{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T01:00:27Z","timestamp":1760576427529,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531813","type":"print"},{"value":"9789819531820","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3182-0_12","type":"book-chapter","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:16:45Z","timestamp":1760555805000},"page":"196-213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Spectrum Resources Privacy-Preserving Allocation and Certificate Management Technology Based on Blockchain"],"prefix":"10.1007","author":[{"given":"Mengjiang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Haibin","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"issue":"3","key":"12_CR1","doi-asserted-by":"publisher","first-page":"2363","DOI":"10.1109\/JSYST.2018.2869274","volume":"13","author":"MM Butt","year":"2018","unstructured":"Butt, M.M., Macaluso, I., Galiotto, C., et al.: Fair dynamic spectrum management in licensed shared access systems. IEEE Syst. J. 13(3), 2363\u20132374 (2018)","journal-title":"IEEE Syst. J."},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Matinmikko-Blue, M., Yrj\u00f6l\u00e4, S., Ahokangas, P.: Spectrum management in the 6G era: the role of regulation and spectrum sharing. In: 2020 2nd 6G Wireless Summit (6G SUMMIT), pp. 1\u20135. IEEE (2020)","DOI":"10.1109\/6GSUMMIT49458.2020.9083851"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Mondal, S., Dutta, M.P., Chakraborty, S.K.: Dynamic spectrum management and spectrum sharing techniques in 5G networks: a survey. J. Mob. Multimedia 997\u20131038 (2024)","DOI":"10.13052\/jmm1550-4646.2052"},{"issue":"1","key":"12_CR4","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1109\/COMST.2017.2773628","volume":"20","author":"SK Sharma","year":"2017","unstructured":"Sharma, S.K., Bogale, T.E., Le, L.B., et al.: Dynamic spectrum sharing in 5G wireless networks with full-duplex technology: recent advances and research challenges. IEEE Commun. Surv. Tutor. 20(1), 674\u2013707 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"12_CR5","unstructured":"Sasson, E.B., Chiesa, A., Garman, C., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE symposium on security and privacy, pp. 459\u2013474. IEEE (2014)"},{"key":"12_CR6","unstructured":"Lee, J., Huh, J. H., Kim, S.: Blockchain-based decentralized spectrum trading for efficient spectrum utilization. IEEE Commun. Mag. 584\u2013597 (2019)"},{"issue":"1","key":"12_CR7","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/MWC.101.2100354","volume":"29","author":"Y Xiao","year":"2022","unstructured":"Xiao, Y., Shi, S., Lou, W., et al.: Decentralized spectrum access system: vision, challenges, and a blockchain solution. IEEE Wirel. Commun. 29(1), 220\u2013228 (2022)","journal-title":"IEEE Wirel. Commun."},{"issue":"2","key":"12_CR8","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1109\/TCCN.2019.2914052","volume":"5","author":"MBH Weiss","year":"2019","unstructured":"Weiss, M.B.H., Werbach, K., Sicker, D.C., et al.: On the application of blockchains to spectrum management. IEEE Trans. Cogn. Commun. Netw. 5(2), 193\u2013205 (2019)","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"issue":"6","key":"12_CR9","doi-asserted-by":"publisher","first-page":"5246","DOI":"10.1109\/JIOT.2020.2977220","volume":"7","author":"L Ou","year":"2020","unstructured":"Ou, L., Qin, Z., Liao, S., et al.: Singular spectrum analysis for local differential privacy of classifications in the smart grid. IEEE Internet Things J. 7(6), 5246\u20135255 (2020)","journal-title":"IEEE Internet Things J."},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Alqahtani T, Ansari S, Sambo Y, et al. Blockchain Based Decentralized Spectrum Trading Using Smart Contracts. 2024 7th International Conference on Advanced Communication Technologies and Networking (CommNet), pp. 1\u20135. IEEE (2024)","DOI":"10.1109\/CommNet63022.2024.10793377"},{"issue":"3","key":"12_CR11","doi-asserted-by":"publisher","first-page":"2664","DOI":"10.1109\/TNSM.2022.3180357","volume":"19","author":"M Wang","year":"2022","unstructured":"Wang, M., Rui, L., Yang, Y., et al.: A blockchain-based multi-CA cross-domain authentication scheme in decentralized autonomous network. IEEE Trans. Netw. Serv. Manage. 19(3), 2664\u20132676 (2022)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Shafagh, H., Hithnawi, A., Burkhalter, L., et al.: Secure sharing of partially homomorphic encrypted IoT data. In: Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, pp. 1\u201314 (2017)","DOI":"10.1145\/3131672.3131697"},{"issue":"15","key":"12_CR13","doi-asserted-by":"publisher","first-page":"13263","DOI":"10.1109\/JIOT.2022.3142989","volume":"9","author":"J Ye","year":"2022","unstructured":"Ye, J., Kang, X., Liang, Y.C., et al.: A trust-centric privacy-preserving blockchain for dynamic spectrum management in IoT networks. IEEE Internet Things J. 9(15), 13263\u201313278 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"12_CR14","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1109\/TDSC.2020.2983022","volume":"19","author":"Z Wang","year":"2020","unstructured":"Wang, Z., Lin, J., Cai, Q., et al.: Blockchain-based certificate transparency and revocation transparency. IEEE Trans. Dependable Secure Comput. 19(1), 681\u2013697 (2020)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"12_CR15","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1023\/A:1008354106356","volume":"19","author":"N Koblitz","year":"2000","unstructured":"Koblitz, N., Menezes, A., Vanstone, S.: The state of elliptic curve cryptography. Des. Codes Crypt. 19(2), 173\u2013193 (2000)","journal-title":"Des. Codes Crypt."},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Putz, B., Pernul, G.: Detecting blockchain security threats. In: 2020 IEEE International Conference on Blockchain (Blockchain), pp. 313\u2013320. IEEE (2020)","DOI":"10.1109\/Blockchain50366.2020.00046"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3182-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:16:47Z","timestamp":1760555807000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3182-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"ISBN":["9789819531813","9789819531820"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3182-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"15 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}