{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T09:04:02Z","timestamp":1748595842277,"version":"3.37.3"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T00:00:00Z","timestamp":1656028800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T00:00:00Z","timestamp":1656028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s11276-022-03042-5","type":"journal-article","created":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T10:03:51Z","timestamp":1656065031000},"page":"4389-4401","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Achieving fair and accountable data trading for educational multimedia data based on blockchain"],"prefix":"10.1007","volume":"30","author":[{"given":"Xianxian","family":"Li","sequence":"first","affiliation":[]},{"given":"Jiahui","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Shiqi","family":"Gao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7023-7105","authenticated-orcid":false,"given":"Zhenkui","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Chunpei","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,24]]},"reference":[{"key":"3042_CR1","unstructured":"MOOCs. (2022). Retrieved March 18, 2022, from http:\/\/mooc.org\/."},{"key":"3042_CR2","unstructured":"Coursera. (2022). Retrieved March 18, 2022, from https:\/\/www.coursera.org\/."},{"key":"3042_CR3","unstructured":"XuetangX. (2022). Retrieved March 18, 2022, from http:\/\/www.xuetangx.com\/global."},{"key":"3042_CR4","unstructured":"Zhao, H.L., Xu, Y.P., Yang, Y. (2014). Technology research of mobile internet digital rights management security authorization. In Proceedings of the 19th national youth communication academic conference (pp. 299\u2013309)."},{"key":"3042_CR5","doi-asserted-by":"crossref","unstructured":"Shen, J. (2021). Blockchain technology and its applications in digital content copyright protection. In Proceedings of the 4th international conference on economic management and green development (pp. 18\u201325). Springer.","DOI":"10.1007\/978-981-16-5359-9_3"},{"key":"3042_CR6","doi-asserted-by":"crossref","unstructured":"Xianxian, L., Jiahui, P., Zhenkui, S., & Chunpei, L. (2021) Achieving fair and accountable data trading scheme for educational multimedia data based on blockchain. QSHINE 111\u2013125.","DOI":"10.1007\/978-3-030-91424-0_7"},{"issue":"3","key":"3042_CR7","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1016\/j.clsr.2017.11.008","volume":"34","author":"A Savelyev","year":"2018","unstructured":"Savelyev, A. (2018). Copyright in the blockchain era: Promises and challenges. Computer Law Security Review, 34(3), 550\u2013561.","journal-title":"Computer Law Security Review"},{"key":"3042_CR8","doi-asserted-by":"crossref","unstructured":"Tulyakov, S., Farooq, F., & Govindaraju, V. (2005). Symmetric hash functions for fingerprint minutiae. In International conference on pattern recognition and image analysis (pp. 30\u201338). Springer.","DOI":"10.1007\/11552499_4"},{"key":"3042_CR9","doi-asserted-by":"crossref","unstructured":"Charpentier, A., Fontaine, C., Furon, T., et al. (2011) An asymmetric fingerprinting scheme based on Tardos codes. In International workshop on information hiding (pp. 43\u201358). Springer.","DOI":"10.1007\/978-3-642-24178-9_4"},{"key":"3042_CR10","doi-asserted-by":"crossref","unstructured":"Farooq, F., Bolle, R. M., & Jea, T. Y, et al. (2007). Anonymous and revocable fingerprint recognition. In 2007 IEEE conference on computer vision and pattern recognition (pp. 1\u20137). IEEE.","DOI":"10.1109\/CVPR.2007.383382"},{"issue":"3","key":"3042_CR11","doi-asserted-by":"publisher","first-page":"1391","DOI":"10.1016\/j.eswa.2014.08.053","volume":"42","author":"A Qureshi","year":"2015","unstructured":"Qureshi, A., Megias, D., & Rifa-Pous, H. (2015). Framework for preserving security and privacy in peer-to-peer content distribution systems. Expert Systems with Applications, 42(3), 1391\u20131408.","journal-title":"Expert Systems with Applications"},{"key":"3042_CR12","unstructured":"Liu, Q., Safavi-Naini, R., & Sheppard, N. P. (2003) Digital rights management for content distribution. In Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 (Vol. 21, pp. 49\u201358)."},{"key":"3042_CR13","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1016\/j.future.2018.07.029","volume":"89","author":"Z Ma","year":"2018","unstructured":"Ma, Z., Jiang, M., Gao, H., et al. (2018). Blockchain for digital rights management. Future Generation Computer Systems, 89, 746\u2013764.","journal-title":"Future Generation Computer Systems"},{"issue":"7","key":"3042_CR14","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1016\/S0167-4048(02)01117-3","volume":"21","author":"S Kenny","year":"2002","unstructured":"Kenny, S., & Korba, L. (2002). Applying digital rights management systems to privacy rights management. Computers Security, 21(7), 648\u2013664.","journal-title":"Computers Security"},{"key":"3042_CR15","unstructured":"Nakamoto, S. (2019). Bitcoin: A peer-to-peer electronic cash system. Manubot."},{"key":"3042_CR16","doi-asserted-by":"crossref","unstructured":"Mermer, G. B., Zeydan, E., & Arslan, S. S. (2018) . An overview of blockchain technologies: Principles, opportunities and challenges. In 2018 26th signal processing and communications applications conference (SIU) (pp. 1\u20134). IEEE.","DOI":"10.1109\/SIU.2018.8404513"},{"key":"3042_CR17","doi-asserted-by":"crossref","unstructured":"Fullmer, D., & Morse, A. S. (2018). Analysis of difficulty control in bitcoin and proof-of-work blockchains. In 2018 IEEE conference on decision and control (CDC) (pp. 5988\u20135992). IEEE.","DOI":"10.1109\/CDC.2018.8619082"},{"key":"3042_CR18","first-page":"173","volume":"99","author":"M Castro","year":"1999","unstructured":"Castro, M., & Liskov, B. (1999). Practical byzantine fault tolerance. OSDI, 99, 173\u2013186.","journal-title":"OSDI"},{"key":"3042_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, C., Guo, Y., & Du, H. et al. (2020). Pfcrowd: Privacy-preserving and federated crowdsourcing framework by using blockchain. In 2020 IEEE\/ACM 28th international symposium on quality of service (IWQoS) (pp. 1\u201310). IEEE.","DOI":"10.1109\/IWQoS49365.2020.9212891"},{"key":"3042_CR20","unstructured":"Guo, Y., Xie, H., & Miao, Y., et al. (2020). Fedcrowd: A federated and privacy-preserving crowdsourcing platform on blockchain. IEEE Transactions on Services Computing."},{"issue":"8","key":"3042_CR21","doi-asserted-by":"publisher","first-page":"6624","DOI":"10.1109\/JIOT.2021.3051295","volume":"8","author":"C Zhang","year":"2021","unstructured":"Zhang, C., Guo, Y., Jia, X., et al. (2021). Enabling proxy-free privacy-preserving and federated crowdsourcing by using blockchain. IEEE Internet of Things Journal, 8(8), 6624\u20136636.","journal-title":"IEEE Internet of Things Journal"},{"key":"3042_CR22","doi-asserted-by":"crossref","unstructured":"Wang, M., Guo, Y., & Zhang, C., et al. (2021). MedShare: a privacy-preserving medical data sharing system by using blockchain. IEEE Transactions on Services Computing.","DOI":"10.1109\/TSC.2021.3114719"},{"issue":"8","key":"3042_CR23","first-page":"3690","volume":"14","author":"Z Li","year":"2017","unstructured":"Li, Z., Kang, J., Yu, R., et al. (2017). Consortium blockchain for secure energy trading in industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3690\u20133700.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"6","key":"3042_CR24","doi-asserted-by":"publisher","first-page":"3548","DOI":"10.1109\/TII.2019.2893433","volume":"15","author":"K Gai","year":"2019","unstructured":"Gai, K., Wu, Y., Zhu, L., et al. (2019). Privacy-preserving energy trading using consortium blockchain in smart grid. IEEE Transactions on Industrial Informatics, 15(6), 3548\u20133558.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"5","key":"3042_CR25","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1109\/TDSC.2016.2616861","volume":"15","author":"NZ Aitzhan","year":"2016","unstructured":"Aitzhan, N. Z., & Svetinovic, D. (2016). Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Transactions on Dependable and Secure Computing, 15(5), 840\u2013852.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"3042_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107994","volume":"191","author":"D Hu","year":"2021","unstructured":"Hu, D., Li, Y., Pan, L., et al. (2021). A blockchain-based trading system for big data. Computer Networks, 191, 107994.","journal-title":"Computer Networks"},{"key":"3042_CR27","doi-asserted-by":"crossref","unstructured":"Sheng, D., Xiao, M., & Liu A, et al. (2020). CPchain: A copyright-preserving crowdsourcing data trading framework based on blockchain. In 2020 29th international conference on computer communications and networks (ICCCN) (pp. 1\u20139). IEEE.","DOI":"10.1109\/ICCCN49398.2020.9209731"},{"key":"3042_CR28","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/TIFS.2019.2928256","volume":"15","author":"W Dai","year":"2019","unstructured":"Dai, W., Dai, C., Choo, K. K. R., et al. (2019). SDTE: A secure blockchain-based data trading ecosystem. IEEE Transactions on Information Forensics and Security, 15, 725\u2013737.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"3042_CR29","doi-asserted-by":"crossref","unstructured":"Ren, K., Guo, Y., & Li, J., et al. (2020). Hybridx: New hybrid index for volume-hiding range queries in data outsourcing services. In 2020 IEEE 40th international conference on distributed computing systems (ICDCS) (pp. 23\u201333). IEEE.","DOI":"10.1109\/ICDCS47774.2020.00014"},{"issue":"4","key":"3042_CR30","first-page":"1893","volume":"18","author":"C Cai","year":"2019","unstructured":"Cai, C., Zheng, Y., Du, Y., et al. (2019). Towards private, robust, and verifiable crowdsensing systems via public blockchains. IEEE Transactions on Dependable and Secure Computing, 18(4), 1893\u20131907.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"3042_CR31","doi-asserted-by":"crossref","unstructured":"Duan, H., Zheng, Y., & Du, Y., et al. (2019). Aggregating crowd wisdom via blockchain: A private, correct, and robust realization. In 2019 IEEE international conference on pervasive computing and communications (PerCom) (pp. 1\u201310). IEEE.","DOI":"10.1109\/PERCOM.2019.8767412"},{"key":"3042_CR32","first-page":"359","volume":"2","author":"M Zhaoxiong","year":"2018","unstructured":"Zhaoxiong, M., Tetsuya, M., & Sumiko, M. (2018). Hirotsugu kinoshita: Design scheme of copyright management system based on digital watermarking and blockchain. COMPSAC, 2, 359\u2013364.","journal-title":"COMPSAC"},{"issue":"2","key":"3042_CR33","doi-asserted-by":"publisher","first-page":"1416","DOI":"10.1109\/TII.2020.2982942","volume":"17","author":"C Huang","year":"2020","unstructured":"Huang, C., Liu, D., Ni, J., et al. (2020). Achieving accountable and efficient data sharing in industrial internet of things. IEEE Transactions on Industrial Informatics, 17(2), 1416\u20131427.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"3042_CR34","unstructured":"Chen, Z., Wang, Y., & Ni, T., et al. (2020). DCDChain: A credible architecture of digital copyright detection based on blockchain. arXiv preprint arXiv:2010.01235"},{"key":"3042_CR35","doi-asserted-by":"crossref","unstructured":"Qureshi, A., & Megias, D. (2019) . Blockchain-based P2P multimedia content distribution using collusion-resistant fingerprinting. In 2019 Asia-Pacific signal and information processing association annual summit and conference (APSIPA ASC) (pp. 1606\u20131615). IEEE.","DOI":"10.1109\/APSIPAASC47483.2019.9023054"},{"key":"3042_CR36","doi-asserted-by":"crossref","unstructured":"Kuribayashi, M., & Funabiki, N. (2019). Decentralized tracing protocol for fingerprinting system. APSIPA Transactions on Signal and Information Processing 8.","DOI":"10.1017\/ATSIP.2018.28"},{"issue":"11","key":"3042_CR37","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/2994581","volume":"59","author":"S Underwood","year":"2016","unstructured":"Underwood, S. (2016). Blockchain beyond bitcoin. Communications of the ACM, 59(11), 15\u201317.","journal-title":"Communications of the ACM"},{"issue":"5","key":"3042_CR38","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D Boneh","year":"1998","unstructured":"Boneh, D., & Shaw, J. (1998). Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5), 1897\u20131905.","journal-title":"IEEE Transactions on Information Theory"},{"key":"3042_CR39","unstructured":"Engle, S. (2005). Fingerprinting and the marking assumption. Ecs228 cryptography for E-commerce."},{"issue":"4","key":"3042_CR40","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1109\/TSP.2003.809378","volume":"51","author":"T Wade","year":"2003","unstructured":"Wade, T., Min, W. Z., Jane, W., et al. (2003). Anti-collusion-fingerprinting-for-multimedia. IEEE Transactions on Signal Processing, 51(4), 1069\u20131087.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"3042_CR41","unstructured":"Brasser, F., M\u00fcller, U., & Dmitrienko A., et al. (2017). Software grand exposure: SGX cache attacks are practical. In 11th USENIX workshop on offensive technologies (WOOT 17)."},{"key":"3042_CR42","unstructured":"Bowman, M., et al. (2018). Private data objects: An overview. arXiv preprint arXiv:1807.05686"},{"key":"3042_CR43","unstructured":"Benet J. (2014). Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561"},{"key":"3042_CR44","doi-asserted-by":"crossref","unstructured":"Rubinstein, A. (1982) . Perfect equilibrium in a bargaining model. Econometrica: Journal of the Econometric Society 97\u2013109.","DOI":"10.2307\/1912531"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03042-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-022-03042-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03042-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T15:58:10Z","timestamp":1720022290000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-022-03042-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,24]]},"references-count":44,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["3042"],"URL":"https:\/\/doi.org\/10.1007\/s11276-022-03042-5","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2022,6,24]]},"assertion":[{"value":"29 May 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}