{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:14:56Z","timestamp":1743066896177,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030995867"},{"type":"electronic","value":"9783030995874"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99587-4_39","type":"book-chapter","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T05:19:48Z","timestamp":1648617588000},"page":"468-479","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Building a Blockchain-Based Social Network Identification System"],"prefix":"10.1007","author":[{"given":"Zhanwen","family":"Chen","sequence":"first","affiliation":[]},{"given":"Kazumasa","family":"Omote","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"Androulaki, E., et\u00a0al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp. 1\u201315 (2018)","DOI":"10.1145\/3190508.3190538"},{"key":"39_CR2","doi-asserted-by":"publisher","unstructured":"B\u00fcnz, B., Agrawal, S., Zamani, M., Boneh, D.: Zether: towards privacy in a smart contract world. In: Bonneau, J., Heninger, N. (eds.) Financial Cryptography and Data Security. FC 2020. LNCS, vol. 12059, pp. 423\u2013443. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_23","DOI":"10.1007\/978-3-030-51280-4_23"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Chen, Z., Chen, J., Meng, W.: Threshold identity authentication signature: impersonation prevention in social network services. Concurr. Comput. Pract. Exp., e5787 (2020)","DOI":"10.1002\/cpe.5787"},{"key":"39_CR4","unstructured":"Garfinkel, S.: PGP: Pretty Good Privacy. O\u2019Reilly Media, Inc., Sebastopol (1995)"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Goga, O., Venkatadri, G., Gummadi, K.P.: The Doppelg\u00e4nger bot attack: exploring identity impersonation in online social networks. In: Proceedings of the 2015 Internet Measurement Conference, pp. 141\u2013153. ACM (2015)","DOI":"10.1145\/2815675.2815699"},{"key":"39_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12920-019-0646-9","volume":"13","author":"G G\u00fcrsoy","year":"2020","unstructured":"G\u00fcrsoy, G., Brannon, C.M., Gerstein, M.: Using ethereum blockchain to store and query pharmacogenomics data via smart contracts. BMC Med. Genomics 13, 1\u201311 (2020)","journal-title":"BMC Med. Genomics"},{"key":"39_CR7","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.cose.2018.06.004","volume":"78","author":"MT Hammi","year":"2018","unstructured":"Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A.: Bubbles of trust: a decentralized blockchain-based authentication system for iot. Comput. Secur. 78, 126\u2013142 (2018)","journal-title":"Comput. Secur."},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Kirkman, S., Newman, R.: A cloud data movement policy architecture based on smart contracts and the ethereum blockchain. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), pp. 371\u2013377. IEEE (2018)","DOI":"10.1109\/IC2E.2018.00071"},{"key":"39_CR9","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1016\/j.future.2019.07.030","volume":"101","author":"P Kochovski","year":"2019","unstructured":"Kochovski, P., Gec, S., Stankovski, V., Bajec, M., Drobintsev, P.D.: Trust management in a blockchain based fog computing platform with trustless smart oracles. Futur. Gener. Comput. Syst. 101, 747\u2013759 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Mohanta, B.K., Sahoo, A., Patel, S., Panda, S.S., Jena, D., Gountia, D.: DecAuth: decentralized authentication scheme for IoT device using ethereum blockchain. In: TENCON 2019-2019 IEEE Region 10 Conference (TENCON), pp. 558\u2013563. IEEE (2019)","DOI":"10.1109\/TENCON.2019.8929720"},{"key":"39_CR11","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review, p. 21260 (2008)"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Nuakoh, E.B., Anwar, M.: Detecting impersonation in social network sites (SNS) using artificial immune systems (AIS). In: SoutheastCon 2018, pp. 1\u20133. IEEE (2018)","DOI":"10.1109\/SECON.2018.8479274"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Patsonakis, C., Samari, K., Kiayiasy, A., Roussopoulos, M.: On the practicality of a smart contract PKI. In: 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON), pp. 109\u2013118. IEEE (2019)","DOI":"10.1109\/DAPPCON.2019.00022"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"Ramesh, V.K.C.: Storing IoT data securely in a private ethereum blockchain. Ph.D. thesis, University of Nevada, Las Vegas (2019)","DOI":"10.1109\/COMPSAC48688.2020.0-219"},{"issue":"2","key":"39_CR15","first-page":"5055","volume":"1","author":"P Robinson","year":"2018","unstructured":"Robinson, P.: Using ethereum registration authorities to establish trust for ethereum private sidechains. J. Br. Blockchain Assoc. 1(2), 5055 (2018)","journal-title":"J. Br. Blockchain Assoc."},{"issue":"11","key":"39_CR16","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"issue":"3","key":"39_CR17","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MIC.2015.21","volume":"19","author":"M Tsikerdekis","year":"2015","unstructured":"Tsikerdekis, M., Zeadally, S.: Detecting and preventing online identity deception in social networking services. IEEE Internet Comput. 19(3), 41\u201349 (2015)","journal-title":"IEEE Internet Comput."},{"key":"39_CR18","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.procs.2018.03.063","volume":"129","author":"B Wang","year":"2018","unstructured":"Wang, B., Sun, J., He, Y., Pang, D., Lu, N.: Large-scale election based on blockchain. Procedia Comput. Sci. 129, 234\u2013237 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"39_CR19","doi-asserted-by":"crossref","unstructured":"Wohrer, M., Zdun, U.: Smart contracts: security patterns in the ethereum ecosystem and solidity. In: 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE), pp. 2\u20138. IEEE (2018)","DOI":"10.1109\/IWBOSE.2018.8327565"},{"issue":"2014","key":"39_CR20","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014), 1\u201332 (2014)","journal-title":"Ethereum Project Yellow Paper"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99587-4_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T06:02:33Z","timestamp":1648620153000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99587-4_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030995867","9783030995874"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99587-4_39","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}