{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:24:41Z","timestamp":1743038681672,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811695759"},{"type":"electronic","value":"9789811695766"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-9576-6_12","type":"book-chapter","created":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T13:02:27Z","timestamp":1642856547000},"page":"155-168","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Blockchain-Based Authentication Scheme for\u00a05G Applications"],"prefix":"10.1007","author":[{"given":"Lanfang","family":"Ren","sequence":"first","affiliation":[]},{"given":"Xiaoting","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Huachun","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,22]]},"reference":[{"key":"12_CR1","unstructured":"3gpp 5g security. https:\/\/www.3gpp.org\/\/news-events\/\/3gpp-news\/\/1975-sec-5g. Accessed 27 Oct 2021"},{"key":"12_CR2","unstructured":"3gpp tr 33.899: Study on the security aspects of the next generation system. Accessed 27 Oct 2021"},{"key":"12_CR3","unstructured":"3gpp ts 23.501 (v16.1.0): System architecture for the 5g system. Accessed 27 Oct 2021"},{"key":"12_CR4","unstructured":"3gpp ts 33.102 (v16.0.0): 3g security: security architecture. Accessed 27 Oct 2021"},{"key":"12_CR5","unstructured":"3gpp ts 33.501 (v16.4.0): Security architecture and procedures for 5g system. Accessed 27 Oct 2021"},{"key":"12_CR6","unstructured":"Hyperledger. http:\/\/www.hyperledger.org. Accessed 27 Oct 2021"},{"key":"12_CR7","unstructured":"Hyperledger fabric. http:\/\/github.com\/hyperledger\/fabric. Accessed 27 Oct 2021"},{"key":"12_CR8","unstructured":"Hyperledger fabric: [fab-12221] validator\/committer refactor-hyperledger jira. https:\/\/jira.hyperledger.org\/browse\/FAB-12221?filter=12526. Accessed 27 Oct 2021"},{"key":"12_CR9","unstructured":"Ietf rfc 3748: Extensible authentication protocol (EAP). Accessed 27 Oct 2021"},{"issue":"3","key":"12_CR10","first-page":"47","volume":"10","author":"M Alizadeh","year":"2020","unstructured":"Alizadeh, M., Andersson, K., Schel\u00e9n, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47\u201375 (2020)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp. 1\u201315 (2018)","DOI":"10.1145\/3190508.3190538"},{"key":"12_CR12","unstructured":"Cachin, C., et al.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers, Chicago, IL, vol. 310 (2016)"},{"issue":"5","key":"12_CR13","doi-asserted-by":"publisher","first-page":"e2099","DOI":"10.1002\/nem.2099","volume":"30","author":"C Gorenflo","year":"2020","unstructured":"Gorenflo, C., Lee, S., Golab, L., Keshav, S.: FastFabric: Scaling hyperledger fabric to 20 000 transactions per second. Int. J. Netw. Manag. 30(5), e2099 (2020)","journal-title":"Int. J. Netw. Manag."},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Huang, X., Yoshizawa, T., Baskaran, S.B.M.: Authentication mechanisms in the 5G system. J. ICT Standard. 61\u201378 (2021)","DOI":"10.13052\/jicts2245-800X.921"},{"key":"12_CR15","unstructured":"K\u00f6nig, L., Unger, S., Kieseberg, P., Tjoa, S., Josef Ressel Center BLOCKCHAINS: The risks of the blockchain a review on current vulnerabilities and attacks. J. Internet Serv. Inf. Secur. 10(3), 110\u2013127 (2020)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Ranjan, S., Negi, A., Jain, H., Pal, B., Agrawal, H.: Network system design using hyperledger fabric: permissioned blockchain framework. In: 2019 Twelfth International Conference on Contemporary Computing (IC3), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/IC3.2019.8844940"},{"issue":"1","key":"12_CR17","first-page":"85","volume":"12","author":"CN Ribalta","year":"2021","unstructured":"Ribalta, C.N., Lombard-Platet, M., Salinesi, C., Lafourcade, P.: Blockchain mirage or silver bullet? A requirements-driven comparative analysis of business and developers\u2019 perceptions in the accountancy domain. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 12(1), 85\u2013110 (2021)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl."},{"issue":"4","key":"12_CR18","first-page":"1","volume":"10","author":"CS Shih","year":"2019","unstructured":"Shih, C.S., Hsieh, W.Y., Kao, C.L.: Traceability for vehicular network real-time messaging based on blockchain technology. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 10(4), 1\u201321 (2019)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl."},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Song, F., Ai, Z., Zhang, H., You, I., Li, S.: Smart collaborative balancing for dependable network components in cyber-physical systems. IEEE Trans. Ind. Inf. (2020)","DOI":"10.1109\/TII.2020.3029766"},{"issue":"2","key":"12_CR20","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1109\/TII.2019.2950109","volume":"16","author":"F Song","year":"2019","unstructured":"Song, F., Ai, Z., Zhou, Y., You, I., Choo, K.K.R., Zhang, H.: Smart collaborative automation for receive buffer control in multipath industrial networks. IEEE Trans. Industr. Inf. 16(2), 1385\u20131394 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"3","key":"12_CR21","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MNET.011.2000613","volume":"35","author":"F Song","year":"2021","unstructured":"Song, F., Li, L., You, I., Zhang, H.: Enabling heterogeneous deterministic networks with smart collaborative theory. IEEE Netw. 35(3), 64\u201371 (2021)","journal-title":"IEEE Netw."},{"issue":"4","key":"12_CR22","first-page":"49","volume":"9","author":"Z Tu","year":"2019","unstructured":"Tu, Z., Zhou, H., Li, K., Li, G.: DCTG: degree constrained topology generation algorithm for software-defined satellite network. J. Internet Serv. Inf. Secur. 9(4), 49\u201358 (2019)","journal-title":"J. Internet Serv. Inf. Secur."}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-9576-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,21]],"date-time":"2022-04-21T16:10:18Z","timestamp":1650557418000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-9576-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811695759","9789811695766"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-9576-6_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"22 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisecsymposium2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isyou.info\/conf\/mobisec21\/I","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"66","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}