{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:23:23Z","timestamp":1743074603002,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031270406"},{"type":"electronic","value":"9783031270413"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-27041-3_7","type":"book-chapter","created":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T16:34:55Z","timestamp":1676651695000},"page":"91-101","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Delay-Aware Hash Tree for\u00a0Blockchain on\u00a0Vehicular Delay Tolerant Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1978-2105","authenticated-orcid":false,"given":"Joong-Lyul","family":"Lee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4665-0602","authenticated-orcid":false,"given":"Joobum","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,18]]},"reference":[{"unstructured":"Nakamoto, S..: Bitcoin: A peer-to-peer electronic cash system","key":"7_CR1"},{"issue":"5","key":"7_CR2","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1007\/s12083-019-00786-4","volume":"12","author":"H Li","year":"2019","unstructured":"Li, H., Pei, L., Liao, D., Sun, G., Xu, D.: Blockchain meets VANET: an architecture for identity and location privacy protection in VANET. Peer-to-Peer Netw. Appl. 12(5), 1178\u20131193 (2019)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"38296","DOI":"10.1109\/ACCESS.2020.2974964","volume":"8","author":"X Deng","year":"2020","unstructured":"Deng, X., Gao, T.: Electronic payment schemes based on blockchain in VANETs. IEEE Access 8, 38296\u201338303 (2020)","journal-title":"IEEE Access"},{"key":"7_CR4","first-page":"100310","volume":"28","author":"M Lee","year":"2021","unstructured":"Lee, M., Atkison, T.: VANET applications: past, present, and future. Veh. Commun. 28, 100310 (2021)","journal-title":"Veh. Commun."},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.adhoc.2016.02.017","volume":"44","author":"F Cunha","year":"2016","unstructured":"Cunha, F., et al.: Data communication in VANETs: protocols, applications and challenges. Ad Hoc Netw. 44, 90\u2013103 (2016)","journal-title":"Ad Hoc Netw."},{"issue":"3","key":"7_CR6","doi-asserted-by":"publisher","first-page":"325027","DOI":"10.1155\/2015\/325027","volume":"11","author":"H Kang","year":"2015","unstructured":"Kang, H., Ahmed, S.H., Kim, D., Chung, Y.-S.: Routing protocols for vehicular delay tolerant networks: a survey. Int. J. Distrib. Sens. Netw. 11(3), 325027 (2015)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"1","key":"7_CR7","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s11036-009-0181-6","volume":"15","author":"P-C Cheng","year":"2010","unstructured":"Cheng, P.-C., Lee, K.C., Gerla, M., H\u00e4rri, J.: GeoDTN+ Nav: geographic DTN routing with navigator prediction for urban vehicular environments. Mob. Netw. Appl. 15(1), 61\u201382 (2010)","journal-title":"Mob. Netw. Appl."},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"68646","DOI":"10.1109\/ACCESS.2019.2918411","volume":"7","author":"S Kim","year":"2019","unstructured":"Kim, S.: Impacts of mobility on performance of blockchain in VANET. IEEE Access 7, 68646\u201368655 (2019)","journal-title":"IEEE Access"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"56656","DOI":"10.1109\/ACCESS.2019.2913682","volume":"7","author":"L Xie","year":"2019","unstructured":"Xie, L., Ding, Y., Yang, H., Wang, X.: Blockchain-based secure and trustworthy internet of things in SDN-enabled 5G-VANETs. IEEE Access 7, 56656\u201356666 (2019)","journal-title":"IEEE Access"},{"unstructured":"Merkle, R.C.: Secrecy, Authentication, and Public Key systems. Stanford university (1979)","key":"7_CR10"},{"unstructured":"Becker, G.: Merkle signature schemes, merkle trees and their cryptanalysis. Ruhr-University Bochum. Technical report (2008)","key":"7_CR11"},{"doi-asserted-by":"crossref","unstructured":"Lee, J.-L., Hwang, J., Park, H.-S., Kim, D..: On latency-aware tree topology construction for emergency responding VANET applications. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 57\u201363 IEEE (2018)","key":"7_CR12","DOI":"10.1109\/INFCOMW.2018.8406819"},{"doi-asserted-by":"crossref","unstructured":"Lee, J.-L., Hwang, J., Park, H., Kim, D.: Ad hoc communication topology construction for delay-sensitive internet of vehicle applications. Wirel. Commun. Mob. Comput. 2022 (2022)","key":"7_CR13","DOI":"10.1155\/2022\/8221179"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Wireless Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-27041-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T16:57:13Z","timestamp":1676653033000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-27041-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031270406","9783031270413"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-27041-3_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"18 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WiCON","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Wireless Internet Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wicon2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfyPlus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}