{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T07:08:15Z","timestamp":1726124895329},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"21-23","license":[{"start":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T00:00:00Z","timestamp":1626825600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T00:00:00Z","timestamp":1626825600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s11042-021-11183-6","type":"journal-article","created":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T16:29:30Z","timestamp":1626884970000},"page":"31887-31906","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Network data security sharing system based on blockchain"],"prefix":"10.1007","volume":"80","author":[{"given":"Xinghua","family":"Lu","sequence":"first","affiliation":[]},{"given":"Peihao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yiran","family":"Ke","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,21]]},"reference":[{"key":"11183_CR1","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. https:\/\/ethos.bl.uk\/OrderDetails.do?uin=uk.bl.ethos.694896"},{"issue":"5","key":"11183_CR2","first-page":"1","volume":"21","author":"SM Al-Saleem","year":"2018","unstructured":"Al-Saleem SM, Ali A, Khan N (2018) Energy efficient key agreement scheme for ubiquitous and continuous remote healthcare systems using data mining technique [J]. Clust Comput 21(5):1\u201312","journal-title":"Clust Comput"},{"issue":"4","key":"11183_CR3","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1109\/TCC.2016.2543722","volume":"6","author":"T Feilong","year":"2018","unstructured":"Feilong T, Yang LT, Tang C et al (2018) A dynamical and load-balanced flow scheduling approach for big data centers in clouds [J]. IEEE Trans Cloud Comput 6(4):915\u2013928","journal-title":"IEEE Trans Cloud Comput"},{"issue":"sp1","key":"11183_CR4","doi-asserted-by":"publisher","first-page":"718","DOI":"10.2112\/SI103-147.1","volume":"103","author":"D Geng","year":"2020","unstructured":"Geng D (2020) Design of heterogeneous data integration and sharing system for coastal international trade [J]. J Coast Res 103(sp1):718","journal-title":"J Coast Res"},{"issue":"6","key":"11183_CR5","doi-asserted-by":"publisher","first-page":"5799","DOI":"10.1109\/TVT.2020.2967052","volume":"69","author":"V Hassija","year":"2020","unstructured":"Hassija V, Chamola V, Garg S, Krishna DNG, Kaddoum G, Jayakody DNK (2020) A Blockchain-based framework for lightweight data sharing and energy trading in V2G network [J]. IEEE Trans Veh Technol 69(6):5799\u20135812","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"11183_CR6","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MITS.2018.2811449","volume":"10","author":"LF Herrera-Quintero","year":"2018","unstructured":"Herrera-Quintero LF, Samper-Zapater JJ, Svitek M, David W (2018) Special section on ITS services to Smart City context [guest editorial][J]. IEEE Intell Transp Syst Mag 10(2):4\u20135","journal-title":"IEEE Intell Transp Syst Mag"},{"issue":"C","key":"11183_CR7","first-page":"114","volume":"263","author":"GV Leeuwen","year":"2020","unstructured":"Leeuwen GV, Alskaif T, Gibescu M et al (2020) An integrated blockchain-based energy management platform with bilateral trading for microgrid communities [J]. Appl Energy 263(C):114\u2013123","journal-title":"Appl Energy"},{"issue":"6","key":"11183_CR8","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2019.1800722","volume":"57","author":"K Lei","year":"2019","unstructured":"Lei K, Zhang Q, Lou JJ et al (2019) Securing ICN-based UAV Ad Hoc networks with blockchain[J]. IEEE Commun Mag 57(6):26\u201332","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"11183_CR9","first-page":"147","volume":"19","author":"CT Li","year":"2018","unstructured":"Li CT, Lee CC, Weng CY (2018) A secure three party node authentication and key establishment scheme for the internet of things environment [J]. J Internet Technol 19(1):147\u2013155","journal-title":"J Internet Technol"},{"issue":"4","key":"11183_CR10","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1109\/TSC.2015.2475743","volume":"11","author":"XY Li","year":"2018","unstructured":"Li XY, Ma HD, Yao WB et al (2018) Data-driven and feedback-enhanced trust computing pattern for large-scale multi-cloud collaborative services [J]. IEEE Trans Serv Comput 11(4):671\u2013684","journal-title":"IEEE Trans Serv Comput"},{"key":"11183_CR11","doi-asserted-by":"crossref","unstructured":"Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform [J]. Multimed Tools Appl","DOI":"10.1007\/s11042-016-3971-4"},{"issue":"4","key":"11183_CR12","first-page":"1","volume":"77","author":"X Liao","year":"2017","unstructured":"Liao X, Guo S, Yin J et al (2017) New cubic reference table based image steganography [J]. Multimed Tools Appl 77(4):1\u201318","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"11183_CR13","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1002\/JLB.4A0217-047R","volume":"103","author":"BT Nowlin","year":"2018","unstructured":"Nowlin BT, Wang J, Schafer JL et al (2018) Monocyte subsets exhibit transcriptional plasticity and a shared response to interferon in SIV-infected rhesus macaques [J]. J Leukoc Biol 103(1):141\u2013155","journal-title":"J Leukoc Biol"},{"issue":"5","key":"11183_CR14","first-page":"874","volume":"18","author":"DK Pattipati","year":"2016","unstructured":"Pattipati DK, Tentu AN, Venkaiah VC et al (2016) Sequential secret sharing scheme based on level ordered access structure [J]. Int J Netw Secur 18(5):874\u2013881","journal-title":"Int J Netw Secur"},{"issue":"4","key":"11183_CR15","first-page":"833","volume":"18","author":"J Shen","year":"2017","unstructured":"Shen J, Liu D, Lai C-F et al (2017) A secure identity-based dynamic group data sharing scheme for cloud computing [J]. J Internet Technol 18(4):833\u2013842","journal-title":"J Internet Technol"},{"key":"11183_CR16","doi-asserted-by":"publisher","unstructured":"Singh M, Aujla GS, Bali RS (2020) A deep learning-based blockchain mechanism for secure internet of drones environment [J]. IEEE Trans Intell Transp Syst PP(99):1\u201310. https:\/\/doi.org\/10.1109\/TITS.2020.2997469","DOI":"10.1109\/TITS.2020.2997469"},{"issue":"2","key":"11183_CR17","first-page":"307","volume":"48","author":"J Wang","year":"2019","unstructured":"Wang J, Gao J, Yang X et al (2019) Online data reveal key factors on salary expectation [J]. Dianzi Keji Daxue Xuebao\/J Univ Electron Sci Technol China 48(2):307\u2013314","journal-title":"Dianzi Keji Daxue Xuebao\/J Univ Electron Sci Technol China"},{"issue":"2","key":"11183_CR18","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1002\/ijfe.1692","volume":"24","author":"F Wen","year":"2019","unstructured":"Wen F, Min F, Zhang YJ, Yang C (2019) Crude oil price shocks, monetary policy, and China\u2019s economy [J]. Int J Financ Econ 24(2):812\u2013827","journal-title":"Int J Financ Econ"},{"issue":"4","key":"11183_CR19","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MNET.011.1900374","volume":"34","author":"J Yang","year":"2020","unstructured":"Yang J, Wen J, Jiang B, Wang H (2020) Blockchain-based sharing and tamper-proof framework of big data networking [J]. IEEE Netw 34(4):62\u201367","journal-title":"IEEE Netw"},{"issue":"1","key":"11183_CR20","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MNET.2018.1700172","volume":"32","author":"H Yin","year":"2018","unstructured":"Yin H, Guo DC, Wang K et al (2018) Hyperconnected network: a decentralized trusted computing and networking paradigm [J]. IEEE Netw 32(1):112\u2013117","journal-title":"IEEE Netw"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11183-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11183-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11183-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T04:40:58Z","timestamp":1633840858000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11183-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,21]]},"references-count":20,"journal-issue":{"issue":"21-23","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["11183"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11183-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,21]]},"assertion":[{"value":"17 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}]}}