{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:39Z","timestamp":1740122859473,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T00:00:00Z","timestamp":1624665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T00:00:00Z","timestamp":1624665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"crossref","award":["ECR\/2015\/000243"],"award-info":[{"award-number":["ECR\/2015\/000243"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11042-021-10948-3","type":"journal-article","created":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T00:02:13Z","timestamp":1624665733000},"page":"29423-29436","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Blockchain-based multimedia content distribution with the assured system update mechanism"],"prefix":"10.1007","volume":"80","author":[{"given":"Saurabh","family":"Rana","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8115-6397","authenticated-orcid":false,"given":"Dheerendra","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Sourav","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,26]]},"reference":[{"key":"10948_CR1","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP\u201907). IEEE, pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"10948_CR2","doi-asserted-by":"crossref","unstructured":"bt Abd Halim N S, Rahman M A, Azad S, Kabir M N (2017) Blockchain security hole: Issues and solutions. In: International Conference of Reliable Information and Communication Technology. Springer, pp 739\u2013746","DOI":"10.1007\/978-3-319-59427-9_76"},{"key":"10948_CR3","doi-asserted-by":"crossref","unstructured":"Chen H-B, Lee W-B, Chen T-H (2018) A novel drm scheme for accommodating expectations of personal use. Multimed Tools Appl:1\u201316","DOI":"10.1007\/s11042-018-5614-4"},{"key":"10948_CR4","unstructured":"De S J, Ruj S (2017) Efficient decentralized attribute based access control for mobile clouds. IEEE transactions on cloud computing"},{"issue":"2","key":"10948_CR5","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"key":"10948_CR6","unstructured":"Ghosal S K, Mukhopadhyay S, Hossain S, Sarkar R Application of lah transform for security and privacy of data through information hiding in telecommunication. Trans Emerging Telecommun Technol, pp e3984"},{"issue":"4-5","key":"10948_CR7","first-page":"272","volume":"19","author":"SK Ghosal","year":"2014","unstructured":"Ghosal S K, Mandal J K (2014) Binomial transform based fragile watermarking for image authentication. J Inf Secur Appl 19(4-5):272\u2013281","journal-title":"J Inf Secur Appl"},{"key":"10948_CR8","first-page":"320","volume":"46","author":"SK Ghosal","year":"2019","unstructured":"Ghosal S K, Mandal J K (2019) On the use of the stirling transform in image steganography. J Inf Secur Appl 46:320\u2013330","journal-title":"J Inf Secur Appl"},{"key":"10948_CR9","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security. Acm, pp 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"10948_CR10","doi-asserted-by":"publisher","first-page":"88012","DOI":"10.1109\/ACCESS.2019.2925625","volume":"7","author":"R Guo","year":"2019","unstructured":"Guo R, Shi H, Zheng D, Jing C, Zhuang C, Wang Z (2019) Flexible and efficient blockchain-based abe scheme with multi-authority for medical on demand in telemedicine system. IEEE Access 7:88012\u201388025","journal-title":"IEEE Access"},{"key":"10948_CR11","doi-asserted-by":"crossref","unstructured":"Hari A, Lakshman TV (2016) The internet blockchain: A distributed, tamper-resistant transaction framework for the internet. In: Proceedings of the 15th ACM Workshop on Hot Topics in Networks, pp 204\u2013210","DOI":"10.1145\/3005745.3005771"},{"issue":"1","key":"10948_CR12","doi-asserted-by":"publisher","first-page":"e0169414","DOI":"10.1371\/journal.pone.0169414","volume":"12","author":"J Jung","year":"2017","unstructured":"Jung J, Kang D, Lee D, Won D (2017) An improved and secure anonymous biometric-based user authentication with key agreement scheme for the integrated epr information system. PloS one 12(1):e0169414","journal-title":"PloS one"},{"key":"10948_CR13","doi-asserted-by":"crossref","unstructured":"Kan L, Wei Y, Muhammad A H, Siyuan W, Linchao G, Kai H (2018) A multiple blockchains architecture on inter-blockchain communication. In: 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, pp 139\u2013145","DOI":"10.1109\/QRS-C.2018.00037"},{"key":"10948_CR14","doi-asserted-by":"crossref","unstructured":"Katz J, Sahai A, Waters B (2008) Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: annual international conference on the theory and applications of cryptographic techniques. Springer, pp 146\u2013162","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"10948_CR15","unstructured":"King S, Nadal S (2012) Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper, August 19, 1"},{"issue":"2","key":"10948_CR16","first-page":"262","volume":"47","author":"C-C Lee","year":"2018","unstructured":"Lee C-C, Li C-T, Chen Z-W, Lai Y-M (2018) A biometric-based authentication and anonymity scheme for digital rights management system. Inf Technol Control 47(2):262\u2013274","journal-title":"Inf Technol Control"},{"key":"10948_CR17","first-page":"19","volume":"39","author":"C-C Lee","year":"2018","unstructured":"Lee C-C, Li C-T, Chen Z-W, Lai Y-M, Shieh J-C (2018) An improved e-drm scheme for mobile environments. J Inf Secur Appl 39:19\u201330","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"10948_CR18","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2012","unstructured":"Li M, Yu S, Zheng Y, Ren K, Lou W (2012) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131\u2013143","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"10948_CR19","unstructured":"Liang X, Li X, Lu R, Lin X, Shen X (2011) An efficient and secure user revocation scheme in mobile social networks. In: 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011. IEEE, pp 1\u20135"},{"key":"10948_CR20","doi-asserted-by":"crossref","unstructured":"Malik N, Nanda P, Arora A, He X, Puthal D (2018) Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). IEEE, pp 674\u2013679","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00099"},{"key":"10948_CR21","doi-asserted-by":"publisher","first-page":"106382","DOI":"10.1016\/j.ymssp.2019.106382","volume":"135","author":"I Mistry","year":"2020","unstructured":"Mistry I, Tanwar S, Tyagi S, Kumar N (2020) Blockchain for 5g-enabled iot for industrial automation: A systematic review, solutions, and challenges. Mech Syst Signal Process 135:106382","journal-title":"Mech Syst Signal Process"},{"key":"10948_CR22","unstructured":"Nakamoto S, Bitcoin A (2008) A peer-to-peer electronic cash system. Bitcoin.\u2013https:\/\/bitcoin.org\/bitcoin.pdf"},{"issue":"5","key":"10948_CR23","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.cose.2011.05.006","volume":"30","author":"G Wang","year":"2011","unstructured":"Wang G, Liu Q, Wu J, Guo M (2011) Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. comput Secur 30(5):320\u2013331","journal-title":"comput Secur"},{"key":"10948_CR24","unstructured":"Xu X, Chen Y, Yuan Y, Huang T, Zhang X, Qi L (2019) Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing. Multimed Tools Appl:1\u201326"},{"issue":"7","key":"10948_CR25","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1109\/TPDS.2013.253","volume":"25","author":"K Yang","year":"2013","unstructured":"Yang K, Jia X (2013) Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Trans Parallel Distrib Syst 25 (7):1735\u20131744","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"11","key":"10948_CR26","doi-asserted-by":"publisher","first-page":"1790","DOI":"10.1109\/TIFS.2013.2279531","volume":"8","author":"K Yang","year":"2013","unstructured":"Yang K, Jia X, Ren K, Zhang B, Xie R (2013) Dac-macs: Effective data access control for multiauthority cloud storage systems. IEEE Trans Inf Forensic Secur 8(11):1790\u20131801","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"5","key":"10948_CR27","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1007\/s00779-017-1047-8","volume":"21","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Li J, Zheng D, Chen X, Li H (2017) Towards privacy protection and malicious behavior traceability in smart health. Pers Ubiquit Comput 21(5):815\u2013830","journal-title":"Pers Ubiquit Comput"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10948-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10948-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10948-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T18:16:03Z","timestamp":1629396963000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10948-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,26]]},"references-count":27,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["10948"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10948-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,6,26]]},"assertion":[{"value":"28 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}