{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:37:10Z","timestamp":1762504630621,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031775703"},{"type":"electronic","value":"9783031775710"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-77571-0_87","type":"book-chapter","created":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T02:01:20Z","timestamp":1734660080000},"page":"909-919","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["ASPMi: An Adaptable SPAM Protection Mechanism for\u00a0IoT Scenarios"],"prefix":"10.1007","author":[{"given":"Francisco","family":"Moya","sequence":"first","affiliation":[]},{"given":"Francisco J.","family":"Quesada","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Mart\u00ednez","sequence":"additional","affiliation":[]},{"given":"Fco. Javier","family":"Estrella","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,21]]},"reference":[{"key":"87_CR1","doi-asserted-by":"crossref","unstructured":"Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp. 1\u201315 (2018)","DOI":"10.1145\/3190508.3190538"},{"key":"87_CR2","unstructured":"Brown, R.G., Carlyle, J., Grigg, I., Hearn, M.: Corda: an introduction. R3 CEV 1(15), 14 (2016)"},{"key":"87_CR3","doi-asserted-by":"crossref","unstructured":"Buterin, V.: Ethereum white paper (2013)","DOI":"10.1186\/1687-2770-2013-180"},{"key":"87_CR4","doi-asserted-by":"publisher","first-page":"126927","DOI":"10.1109\/ACCESS.2020.3006078","volume":"8","author":"C Fan","year":"2020","unstructured":"Fan, C., Ghaemi, S., Khazaei, H., Musilek, P.: Performance evaluation of blockchain systems: a systematic survey. IEEE Access 8, 126927\u2013126950 (2020)","journal-title":"IEEE Access"},{"issue":"3","key":"87_CR5","doi-asserted-by":"publisher","DOI":"10.1115\/1.4050244","volume":"21","author":"MG Juarez","year":"2021","unstructured":"Juarez, M.G., Botti, V.J., Giret, A.S.: Digital twins: review and challenges. J. Comput. Inf. Sci. Eng. 21(3), 030802 (2021)","journal-title":"J. Comput. Inf. Sci. Eng."},{"issue":"2","key":"87_CR6","doi-asserted-by":"publisher","first-page":"96","DOI":"10.3390\/commodities2020006","volume":"2","author":"E Kapengut","year":"2023","unstructured":"Kapengut, E., Mizrach, B.: An event study of the Ethereum transition to proof-of-stake. Commodities 2(2), 96\u2013110 (2023)","journal-title":"Commodities"},{"key":"87_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-63688-7_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"A Kiayias","year":"2017","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357\u2013388. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_12"},{"key":"87_CR8","doi-asserted-by":"publisher","unstructured":"Laghari, A.A., Wu, K., Laghari, R.A., Ali, M., Khan, A.A.: A review and state of art of internet of things (IoT). Arch. Comput. Methods Eng., 1\u201319 (2021). https:\/\/doi.org\/10.1007\/s11831-021-09622-6","DOI":"10.1007\/s11831-021-09622-6"},{"key":"87_CR9","doi-asserted-by":"crossref","unstructured":"Moya, F., Quesada, F.J., Mart\u00ednez, L., Estrella, F.J.: CertifIoT: An IoT and DLT-Based Solution for Enhancing Trust and Transparency in Data Certification. In: International Conference on Ubiquitous Computing and Ambient Intelligence, pp. 127\u2013138. Springer (2023)","DOI":"10.1007\/978-3-031-48590-9_12"},{"key":"87_CR10","doi-asserted-by":"crossref","unstructured":"Moya, F., Quesada, F.J., Mart\u00ednez, L., Estrella, F.J.: Phonendo: a platform for publishing wearable data on distributed ledger technologies. Wireless Netw. 30, 1\u201315 (2023)","DOI":"10.1007\/s11276-023-03458-7"},{"key":"87_CR11","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)"},{"issue":"3","key":"87_CR12","first-page":"30","volume":"1","author":"S Popov","year":"2018","unstructured":"Popov, S.: The tangle. White Paper 1(3), 30 (2018)","journal-title":"White Paper"},{"key":"87_CR13","doi-asserted-by":"crossref","unstructured":"Reyna, A., Mart\u00edn, C., Chen, J., Soler, E., D\u00edaz, M.: On blockchain and its integration with IoT. challenges and opportunities. Future Gener. Comput. Syst. 88, 173\u2013190 (2018)","DOI":"10.1016\/j.future.2018.05.046"},{"key":"87_CR14","doi-asserted-by":"crossref","unstructured":"Saad, S.M.S., Radzi, R.Z.R.M., Othman, S.H.: Comparative analysis of the blockchain consensus algorithm between proof of stake and delegated proof of stake. In: 2021 International Conference on Data Science and Its Applications (ICoDSA), pp. 175\u2013180. IEEE (2021)","DOI":"10.1109\/ICoDSA53588.2021.9617549"},{"issue":"11s","key":"87_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3517189","volume":"54","author":"S Suhail","year":"2022","unstructured":"Suhail, S., et al.: Blockchain-based digital twins: research trends, issues, and future challenges. ACM Comput. Surv. (CSUR) 54(11s), 1\u201334 (2022)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"12","key":"87_CR16","doi-asserted-by":"publisher","first-page":"4102","DOI":"10.3390\/app10124102","volume":"10","author":"L Tawalbeh","year":"2020","unstructured":"Tawalbeh, L., Muheidat, F., Tawalbeh, M., Quwaider, M.: Iot privacy and security: challenges and solutions. Appl. Sci. 10(12), 4102 (2020)","journal-title":"Appl. Sci."},{"key":"87_CR17","doi-asserted-by":"crossref","unstructured":"Treiblmaier, H., Beck, R.: Business Transformation Through Blockchain, vol.\u00a01. Springer (2019)","DOI":"10.1007\/978-3-319-98911-2"},{"key":"87_CR18","doi-asserted-by":"publisher","unstructured":"Ullah, I., de\u00a0Roode, G., Meratnia, N., Havinga, P.: Threat modeling\u2014how to visualize attacks on iota? Sensors 21(5), 1834 (2021). https:\/\/doi.org\/10.3390\/s21051834, https:\/\/www.mdpi.com\/journal\/sensors","DOI":"10.3390\/s21051834"},{"issue":"2","key":"87_CR19","doi-asserted-by":"publisher","first-page":"47","DOI":"10.3390\/fi14020047","volume":"14","author":"H Xiong","year":"2022","unstructured":"Xiong, H., Chen, M., Wu, C., Zhao, Y., Yi, W.: Research on progress of blockchain consensus algorithm: a review on recent progress of blockchain consensus algorithms. Future Internet 14(2), 47 (2022)","journal-title":"Future Internet"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the International Conference on Ubiquitous Computing and Ambient Intelligence (UCAmI 2024)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-77571-0_87","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T02:14:36Z","timestamp":1734660876000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-77571-0_87"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031775703","9783031775710"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-77571-0_87","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"21 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"UCAmI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Ubiquitous Computing and Ambient Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belfast","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ucami2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ucami.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}