{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T01:20:36Z","timestamp":1773451236100,"version":"3.50.1"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031281235","type":"print"},{"value":"9783031281242","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-28124-2_53","type":"book-chapter","created":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T10:20:17Z","timestamp":1680171617000},"page":"558-569","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhanced 4A Identity Authentication Center Based on\u00a0Super SIM Technology"],"prefix":"10.1007","author":[{"given":"Renjie","family":"Niu","sequence":"first","affiliation":[]},{"given":"Zixiao","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Yizhong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jianhong","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Xiaoli","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Min","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,31]]},"reference":[{"issue":"2","key":"53_CR1","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1109\/JSYST.2014.2345733","volume":"11","author":"M Qiu","year":"2014","unstructured":"Qiu, M., Chen, Z., et al.: Energy-aware data allocation with hybrid memory for mobile cloud systems. IEEE Syst. J. 11(2), 813\u2013822 (2014)","journal-title":"IEEE Syst. J."},{"key":"53_CR2","doi-asserted-by":"crossref","unstructured":"Gai, K., Qiu, M., Elnagdy, S.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: IEEE BigDataSecurity, pp. 171\u2013176 (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.65"},{"key":"53_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/11802167_5","volume-title":"Embedded and Ubiquitous Computing","author":"M Qiu","year":"2006","unstructured":"Qiu, M., Xue, C., Shao, Z., Zhuge, Q., Liu, M., Sha, E.H.-M.: Efficent algorithm of energy minimization for heterogeneous wireless sensor network. In: Sha, E., Han, S.-K., Xu, C.-Z., Kim, M.-H., Yang, L.T., Xiao, B. (eds.) EUC 2006. LNCS, vol. 4096, pp. 25\u201334. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11802167_5"},{"issue":"12","key":"53_CR4","first-page":"1565","volume":"72","author":"J Niu","year":"2012","unstructured":"Niu, J., Gao, Y., et al.: Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability. JPDC 72(12), 1565\u20131575 (2012)","journal-title":"JPDC"},{"key":"53_CR5","doi-asserted-by":"crossref","unstructured":"Gai, K., Zhang, Y., et al.: Blockchain-enabled service optimizations in supply chain digital twin. IEEE TSC, pp. 1\u201312 (2022)","DOI":"10.1109\/TSC.2022.3192166"},{"key":"53_CR6","doi-asserted-by":"crossref","unstructured":"Qiu, M., Qiu, H., et al.: Secure data sharing through untrusted clouds with blockchain-enabled key management. In: 3rd SmartBlock Conference, pp. 11\u201316 (2020)","DOI":"10.1109\/SmartBlock52591.2020.00010"},{"issue":"2","key":"53_CR7","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MCOM.001.1900583","volume":"58","author":"S Huang","year":"2020","unstructured":"Huang, S., Guo, B., Liu, Y.: 5G-oriented optical underlay network slicing technology and challenges. IEEE Commun. Mag. 58(2), 13\u201319 (2020)","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"53_CR8","first-page":"1","volume":"12","author":"Y Li","year":"2016","unstructured":"Li, Y., Gai, K., et al.: Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM TMCCA 12(4), 1\u201318 (2016)","journal-title":"ACM TMCCA"},{"key":"53_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1007\/978-3-031-10989-8_56","volume-title":"Knowledge Science, Engineering and Management","author":"X Gao","year":"2022","unstructured":"Gao, X., Qiu, M.: Energy-based learning for preventing backdoor attack. In: Memmi, G., Yang, B., Kong, L., Zhang, T., Qiu, M. (eds.) KSEM 2022. LNAI, vol. 13370, pp. 706\u2013721. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-10989-8_56"},{"issue":"6","key":"53_CR10","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MWC.2017.8246820","volume":"24","author":"AV Vinel","year":"2017","unstructured":"Vinel, A.V., Breu, J., Luan, T.H., Hu, H.: Emerging technology for 5G-enabled vehicular networks. IEEE Wirel. Commun. 24(6), 12 (2017)","journal-title":"IEEE Wirel. Commun."},{"issue":"6","key":"53_CR11","first-page":"4148","volume":"18","author":"T Wang","year":"2022","unstructured":"Wang, T., Zhang, Y., et al.: An effective edge-intelligent service placement technology for 5G-and-beyond industrial IoT. IEEE TII 18(6), 4148\u20134157 (2022)","journal-title":"IEEE TII"},{"key":"53_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101718","volume":"91","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Liu, J., Zhang, Z., Yu, H.: A fair selection protocol for committee-based permissionless blockchains. Comput. Secur. 91, 101718 (2020)","journal-title":"Comput. Secur."},{"key":"53_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/978-3-030-60248-2_22","volume-title":"Algorithms and Architectures for Parallel Processing","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Liu, J., Yin, J., Li, G., Yu, H., Wu, Q.: Cross-shard transaction processing in\u00a0sharding blockchains. In: Qiu, M. (ed.) ICA3PP 2020. LNCS, vol. 12454, pp. 324\u2013339. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-60248-2_22"},{"issue":"3","key":"53_CR14","first-page":"2070","volume":"19","author":"Y Liu","year":"2022","unstructured":"Liu, Y., Liu, J., et al.: SSHC: a secure and scalable hybrid consensus protocol for sharding blockchains with a formal security framework. IEEE TDSC 19(3), 2070\u20132088 (2022)","journal-title":"IEEE TDSC"},{"key":"53_CR15","doi-asserted-by":"crossref","unstructured":"Liu, Y., Liu, J., et al.: A secure shard reconfiguration protocol for sharding blockchains without a randomness. In: IEEE TrustCom, pp. 1012\u20131019 (2020)","DOI":"10.1109\/TrustCom50675.2020.00135"},{"key":"53_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/978-3-030-90567-5_19","volume-title":"Information Security and Privacy","author":"Y Liu","year":"2021","unstructured":"Liu, Y., Liu, J., Hei, Y., Xia, Yu., Wu, Q.: A secure cross-shard view-change protocol for sharding blockchains. In: Baek, J., Ruj, S. (eds.) ACISP 2021. LNCS, vol. 13083, pp. 372\u2013390. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-90567-5_19"},{"issue":"4","key":"53_CR17","first-page":"395","volume":"6","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Liu, J., Zhang, Z., Xu, T., Yu, H.: Overview on consensus mechanism of blockchain technology. J. Cryptol. Res. 6(4), 395\u2013432 (2019)","journal-title":"J. Cryptol. Res."},{"issue":"2","key":"53_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2020.100179","volume":"2","author":"B Hu","year":"2021","unstructured":"Hu, B., Zhang, Z., et al.: A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems. Patterns 2(2), 100179 (2021)","journal-title":"Patterns"},{"key":"53_CR19","doi-asserted-by":"crossref","unstructured":"Liu, Y., Xia, Y., Liu, J., Hei, Y.: A secure and decentralized reconfiguration protocol for sharding blockchains. In: IEEE HPSC 2021, pp. 111\u2013116. IEEE (2021)","DOI":"10.1109\/BigDataSecurityHPSCIDS52275.2021.00030"},{"key":"53_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100513","volume":"46","author":"Y Liu","year":"2022","unstructured":"Liu, Y., Liu, J., et al.: Building blocks of sharding blockchain systems: concepts, approaches, and open problems. Comput. Sci. Rev. 46, 100513 (2022)","journal-title":"Comput. Sci. Rev."},{"key":"53_CR21","doi-asserted-by":"crossref","unstructured":"Kokoris-Kogias, E., Jovanovic, P., et al.: OmniLedger: a secure, scale-out, decentralized ledger via sharding. In: IEEE SP 2018, pp. 583\u2013598 (2018)","DOI":"10.1109\/SP.2018.000-5"},{"key":"53_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108029","volume":"191","author":"Y Hei","year":"2021","unstructured":"Hei, Y., Liu, J., et al.: Making MA-ABE fully accountable: a blockchain-based approach for secure digital right management. Comput. Netw. 191, 108029 (2021)","journal-title":"Comput. Netw."},{"key":"53_CR23","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.future.2021.11.029","volume":"130","author":"Y Hei","year":"2022","unstructured":"Hei, Y., Li, D., Zhang, C., Liu, J., Liu, Y., Wu, Q.: Practical AgentChain: a compatible cross-chain exchange system. Future Gener. Comput. Syst. 130, 207\u2013218 (2022)","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"53_CR24","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s12083-020-00967-6","volume":"14","author":"Y Hei","year":"2021","unstructured":"Hei, Y., Liu, Y., Li, D., Liu, J., Wu, Q.: Themis: an accountable blockchain-based P2P cloud storage scheme. Peer-to-Peer Netw. Appl. 14(1), 225\u2013239 (2021)","journal-title":"Peer-to-Peer Netw. Appl."}],"container-title":["Lecture Notes in Computer Science","Smart Computing and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-28124-2_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T10:48:23Z","timestamp":1680173303000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-28124-2_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031281235","9783031281242"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-28124-2_53","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SmartCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"smartc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cloud-conf.net\/smartcom\/2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"312","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}