated-orcid":false,"given":"Xinxin","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Lucas","family":"Hall","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Chai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,9]]},"reference":[{"key":"4_CR1","unstructured":"Intel Software Guard Extensions Programming Reference, October 2014. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Adler, J., Berryhill, R., Veneris, A., Poulos, Z., Veira, N., Kastania, A.: Astraea: a decentralized blockchain oracle. In: 2018 IEEE international conference on internet of things (IThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp. 1145\u20131152. IEEE (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00207"},{"key":"4_CR3","unstructured":"ARM: Arm security technology building a secure system using trustzone technology (2009)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Badreddine, W., Zhang, K., Talhi, C.: Monetization using blockchains for IoT data marketplace. In: 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1\u20139. IEEE (2020)","DOI":"10.1109\/ICBC48266.2020.9169424"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Chowdhury, M.J.M., Colman, A., Kabir, M.A., Han, J., Sarda, P.: Blockchain as a notarization service for data sharing with personal data store. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp. 1330\u20131335. IEEE (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00183"},{"issue":"2","key":"4_CR6","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10207-011-0124-7","volume":"10","author":"G Coker","year":"2011","unstructured":"Coker, G., Guttman, J., Loscocco, P., Herzog, A., Millen, J., O\u2019Hanlon, B., Ramsdell, J., Segall, A., Sheehy, J., Sniffen, B.: Principles of remote attestation. Int. J. Inf. Secur. 10(2), 63\u201381 (2011)","journal-title":"Int. J. Inf. Secur."},{"key":"4_CR7","unstructured":"Damslora, B.J.: Data collection in a cellular sensor network with nRF9160. Master\u2019s thesis, NTNU (2019)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Douceur, J.R.: The sybil attack. In: International Workshop on Peer-to-Peer Systems, pp. 251\u2013260. Springer (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"4_CR9","unstructured":"Ellis, S., Juels, A., Nazarov, S.: Chainlink: a decentralized oracle network (2017). https:\/\/link.smartcontract.com\/whitepaper"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Gundlach, G.T., Cannon, J.P.: \u201ctrust but verify\u201d? the performance implications of verification strategies in trusting relationships. J. Acad. Mark. Sci. 38(4), 399\u2013417 (2010)","DOI":"10.1007\/s11747-009-0180-y"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/j.csbj.2018.08.002","volume":"16","author":"AS Kleinaki","year":"2018","unstructured":"Kleinaki, A.S., Mytis-Gkometh, P., Drosatos, G., Efraimidis, P.S., Kaldoudi, E.: A blockchain-based notarization service for biomedical knowledge retrieval. Comput. Struct. Biotechnol. J. 16, 288\u2013297 (2018)","journal-title":"Comput. Struct. Biotechnol. J."},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Li, H., Pei, L., Liao, D., Wang, X., Xu, D., Sun, J.: BDDT: use blockchain to facilitate iot data transactions. Cluster Computing, pp. 1\u201315 (2020)","DOI":"10.1007\/s10586-020-03119-w"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Mi\u0161ura, K., \u017dagar, M.: Data marketplace for internet of things. In: 2016 International Conference on Smart Systems and Technologies (SST), pp. 255\u2013260. IEEE (2016)","DOI":"10.1109\/SST.2016.7765669"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"\u00d6zyilmaz, K.R., Do\u011fan, M., Yurdakul, A.: IDMoB: IoT data marketplace on blockchain. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 11\u201319. IEEE (2018)","DOI":"10.1109\/CVCBT.2018.00007"},{"key":"4_CR15","unstructured":"SEV-SNP, A.: Strengthening vm isolation with integrity protection and more. White Paper, January 2020"},{"issue":"11","key":"4_CR16","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Swathi, P., Modi, C., Patel, D.: Preventing sybil attack in blockchain using distributed behavior monitoring of miners. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/ICCCNT45670.2019.8944507"}],"container-title":["Lecture Notes in Computer Science","Blockchain \u2013 ICBC 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96527-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T01:03:14Z","timestamp":1770512594000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96527-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030965266","9783030965273"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96527-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"9 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.servicessociety.org\/icbc","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}