{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:09:53Z","timestamp":1725984593125},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319937960"},{"type":"electronic","value":"9783319937977"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93797-7_13","type":"book-chapter","created":{"date-parts":[[2018,7,20]],"date-time":"2018-07-20T12:54:11Z","timestamp":1532091251000},"page":"113-122","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Blockchain and IoT: Mind the Gap"],"prefix":"10.1007","author":[{"given":"Anass","family":"Sedrati","sequence":"first","affiliation":[]},{"given":"Mohamed Ahmed","family":"Abdelraheem","sequence":"additional","affiliation":[]},{"given":"Shahid","family":"Raza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,17]]},"reference":[{"key":"13_CR1","unstructured":"Office of Science UK Government Chief Scientific Advisor. Distributed ledger technology: beyond block chain (2016)"},{"issue":"15","key":"13_CR2","doi-asserted-by":"crossref","first-page":"2656","DOI":"10.1002\/sec.1260","volume":"9","author":"IE Bagci","year":"2016","unstructured":"Bagci, I.E., Raza, S., Roedig, U., Voigt, T.: Fusion: coalesced confidential storage and communication framework for the iot. Secur. Commun. Netw. 9(15), 2656\u20132673 (2016). sec.1260","journal-title":"Secur. Commun. Netw."},{"issue":"8","key":"13_CR3","doi-asserted-by":"crossref","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661\u20132674 (2013)","journal-title":"Ad Hoc Netw."},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Bormann, C., Ersue, M., Keranen, A: Terminology for constrained-node networks. Technical report (2014)","DOI":"10.17487\/rfc7228"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Rescorla, E., Modadugu, N.: Datagram transport layer security version 1.2 (2012)","DOI":"10.17487\/rfc6347"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Raza, S., Helgason, T., Papadimitratos, P., Voigt, T.: Securesense: end-to-end secure communication architecture for the cloud-connected Internet of Things. Future Gener. Comput. Syst. 77, pp. 40\u201351. Elsevier (2017)","DOI":"10.1016\/j.future.2017.06.008"},{"key":"13_CR7","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)"},{"key":"13_CR8","unstructured":"Deetman, S.: Bitcoin could consume as much electricity. https:\/\/web.archive.org\/web\/20160828092858\/http:\/\/motherboard.vice.com\/read\/bitcoin-could-consume-as-much-electricity-as-denmark-by-2020"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Sasson, E.B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: Decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459\u2013474. IEEE (2014)","DOI":"10.1109\/SP.2014.36"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Khovratovich, D.: Equihash: Asymmetric proof-of-work based on the generalized birthday problem (2017)","DOI":"10.5195\/LEDGER.2017.48"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-662-53357-4_8","volume-title":"Financial Cryptography and Data Security","author":"K Croman","year":"2016","unstructured":"Croman, K., Decker, C., Eyal, I., Gencer, A.E., Juels, A., Kosba, A., Miller, A., Saxena, P., Shi, E., G\u00fcn Sirer, E., Song, D., Wattenhofer, R.: On scaling decentralized blockchains. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 106\u2013125. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_8"},{"key":"13_CR12","unstructured":"Wood, G.: Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 151 (2014)"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: MedRec: Using blockchain for medical data access and permission management. In: International Conference on Open and Big Data (OBD), pp. 25\u201330. IEEE (2016)","DOI":"10.1109\/OBD.2016.11"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_2"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet measurement Conference, pp. 127\u2013140. ACM (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-39884-1_4","volume-title":"Financial Cryptography and Data Security","author":"E Androulaki","year":"2013","unstructured":"Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34\u201351. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_4"},{"key":"13_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-319-11212-1_20","volume-title":"Computer Security - ESORICS 2014","author":"T Ruffing","year":"2014","unstructured":"Ruffing, T., Moreno-Sanchez, P., Kate, A.: CoinShuffle: practical decentralized coin mixing for bitcoin. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8713, pp. 345\u2013364. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11212-1_20"},{"key":"13_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/978-3-662-45472-5_31","volume-title":"Financial Cryptography and Data Security","author":"J Bonneau","year":"2014","unstructured":"Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J.A., Felten, E.W.: Mixcoin: anonymity for bitcoin with accountable mixes. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 486\u2013504. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_31"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-662-48051-9_9","volume-title":"Financial Cryptography and Data Security","author":"L Valenta","year":"2015","unstructured":"Valenta, L., Rowan, B.: Blindcoin: blinded, accountable mixes for bitcoin. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976, pp. 112\u2013126. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48051-9_9"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: Anonymous distributed e-cash from bitcoin. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 397\u2013411. IEEE (2013)","DOI":"10.1109\/SP.2013.34"},{"key":"13_CR21","unstructured":"Ben-Sasson, E., Chiesa, A., Tromer, E., Virza, M.: Succinct non-interactive zero knowledge for a von neumann architecture. Cryptology ePrint Archive, Report 2013\/879 (2013). http:\/\/eprint.iacr.org\/2013\/879"},{"key":"13_CR22","unstructured":"Brody, P., Pureswaran, V.: Device democracy: Saving the future of the Internet of Things. IBM, September 2014"},{"key":"13_CR23","unstructured":"Popov, S.: The tangle (2016). https:\/\/iota.org\/IOTA_Whitepaper.pdf"},{"key":"13_CR24","unstructured":"IOTA infosheet \/\/ blockchain 3.0. http:\/\/iotanodes.org\/IOTA_Infosheet_dec_2016_revised.pdf"},{"key":"13_CR25","unstructured":"S\u00f8nsteb\u00f8, D.: The transparency compendium. https:\/\/blog.iota.org\/the-transparency-compendium-26aa5bb8e260"},{"key":"13_CR26","unstructured":"Heilman, T.D.E., Narula, N., Virza, M.: IOTA vulnerability report: Cryptanalysis of the curl hash function enabling practical signature forgery attacks on the IOTA cryptocurrency (2017). https:\/\/github.com\/mit-dci\/tangled-curl"},{"key":"13_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-642-21969-6_23","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2011","author":"J Buchmann","year":"2011","unstructured":"Buchmann, J., Dahmen, E., Ereth, S., H\u00fclsing, A., R\u00fcckert, M.: On the security of the winternitz one-time signature scheme. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 363\u2013378. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21969-6_23"},{"key":"13_CR28","unstructured":"Guardtime. KSI blockchain technology. https:\/\/guardtime.com\/technology\/ksi-technology"},{"key":"13_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-642-41488-6_21","volume-title":"Secure IT Systems","author":"A Buldas","year":"2013","unstructured":"Buldas, A., Kroonmaa, A., Laanoja, R.: Keyless signatures\u2019 infrastructure: how to build global distributed hash-trees. In: Riis Nielson, H., Gollmann, D. (eds.) NordSec 2013. LNCS, vol. 8208, pp. 313\u2013320. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41488-6_21"},{"key":"13_CR30","unstructured":"Cachin, C.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers (2016)"},{"key":"13_CR31","unstructured":"Zyskind, G., Nathan, O., Pentland, A.: Enigma: Decentralized computation platform with guaranteed privacy (2015). arXiv preprint arXiv:1506.03471"},{"key":"13_CR32","unstructured":"Buterin, V.: Light clients and proof of stake (2015). https:\/\/blog.ethereum.org\/2015\/01\/10\/light-clients-proof-stake\/"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Interoperability, Safety and Security in IoT"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93797-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,20]],"date-time":"2019-10-20T23:09:18Z","timestamp":1571612958000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-93797-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319937960","9783319937977"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93797-7_13","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}