{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T09:11:55Z","timestamp":1771665115795,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031451546","type":"print"},{"value":"9783031451553","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45155-3_5","type":"book-chapter","created":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T03:02:01Z","timestamp":1699930921000},"page":"42-51","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing Privacy Protection in Intelligent Surveillance: Video Blockchain Solutions"],"prefix":"10.1007","author":[{"given":"Kasun Moolika","family":"Gedara","sequence":"first","affiliation":[]},{"given":"Minh","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Wei Qi","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,15]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1016\/j.procs.2017.05.391","volume":"109","author":"A Aldairi","year":"2017","unstructured":"Aldairi, A., Tawalbeh, L.: Cyber security attacks on smart cities and associated mobile technologies. Procedia Comput. Sci. 109, 1086\u20131091 (2017)","journal-title":"Procedia Comput. Sci."},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1007\/s13198-020-00971-2","volume":"11","author":"A Alketbi","year":"2020","unstructured":"Alketbi, A., Nasir, Q., Abu Talib, M.: Novel blockchain reference model for government services: Dubai government case study. Int. J. Syst. Assur. Eng. Manag. 11, 1170\u20131191 (2020)","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"5_CR3","unstructured":"Becker, G.: Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis. Master\u2019s Thesis. Seminararbeit Ruhr-Universit\u00a8at Bochum (2008)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Chen, X., Xing, Z., Karki, B., Li, Y., Chen, Z.: Blockchain simulation: a web application for IT education. In: Annual Computing and Communication Workshop and Conference (CCWC), pp. 486\u2013491 (2021)","DOI":"10.1109\/CCWC51732.2021.9375934"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Deepak, K., Badiger, A.N., Akshay, J., Awomi, K.A., Deepak, G., Harish Kumar, N.: Blockchain-based management of video surveillance systems: a survey. In: International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1256\u20131258 (2020)","DOI":"10.1109\/ICACCS48705.2020.9074197"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"22","DOI":"10.22215\/timreview\/1111","volume":"7","author":"MA Engelhardt","year":"2017","unstructured":"Engelhardt, M.A.: Hitching healthcare to the chain: an introduction to blockchain technology in the healthcare sector. Technol. Innov. Manag. Rev. 7, 22\u201334 (2017)","journal-title":"Technol. Innov. Manag. Rev."},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Fill, H., Haerer, F.: Knowledge blockchains: applying blockchain technologies to enterprise modelling. In: Hawaii International Conference on System Sciences, pp. 4045\u20134054 (2018)","DOI":"10.24251\/HICSS.2018.509"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8876317","volume":"2020","author":"J Fu","year":"2020","unstructured":"Fu, J., Qiao, S., Huang, Y., Si, X., Li, B., Yuan, C.: A study on the optimization of blockchain hashing algorithm based on PRCA. Secur. Commun. Netw. 2020, 1\u201312 (2020). https:\/\/doi.org\/10.1155\/2020\/8876317","journal-title":"Secur. Commun. Netw."},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Gallo, P., Pongnumkul, S., Nguyen, U.Q.: BlockSee: Blockchain for IoT video surveillance in smart cities. In: IEEE International Conference on Environment and Electrical Engineering and IEEE Industrial and Commercial Power Systems Europe (EEEIC\/I and CPS) (2018)","DOI":"10.1109\/EEEIC.2018.8493895"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Gedara, K., Nguyen, M., Yan, W.: Visual blockchain for intelligent surveillance in a smart city. Blockchain Technologies for Sustainable Development in Smart Cities, IGI Global (2021)","DOI":"10.4018\/978-1-7998-9274-8.ch012"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"118021","DOI":"10.1016\/j.jclepro.2019.118021","volume":"240","author":"RV George","year":"2019","unstructured":"George, R.V., Harsh, H.O., Ray, P., Babu, A.K.: Food quality traceability prototype for restaurants using blockchain and food quality data index. J. Cleaner Prod. 240, 118021 (2019). https:\/\/doi.org\/10.1016\/j.jclepro.2019.118021","journal-title":"J. Cleaner Prod."},{"key":"5_CR12","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1016\/j.promfg.2020.03.081","volume":"46","author":"AM Gergely","year":"2020","unstructured":"Gergely, A.M., Crainicu, B.: Randadminsuite: a new privacy-enhancing solution for private blockchains. Procedia Manuf. 46, 562\u2013569 (2020)","journal-title":"Procedia Manuf."},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.diin.2018.12.002","volume":"28","author":"T G\u0159ivna","year":"2019","unstructured":"G\u0159ivna, T., Dr\u00e1pal, J.: Attacks on the confidentiality, integrity and availability of data and computer systems in the criminal case law of the Czech Republic. Digit. Investig. 28, 1\u201313 (2019)","journal-title":"Digit. Investig."},{"key":"5_CR14","unstructured":"Hartwig, M.: ECDSA security in bitcoin and Ethereum: A research survey. Blog. Coinfabrik, pp. 1\u201310 (2016)"},{"issue":"2","key":"5_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3490236","volume":"55","author":"O Hasan","year":"2023","unstructured":"Hasan, O., Brunie, L., Bertino, E.: Privacy-preserving reputation systems based on blockchain and other cryptographic building blocks: a survey. ACM Comput. Surv. 55(2), 1\u201337 (2023)","journal-title":"ACM Comput. Surv."},{"key":"5_CR16","unstructured":"Hu, R.: Visual Blockchain Using Merkle Tree. Master\u2019s Thesis, Auckland University of Technology, New Zealand (2019)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Hu, R., Yan, W.: Design and implementation of visual blockchain with Merkle tree. In: Handbook of Research on Multimedia Cyber Security, pp. 282\u2013295. IGI Global (2020)","DOI":"10.4018\/978-1-7998-2701-6.ch014"},{"issue":"3","key":"5_CR18","doi-asserted-by":"publisher","first-page":"484","DOI":"10.3390\/electronics9030484","volume":"9","author":"P Khan","year":"2020","unstructured":"Khan, P., Byun, Y.-C., Park, N.: A data verification system for CCTV surveillance cameras using blockchain technology in smart cities. Electronics 9(3), 484 (2020)","journal-title":"Electronics"},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"MA Khan","year":"2018","unstructured":"Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395\u2013411 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"5_CR20","first-page":"2532","volume":"8","author":"D Koo","year":"2018","unstructured":"Koo, D., Shin, Y., Yun, J., Hur, J.: Improving security and reliability in Merkle tree-based online data authentication with leakage resilience. Appl. Sci. (Switzerland) 8, 2532 (2018)","journal-title":"Appl. Sci. (Switzerland)"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Kumar, M., Kaur, G.: High performance scalable recursive block matrix inverse for multicore architectures. In: International Conference on Parallel, Distributed and Grid Computing, pp. 45\u201349 (2022)","DOI":"10.1109\/PDGC56933.2022.10053189"},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8839047","volume":"2020","author":"T Li","year":"2020","unstructured":"Li, T., et al.: Rational protocols and attacks in blockchain system. Secur. Commun. Netw. 2020, 1\u201311 (2020). https:\/\/doi.org\/10.1155\/2020\/8839047","journal-title":"Secur. Commun. Netw."},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Majdoubi, D.E.L., El Bakkali, H., Sadki, S.: Towards smart blockchain-based system for privacy and security in a smart city environment. In: International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech) (2020)","DOI":"10.1109\/CloudTech49835.2020.9365905"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Michael, M.M.: High performance dynamic lock-free hash tables and list-based sets. In: Annual ACM Symposium on Parallel Algorithms and Architectures, pp. 73\u201382 (2002)","DOI":"10.1145\/564870.564881"},{"key":"5_CR25","unstructured":"Mosakheil, J.H.: Security threats classification in blockchains. Culminating Projects in Information Assurance 141 (2018)"},{"key":"5_CR26","unstructured":"Shu, Y.: Blockchain for Security of a Cloud-based Online Auction System. Master\u2019s Thesis, Auckland University of Technology, New Zealand (2018)"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Shu, Y., Yu, J., Yan, W.: Blockchain for security of a cloud-based online auction system. Exploring Security in Software Architecture and Design, pp. 189\u2013210. IGI Global (2019)","DOI":"10.4018\/978-1-5225-6313-6.ch008"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Shu, Y., Yu, J., Yan, W.: Blockchain for security of cloud-based online auction. Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government. IGI Global (2021)","DOI":"10.4018\/978-1-7998-5351-0.ch033"}],"container-title":["Lecture Notes in Networks and Systems","Blockchain and Applications, 5th International Congress"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45155-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T03:03:45Z","timestamp":1699931025000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45155-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031451546","9783031451553"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45155-3_5","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"15 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BLOCKCHAIN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Congress on Blockchain and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guimaraes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blockchain2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.blockchain-congress.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}