{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T09:30:54Z","timestamp":1774690254351,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031448355","type":"print"},{"value":"9783031448362","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-44836-2_4","type":"book-chapter","created":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T13:03:55Z","timestamp":1695819835000},"page":"47-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Applying Blockchain Technology for\u00a0Privacy Preservation in\u00a0Android Platforms"],"prefix":"10.1007","author":[{"given":"H. G.","family":"Khiem","sequence":"first","affiliation":[]},{"given":"T. B.","family":"Nam","sequence":"additional","affiliation":[]},{"given":"M. N.","family":"Triet","sequence":"additional","affiliation":[]},{"given":"H. L.","family":"Huong","sequence":"additional","affiliation":[]},{"given":"T. D.","family":"Khoa","sequence":"additional","affiliation":[]},{"given":"Q. T.","family":"Bao","sequence":"additional","affiliation":[]},{"given":"N. T.","family":"Phuc","sequence":"additional","affiliation":[]},{"given":"M. D.","family":"Hieu","sequence":"additional","affiliation":[]},{"given":"V. C. P.","family":"Loc","sequence":"additional","affiliation":[]},{"given":"T. L.","family":"Quy","sequence":"additional","affiliation":[]},{"given":"N. T.","family":"Anh","sequence":"additional","affiliation":[]},{"given":"Q. N.","family":"Hien","sequence":"additional","affiliation":[]},{"given":"L. K.","family":"Bang","sequence":"additional","affiliation":[]},{"given":"D. P. N.","family":"Trong","sequence":"additional","affiliation":[]},{"given":"N. T. K.","family":"Ngan","sequence":"additional","affiliation":[]},{"given":"H.","family":"Son","sequence":"additional","affiliation":[]},{"given":"K. V.","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,28]]},"reference":[{"issue":"4","key":"4_CR1","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.1287\/isre.2020.0931","volume":"31","author":"S Al-Natour","year":"2020","unstructured":"Al-Natour, S., et al.: An empirical investigation of the antecedents and consequences of privacy uncertainty in the context of mobile apps. Inf. Syst. Res. 31(4), 1037\u20131063 (2020)","journal-title":"Inf. Syst. Res."},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1016\/j.future.2020.02.002","volume":"107","author":"M Alazab","year":"2020","unstructured":"Alazab, M., et al.: Intelligent mobile malware detection using permission requests and API calls. Futur. Gener. Comput. Syst. 107, 509\u2013521 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Balasubramanium, S., et al.: A survey on data privacy and preservation using blockchain in healthcare organization. In: International Conference on Advance Computing and Innovative Technologies in Engineering, pp. 956\u2013962. IEEE (2021)","DOI":"10.1109\/ICACITE51222.2021.9404650"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Bandara, E., et al.: A blockchain and self-sovereign identity empowered digital identity platform. In: 2021 International Conference on Computer Communications and Networks (ICCCN), pp. 1\u20137. IEEE (2021)","DOI":"10.1109\/ICCCN52240.2021.9522184"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Chen, S., et al.: AUSERA: automated security vulnerability detection for android apps. In: 37th IEEE\/ACM International Conference on Automated Software Engineering, pp. 1\u20135 (2022)","DOI":"10.1145\/3551349.3559524"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/j.future.2021.05.023","volume":"124","author":"Z Chen","year":"2021","unstructured":"Chen, Z., et al.: A blockchain-based preserving and sharing system for medical data privacy. Futur. Gener. Comput. Syst. 124, 338\u2013350 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"2","key":"4_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 1\u201329 (2014)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Fan, M., et al.: An empirical evaluation of GDPR compliance violations in android mHealth apps. In: 2020 IEEE 31st international symposium on software reliability engineering (ISSRE), pp. 253\u2013264. IEEE (2020)","DOI":"10.1109\/ISSRE5003.2020.00032"},{"key":"4_CR9","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2006","unstructured":"Hankerson, D., et al.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2006)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-319-93411-2_4","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"V Haupert","year":"2018","unstructured":"Haupert, V., Maier, D., Schneider, N., Kirsch, J., M\u00fcller, T.: Honey, i shrunk your app security: the state of android app hardening. In: Giuffrida, C., Bardin, S., Blanc, G. (eds.) DIMVA 2018. LNCS, vol. 10885, pp. 69\u201391. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93411-2_4"},{"issue":"5","key":"4_CR11","first-page":"677","volume":"10","author":"NTT Le","year":"2019","unstructured":"Le, N.T.T., et al.: Assuring non-fraudulent transactions in cash on delivery by introducing double smart contracts. Int. J. Adv. Comput. Sci. Appl. 10(5), 677\u2013684 (2019)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"100349","DOI":"10.1016\/j.smhl.2022.100349","volume":"26","author":"MR Mia","year":"2022","unstructured":"Mia, M.R., et al.: A comparative study on HIPAA technical safeguards assessment of android mHealth applications. Smart Health 26, 100349 (2022)","journal-title":"Smart Health"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Sengupta, A., et al.: User control of personal mhealth data using a mobile blockchain app: design science perspective. JMIR mHealth uHealth 10(1), e32104 (2022)","DOI":"10.2196\/32104"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Son, H.X., Carminati, B., Ferrari, E.: A risk assessment mechanism for android apps. In: 2021 IEEE International Conference on Smart Internet of Things (SmartIoT), pp. 237\u2013244. IEEE (2021)","DOI":"10.1109\/SmartIoT52359.2021.00044"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-031-21280-2_17","volume-title":"Information Security Practice and Experience","author":"HX Son","year":"2022","unstructured":"Son, H.X., Carminati, B., Ferrari, E.: PriApp-install: learning user privacy preferences on mobile apps\u2019 installation. In: Su, C., Gritzalis, D., Piuri, V. (eds.) ISPEC 2022. LNCS, vol. 13620, pp. 306\u2013323. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-21280-2_17"},{"issue":"3","key":"4_CR16","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/s41019-022-00189-1","volume":"7","author":"HX Son","year":"2022","unstructured":"Son, H.X., Carminati, B., Ferrari, E.: A risk estimation mechanism for android apps based on hybrid analysis. Data Sci. Eng. 7(3), 242\u2013252 (2022)","journal-title":"Data Sci. Eng."},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-031-34444-2_10","volume-title":"Web Engineering","author":"HX Son","year":"2023","unstructured":"Son, H.X., et al.: In2P-med: toward the individual privacy preferences identity in the medical web apps. In: Garrig\u00f3s, I., Murillo Rodr\u00edguez, J.M., Wimmer, M. (eds.) ICWE 2023. LNCS, vol. 13893, pp. 126\u2013140. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-34444-2_10"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.diin.2015.01.001","volume":"13","author":"KA Talha","year":"2015","unstructured":"Talha, K.A., et al.: APK auditor: permission-based android malware detection system. Digit. Investig. 13, 1\u201314 (2015)","journal-title":"Digit. Investig."},{"key":"4_CR19","doi-asserted-by":"publisher","first-page":"110533","DOI":"10.1016\/j.jss.2020.110533","volume":"163","author":"J Xiao","year":"2020","unstructured":"Xiao, J., et al.: An android application risk evaluation framework based on minimum permission set identification. J. Syst. Softw. 163, 110533 (2020)","journal-title":"J. Syst. Softw."},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, H., et al.: Protecting data in android external data storage. In: 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 924\u2013925. IEEE (2019)","DOI":"10.1109\/COMPSAC.2019.00143"},{"issue":"4","key":"4_CR21","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng, Z., et al.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352\u2013375 (2018)","journal-title":"Int. J. Web Grid Serv."}],"container-title":["Lecture Notes in Computer Science","Web Services \u2013 ICWS 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-44836-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T13:04:19Z","timestamp":1695819859000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-44836-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031448355","9783031448362"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-44836-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"28 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICWS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Honolulu, HI","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icws2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.servicessociety.org\/icws","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}