{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:23:48Z","timestamp":1743060228522,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031314193"},{"type":"electronic","value":"9783031314209"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-31420-9_1","type":"book-chapter","created":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T13:03:24Z","timestamp":1682687004000},"page":"3-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["ID-Based Self-encryption via Hyperledger Fabric Based Smart Contract"],"prefix":"10.1007","author":[{"given":"Ilya","family":"Grishkov","sequence":"first","affiliation":[]},{"given":"Roland","family":"Kromes","sequence":"additional","affiliation":[]},{"given":"Thanassis","family":"Giannetsos","sequence":"additional","affiliation":[]},{"given":"Kaitai","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,29]]},"reference":[{"key":"1_CR1","unstructured":"Buterin, V.: Ethereum: a next-generation smart contract and decentralized application platform (2014). https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper. Accessed 22 Aug 2016"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Chen, Y., Ku, W.S.: Self-encryption scheme for data security in mobile devices. In: 2009 6th IEEE Consumer Communications and Networking Conference, pp. 1\u20135. IEEE (2009)","DOI":"10.1109\/CCNC.2009.4784733"},{"key":"1_CR3","unstructured":"Christian, C.: Architecture of the hyperledger blockchain fabric (2016). https:\/\/www.zurich.ibm.com\/dccl\/papers\/cachin$_\/$dccl.pdf. Accessed 10 Aug 2016"},{"key":"1_CR4","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-981-15-0871-4_24","volume-title":"Applications and Techniques in Information Security","author":"A Dabholkar","year":"2019","unstructured":"Dabholkar, A., Saraswat, V.: Ripping the fabric: attacks and mitigations on hyperledger fabric. In: Shankar Sriram, V.S., Subramaniyaswamy, V., Sasikaladevi, N., Zhang, L., Batten, L., Li, G. (eds.) ATIS 2019. CCIS, vol. 1116, pp. 300\u2013311. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-15-0871-4_24"},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Gerrits, L., Kromes, R., Verdier, F.: A true decentralized implementation based on IoT and blockchain: a vehicle accident use case. In: 2020 International Conference on Omni-Layer Intelligent Systems (COINS), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/COINS49042.2020.9191405","DOI":"10.1109\/COINS49042.2020.9191405"},{"key":"1_CR6","unstructured":"Gouy, I.: Toy benchmark programs. https:\/\/benchmarksgame-team.pages.debian.net\/benchmarksgame\/why-measure-toy-benchmark-programs.html"},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"150184","DOI":"10.1109\/ACCESS.2019.2946988","volume":"7","author":"Y Huang","year":"2019","unstructured":"Huang, Y., Bian, Y., Li, R., Zhao, J.L., Shi, P.: Smart contract security: a software lifecycle perspective. IEEE Access 7, 150184\u2013150202 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2946988","journal-title":"IEEE Access"},{"key":"1_CR8","unstructured":"Hyperledger: Using the fabric test network (2020). https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-2.2\/test$_$network.html. Accessed 19 Mar 2022"},{"key":"1_CR9","unstructured":"Irvine, D.: Self encrypting data (2010). Unpublished Manuscript"},{"key":"1_CR10","doi-asserted-by":"publisher","unstructured":"Kromes, R., Gerrits, L., Verdier, F.: Adaptation of an embedded architecture to run hyperledger sawtooth application. In: 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 0409\u20130415 (2019). https:\/\/doi.org\/10.1109\/IEMCON.2019.8936264","DOI":"10.1109\/IEMCON.2019.8936264"},{"key":"1_CR11","unstructured":"Maidsafe: self_encryption (2022). https:\/\/github.com\/maidsafe\/self$_\/$encryption"},{"key":"1_CR12","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https:\/\/bitcoin.org\/bitcoin.pdf. Accessed 01 July 2015"},{"key":"1_CR13","unstructured":"Park, C.: Using self-encryption to safeguard data security in fabric\u2019s smart contract. Bachelor\u2019s thesis (2022). https:\/\/repository.tudelft.nl\/islandora\/object\/uuid:15c5eee3-0be6-4d71-bf67-3ea5e576aa05?collection=education"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Rahardjo, M.R.D., Shidik, G.F.: Design and implementation of self encryption method on file security. In: 2017 International Seminar on Application for Technology of Information and Communication (iSemantic), pp. 181\u2013186. IEEE (2017)","DOI":"10.1109\/ISEMANTIC.2017.8251866"},{"issue":"1","key":"1_CR15","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/JSYST.2020.2963840","volume":"15","author":"PP Ray","year":"2021","unstructured":"Ray, P.P., Dash, D., Salah, K., Kumar, N.: Blockchain for IoT-based healthcare: background, consensus, platforms, and use cases. IEEE Syst. J. 15(1), 85\u201394 (2021). https:\/\/doi.org\/10.1109\/JSYST.2020.2963840","journal-title":"IEEE Syst. J."},{"issue":"22","key":"1_CR16","doi-asserted-by":"publisher","first-page":"6587","DOI":"10.3390\/s20226587","volume":"20","author":"C Stamatellis","year":"2020","unstructured":"Stamatellis, C., Papadopoulos, P., Pitropakis, N., Katsikas, S., Buchanan, W.J.: A privacy-preserving healthcare framework using hyperledger fabric. Sensors 20(22), 6587 (2020)","journal-title":"Sensors"},{"key":"1_CR17","unstructured":"Valsorda, F.: Rustgo: calling rust from go with near-zero overhead (2022). https:\/\/words.filippo.io\/rustgo\/"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Yamashita, K., Nomura, Y., Zhou, E., Pi, B., Jun, S.: Potential risks of hyperledger fabric smart contracts. In: 2019 IEEE International Workshop on Blockchain Oriented Software Engineering (IWBOSE), pp. 1\u201310. IEEE (2019)","DOI":"10.1109\/IWBOSE.2019.8666486"},{"key":"1_CR19","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"4","author":"Z Zibin","year":"2018","unstructured":"Zibin, Z., Xie, S., Dai, H.N., Chen, X., Wang, H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 4, 352\u2013375 (2018). https:\/\/doi.org\/10.1504\/IJWGS.2018.095647","journal-title":"Int. J. Web Grid Serv."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Blockchain Technology and Emerging Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-31420-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,19]],"date-time":"2024-10-19T11:49:13Z","timestamp":1729338553000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-31420-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031314193","9783031314209"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-31420-9_1","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BlockTEA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain Technology and Emerging Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blocktea2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy Plus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}