{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:50:05Z","timestamp":1742914205949,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811695759"},{"type":"electronic","value":"9789811695766"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-9576-6_6","type":"book-chapter","created":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T13:02:27Z","timestamp":1642856547000},"page":"65-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secure Dispersed Computing Scheme for\u00a0Internet of\u00a0Mobile Things"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6477-3705","authenticated-orcid":false,"given":"Yan","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8355-0969","authenticated-orcid":false,"given":"Ning","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0453-2613","authenticated-orcid":false,"given":"Jincai","family":"Zou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8837-3981","authenticated-orcid":false,"given":"Yuqiang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,22]]},"reference":[{"issue":"3","key":"6_CR1","first-page":"47","volume":"10","author":"M Alizadeh","year":"2020","unstructured":"Alizadeh, M., Andersson, K., Schel\u00e9n, O.: A survey of secure internet of things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47\u201375 (2020)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"key":"6_CR2","unstructured":"Baumgart, I., Mies, S.: IPFS - content addressed, versioned, P2P file system (DRAFT 3). In: Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS (2007)"},{"key":"6_CR3","unstructured":"Bhullar, J., Mancilla, A., Nijilar, A., Teixeira: the future of mobile computing in 2025. Technical report (2014)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Dispersed Computing: DARPA-BAA-16-41 1, 1\u201344 (2016)","DOI":"10.1016\/j.ascom.2016.04.001"},{"key":"6_CR5","doi-asserted-by":"publisher","unstructured":"Elazhary, H.: Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: disambiguation and research directions (2019). https:\/\/doi.org\/10.1016\/j.jnca.2018.10.021","DOI":"10.1016\/j.jnca.2018.10.021"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.sysarc.2018.05.007","volume":"91","author":"M Garcia-Valls","year":"2018","unstructured":"Garcia-Valls, M., Dubey, A., Botti, V.: Introducing the new paradigm of social dispersed computing: applications, technologies and challenges. J. Syst. Architect. 91, 83\u2013102 (2018). https:\/\/doi.org\/10.1016\/j.sysarc.2018.05.007","journal-title":"J. Syst. Architect."},{"key":"6_CR7","doi-asserted-by":"publisher","unstructured":"Hu, D., Krishnamachari, B.: Throughput optimized scheduler for dispersed computing systems. In: Proceedings - 2019 7th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2019 (2019). https:\/\/doi.org\/10.1109\/MobileCloud.2019.00018","DOI":"10.1109\/MobileCloud.2019.00018"},{"issue":"1","key":"6_CR8","first-page":"299","volume":"129","author":"N Hu","year":"2021","unstructured":"Hu, N., Teng, Y., Zhao, Y., Yin, S., Zhao, Y.: IDV: internet domain name verification based on blockchain. CMES-Comput. Model. Eng. Sci. 129(1), 299\u2013322 (2021)","journal-title":"CMES-Comput. Model. Eng. Sci."},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"1722","DOI":"10.1109\/TGCN.2021.3099804","volume":"5","author":"N Hu","year":"2021","unstructured":"Hu, N., Tian, Z., Du, X., Guizani, M.: An energy-efficient in-network computing paradigm for 6g. IEEE Trans. Green Commun. Netw. 5, 1722\u20131733 (2021)","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"6_CR10","doi-asserted-by":"publisher","unstructured":"Hu, N., Tian, Z., Du, X., Guizani, N., Zhu, Z.: Deep-green: a dispersed energy-efficiency computing paradigm for green industrial IoT. IEEE Trans. Green Commun. Netw. (2021). https:\/\/doi.org\/10.1109\/TGCN.2021.3064683","DOI":"10.1109\/TGCN.2021.3064683"},{"issue":"1","key":"6_CR11","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/MNET.011.2000176","volume":"35","author":"N Hu","year":"2021","unstructured":"Hu, N., et al.: Building agile and resilient UAV networks based on SDN and blockchain. IEEE Netw. 35(1), 57\u201363 (2021)","journal-title":"IEEE Netw."},{"issue":"2","key":"6_CR12","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.32604\/cmc.2020.010949","volume":"65","author":"N Hu","year":"2020","unstructured":"Hu, N., Yin, S., Su, S., Jia, X., Xiang, Q., Liu, H.: Blockzone: a decentralized and trustworthy data plane for DNS. CMC-Comput. Mater. Continua 65(2), 1531\u20131557 (2020)","journal-title":"CMC-Comput. Mater. Continua"},{"issue":"4","key":"6_CR13","doi-asserted-by":"publisher","first-page":"634","DOI":"10.3390\/electronics9040634","volume":"9","author":"X Jia","year":"2020","unstructured":"Jia, X., et al.: IRBA: an identity-based cross-domain authentication scheme for the internet of things. Electronics 9(4), 634 (2020)","journal-title":"Electronics"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Jia, X., Hu, N., Yin, S., Zhao, Y., Zhang, C., Cheng, X.: A2 chain: a blockchain-based decentralized authentication scheme for 5g-enabled IoT. In: Mobile Information Systems 2020 (2020)","DOI":"10.1155\/2020\/8889192"},{"key":"6_CR15","doi-asserted-by":"publisher","unstructured":"Knezevic, A., et al.: DEMO: CIRCE - a runtime scheduler for DAG-based dispersed computing. In: 2017 2nd ACM\/IEEE Symposium on Edge Computing, SEC 2017 (2017). https:\/\/doi.org\/10.1145\/3132211.3132451","DOI":"10.1145\/3132211.3132451"},{"key":"6_CR16","unstructured":"K\u00f6nig, L., Unger, S., Kieseberg, P., Tjoa, S., Josef Ressel Center for Blockchain: The risks of the blockchain a review on current vulnerabilities and attacks. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 110\u2013127 (2020)"},{"key":"6_CR17","unstructured":"Liu, N., Yu, M., Zang, W., Sandhu, R.: Cost and effectiveness of trustzone defense and side-channel attack on arm platform. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 1\u201315 (2020)"},{"key":"6_CR18","unstructured":"Marra, A.L., Martinelli, F., Mercaldo, F., Saracino, A., Sheikhalishahi, M.: D-BRIDEMAID: a distributed framework for collaborative and dynamic analysis of Android malware. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(3), 1\u201328 (2020)"},{"key":"6_CR19","doi-asserted-by":"publisher","unstructured":"Rahimzadeh, P., et al.: SPARCLE: stream processing applications over dispersed computing networks. In: Proceedings - International Conference on Distributed Computing Systems (2020). https:\/\/doi.org\/10.1109\/ICDCS47774.2020.00112","DOI":"10.1109\/ICDCS47774.2020.00112"},{"key":"6_CR20","doi-asserted-by":"publisher","unstructured":"Schurgot, M.R., Wang, M., Conway, A.E., Greenwald, L.G., Lebling, P.D.: A dispersed computing architecture for resource-centric computation and communication. IEEE Commun. Mag. (2019). https:\/\/doi.org\/10.1109\/MCOM.2019.1800776","DOI":"10.1109\/MCOM.2019.1800776"},{"key":"6_CR21","doi-asserted-by":"publisher","unstructured":"Talavera, L.E., Endler, M., Vasconcelos, I., Vasconcelos, R., Cunha, M., Da Silva Silva, F.J.: The mobile hub concept: enabling applications for the internet of mobile things. In: 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2015 (2015). https:\/\/doi.org\/10.1109\/PERCOMW.2015.7134005","DOI":"10.1109\/PERCOMW.2015.7134005"},{"issue":"3","key":"6_CR22","first-page":"31","volume":"10","author":"S Talegaon","year":"2020","unstructured":"Talegaon, S., Krishnan, R.: Administrative models for role based access control in Android. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 31\u201346 (2020)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"key":"6_CR23","unstructured":"Wong, S.K., Yiu, S.M.: Location spoofing attack detection with pre-installed sensors in mobile devices. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 16\u201330 (2020)"},{"key":"6_CR24","doi-asserted-by":"publisher","unstructured":"Wu, H., et al.: Resolving multi-task competition for constrained resources in dispersed computing: a bilateral matching game. IEEE Internet Things J. (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3075673","DOI":"10.1109\/JIOT.2021.3075673"},{"key":"6_CR25","doi-asserted-by":"publisher","unstructured":"Yang, C.S., Pedarsani, R., Avestimehr, A.S.: Communication-aware scheduling of serial tasks for dispersed computing. IEEE\/ACM Trans. Netw. (2019). https:\/\/doi.org\/10.1109\/TNET.2019.2919553","DOI":"10.1109\/TNET.2019.2919553"},{"key":"6_CR26","doi-asserted-by":"publisher","unstructured":"Yang, H., et al.: Dispersed computing for tactical edge in future wars: vision, architecture, and challenges. Wirel. Commun. Mob. Comput. (2021). https:\/\/doi.org\/10.1155\/2021\/8899186","DOI":"10.1155\/2021\/8899186"}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-9576-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,21]],"date-time":"2022-04-21T16:09:24Z","timestamp":1650557364000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-9576-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811695759","9789811695766"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-9576-6_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"22 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisecsymposium2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isyou.info\/conf\/mobisec21\/I","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"66","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}