{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T17:02:45Z","timestamp":1773939765940,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,10,4]],"date-time":"2022-10-04T00:00:00Z","timestamp":1664841600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,4]],"date-time":"2022-10-04T00:00:00Z","timestamp":1664841600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672029"],"award-info":[{"award-number":["61672029"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972366"],"award-info":[{"award-number":["61972366"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s11280-022-01106-2","type":"journal-article","created":{"date-parts":[[2022,10,4]],"date-time":"2022-10-04T01:02:35Z","timestamp":1664845355000},"page":"1599-1624","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["EBSS: A secure blockchain-based sharing scheme for real estate financial credentials"],"prefix":"10.1007","volume":"26","author":[{"given":"Yadi","family":"Wu","sequence":"first","affiliation":[]},{"given":"Guiyao","family":"Tie","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jianxin","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3820-7632","authenticated-orcid":false,"given":"Jun","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,4]]},"reference":[{"issue":"9","key":"1106_CR1","first-page":"1","volume":"23","author":"N Tabatabai Hesari","year":"2017","unstructured":"Tabatabai Hesari, N.: Environmental and human factors of real estate transactions costs and control measures in Iran registration law. J. Encyclopedia Econ. Law 23(9), 1\u201320 (2017)","journal-title":"J. Encyclopedia Econ. Law"},{"key":"1106_CR2","doi-asserted-by":"crossref","unstructured":"Ullah, F., Al-Turjman, F.: A conceptual framework for blockchain smart contract adoption to manage real estate deals in smart cities. Neural Comput. Applic. 1\u201322 (2021)","DOI":"10.1007\/s00521-021-05800-6"},{"key":"1106_CR3","doi-asserted-by":"crossref","unstructured":"Jin, B., Song, W., Zhao, K., Li, S., Wang, Z.: Cloud infrastructure and monitoring system for real estate registration. In: 2018 26Th International Conference on Geoinformatics, pp. 1\u20139 (2018)","DOI":"10.1109\/GEOINFORMATICS.2018.8557182"},{"issue":"4","key":"1106_CR4","doi-asserted-by":"publisher","first-page":"1284","DOI":"10.1109\/TCC.2016.2586048","volume":"8","author":"Y Chen","year":"2020","unstructured":"Chen, Y., Wang, L., Chen, X., Ranjan, R., Zomaya, A.Y., Zhou, Y., Hu, S.: Stochastic workload scheduling for uncoordinated datacenter clouds with multiple qos constraints. IEEE Trans. Cloud Comput. 8(4), 1284\u20131295 (2020)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"1106_CR5","doi-asserted-by":"crossref","unstructured":"Shuaib, M., Alam, S., Daud, S.M.: Improving the authenticity of real estate land transaction data using blockchain-based security scheme. In: Anbar, M., Abdullah, N., Manickam, S. (eds.) Advances in Cyber Security - Second International Conference, ACes 2020, Penang, Malaysia, December 8-9, 2020. Communications in Computer and Information Science, vol. 1347, pp 3\u201310. Springer, Heidelberg (2020)","DOI":"10.1007\/978-981-33-6835-4_1"},{"issue":"4","key":"1106_CR6","doi-asserted-by":"publisher","first-page":"101","DOI":"10.4018\/IJEIS.2020100106","volume":"16","author":"RSA Usmani","year":"2020","unstructured":"Usmani, R.S.A., Hashem, I.A.T., Pillai, T.R., Saeed, A., Abdullahi, A.M.: Geographic information system and big spatial data: a review and challenges. Int. J. Enterp. Inf. Syst. 16(4), 101\u2013145 (2020)","journal-title":"Int. J. Enterp. Inf. Syst."},{"key":"1106_CR7","unstructured":"Dees, K., Rahman, S.: Enhancing infrastructure security in real estate. arXiv:1512.00064 (2015)"},{"issue":"4","key":"1106_CR8","doi-asserted-by":"publisher","first-page":"6493","DOI":"10.3233\/JIFS-189488","volume":"40","author":"C Zhang","year":"2021","unstructured":"Zhang, C., Li, M., Li, Y.: Financial risk analysis of real estate bubble based on machine learning and factor analysis model. J. Intell. Fuzzy Syst. 40(4), 6493\u20136504 (2021)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"1106_CR9","doi-asserted-by":"crossref","unstructured":"Liu, H., Chen, Y.L., Cui, N., Li, J., et al.: An effective data fusion model for detecting the risk of transmission line in smart grid. IEEE Internet of Things Journal (2021)","DOI":"10.1109\/JIOT.2021.3100522"},{"issue":"4","key":"1106_CR10","first-page":"400","volume":"15","author":"P Kalia","year":"2021","unstructured":"Kalia, P., Bansal, D., Sofat, S.: A hybrid approach for preserving privacy for real estate data. Int. J. Inf. Comput. Secur. 15(4), 400\u2013410 (2021)","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"1106_CR11","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2017.09.024","volume":"105","author":"Y Chen","year":"2020","unstructured":"Chen, Y., Chen, X., Liu, W., Zhou, Y., Zomaya, A.Y., Ranjan, R., Hu, S.: Stochastic scheduling for variation-aware virtual machine placement in a cloud computing CPS. Future Gener. Comput. Syst. 105, 779\u2013788 (2020)","journal-title":"Future Gener. Comput. Syst."},{"key":"1106_CR12","doi-asserted-by":"publisher","first-page":"103543","DOI":"10.1016\/j.csi.2021.103543","volume":"78","author":"X Ma","year":"2021","unstructured":"Ma, X., Wang, C., Chen, X.: Trusted data sharing with flexible access control based on blockchain. Comput. Stand. Interfaces 78, 103543 (2021)","journal-title":"Comput. Stand. Interfaces"},{"key":"1106_CR13","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1016\/j.cie.2019.07.003","volume":"135","author":"M Li","year":"2019","unstructured":"Li, M., Shen, L., Huang, G.Q.: Blockchain-enabled workflow operating system for logistics resources sharing in e-commerce logistics real estate service. Comput. Ind. Eng. 135, 950\u2013969 (2019)","journal-title":"Comput. Ind. Eng."},{"key":"1106_CR14","doi-asserted-by":"crossref","unstructured":"Chen, W., Guo, X., Chen, Z., Zheng, Z., Lu, Y.: Phishing scam detection on ethereum: Towards financial security for blockchain ecosystem. In: Bessiere, C. (ed.) Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, IJCAI 2020, pp 4506\u20134512. ijcai.org, Freiburg (2020)","DOI":"10.24963\/ijcai.2020\/621"},{"key":"1106_CR15","doi-asserted-by":"crossref","unstructured":"Nyaletey, E., Parizi, R.M., Zhang, Q., Choo, K.R.: Blockipfs - Blockchain-enabled interplanetary file system for forensic and trusted data traceability. In: IEEE International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019, pp 18\u201325. IEEE, New York (2019)","DOI":"10.1109\/Blockchain.2019.00012"},{"issue":"4","key":"1106_CR16","first-page":"1","volume":"15","author":"H Hong","year":"2019","unstructured":"Hong, H., Hu, B., Sun, Z.: Toward secure and accountable data transmission in narrow band internet of things based on blockchain. Int. J. Distributed Sens. Netw. 15(4), 1\u201310 (2019)","journal-title":"Int. J. Distributed Sens. Netw."},{"key":"1106_CR17","doi-asserted-by":"publisher","first-page":"101948","DOI":"10.1016\/j.adhoc.2019.101948","volume":"94","author":"Y Harbi","year":"2019","unstructured":"Harbi, Y., Aliouat, Z., Refoufi, A., Harous, S., Bentaleb, A.: Enhanced authentication and key management scheme for securing data transmission in the internet of things. Ad Hoc Netw. 94, 101948 (2019)","journal-title":"Ad Hoc Netw."},{"issue":"8","key":"1106_CR18","doi-asserted-by":"publisher","first-page":"4737","DOI":"10.1007\/s11276-018-1759-3","volume":"25","author":"X Jia","year":"2019","unstructured":"Jia, X., He, D., Kumar, N., Choo, K.R.: Authenticated key agreement scheme for fog-driven iot healthcare system. Wirel. Netw. 25(8), 4737\u20134750 (2019)","journal-title":"Wirel. Netw."},{"key":"1106_CR19","doi-asserted-by":"publisher","first-page":"102112","DOI":"10.1016\/j.sysarc.2021.102112","volume":"117","author":"Q Fan","year":"2021","unstructured":"Fan, Q., Chen, J., Deborah, L.J., Luo, M.: A secure and efficient authentication and data sharing scheme for internet of things based on blockchain. J. Syst. Archit. 117, 102112 (2021)","journal-title":"J. Syst. Archit."},{"issue":"1","key":"1106_CR20","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1108\/IMCS-10-2012-0060","volume":"22","author":"D Mani","year":"2014","unstructured":"Mani, D., Choo, K.R., Mubarak, S.: Information security in the south australian real estate industry: a study of 40 real estate organisations. Inf. Manag. Comput. Secur. 22(1), 24\u201341 (2014)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"1106_CR21","doi-asserted-by":"crossref","unstructured":"Karamitsos, I., Papadaki, M., Al Barghuthi, N.B., et al: Design of the blockchain smart contract: A use case for real estate. 9, 177\u2013190 (2018)","DOI":"10.4236\/jis.2018.93013"},{"key":"1106_CR22","unstructured":"Choo, K.R., Heravi, A., Mani, D., Mubarak, S.: Employees\u2019 intended information security behaviour in real estate organisations: A protection motivation perspective. In: 21St Americas Conference on Information Systems, AMCIS 2015, Puerto Rico, August 13-15, 2015. Association for Information Systems, New York (2015)"},{"key":"1106_CR23","doi-asserted-by":"crossref","unstructured":"Liu, X., Huang, H., Xiao, F., Ma, Z.: A blockchain-based trust management with conditional privacy-preserving announcement scheme for vanets. 7,4101\u20134112 (2020)","DOI":"10.1109\/JIOT.2019.2957421"},{"key":"1106_CR24","unstructured":"Li, Y., Huang, J., Qin, S., Wang, R.: Big data model of security sharing based on blockchain. In: 3Rd International Conference on Big Data Computing and Communications, BIGCOM 2017, Chengdu, China, August 10-11, 2017, pp 117\u2013121. IEEE Computer Society, New York (2017)"},{"key":"1106_CR25","doi-asserted-by":"crossref","unstructured":"Shrestha, A.K., Vassileva, J.: Blockchain-based research data sharing framework for incentivizing the data owners. In: Chen, S., Wang, H., Zhang, L. (eds.) Blockchain - ICBC 2018 - First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings. Lecture Notes in Computer Science, vol. 10974, pp 259\u2013266. Springer, Heidelberg (2018)","DOI":"10.1007\/978-3-319-94478-4_19"},{"key":"1106_CR26","doi-asserted-by":"crossref","unstructured":"Gupta, A., Rathod, J., Patel, D., Bothra, J., Shanbhag, S., Bhalerao, T.: Tokenization of real estate using blockchain technology. In: Zhou, J., Conti, M., Ahmed, C.M., Au, M.H., Batina, L., Li, Z. (eds.) Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science, vol. 12418, pp 77\u201390. Springer, Heidelberg (2020)","DOI":"10.1007\/978-3-030-61638-0_5"},{"issue":"5","key":"1106_CR27","doi-asserted-by":"publisher","first-page":"4557","DOI":"10.1109\/JIOT.2019.2960027","volume":"7","author":"S Zhang","year":"2020","unstructured":"Zhang, S., Lee, J.: A group signature and authentication scheme for blockchain-based mobile-edge computing. IEEE Internet Things J. 7(5), 4557\u20134565 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"1106_CR28","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1109\/JSAC.2011.110310","volume":"29","author":"L Chen","year":"2011","unstructured":"Chen, L., Ng, S., Wang, G.: Threshold anonymous announcement in vanets. IEEE J. Sel. Areas Commun. 29(3), 605\u2013615 (2011)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"1106_CR29","doi-asserted-by":"publisher","first-page":"87643","DOI":"10.1109\/ACCESS.2021.3068178","volume":"9","author":"TM Hewa","year":"2021","unstructured":"Hewa, T.M., Hu, Y., Liyanage, M., Kanhare, S.S., Ylianttila, M.: Survey on blockchain-based smart contracts: Technical aspects and future research. IEEE Access 9, 87643\u201387662 (2021)","journal-title":"IEEE Access"},{"key":"1106_CR30","doi-asserted-by":"crossref","unstructured":"Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain technology overview. arXiv:1906.11078 (2019)","DOI":"10.6028\/NIST.IR.8202"},{"key":"1106_CR31","doi-asserted-by":"publisher","first-page":"155145","DOI":"10.1109\/ACCESS.2020.3018816","volume":"8","author":"J Sun","year":"2020","unstructured":"Sun, J., Yao, X., Wang, S., Wu, Y.: Non-repudiation storage and access control scheme of insurance data based on blockchain in IPFS. IEEE Access 8, 155145\u2013155155 (2020)","journal-title":"IEEE Access"},{"key":"1106_CR32","doi-asserted-by":"crossref","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) Advances in Cryptology - EUROCRYPT \u201991, Workshop on the Theory and Application of Of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings. Lecture Notes in Computer Science, vol. 547, pp 257\u2013265. Springer, Heidelberg (1991)","DOI":"10.1007\/3-540-46416-6_22"},{"key":"1106_CR33","doi-asserted-by":"crossref","unstructured":"Pedersen, T.P.: Non-Interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) Advances in Cryptology - CRYPTO \u201991, 11Th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings. Lecture Notes in Computer Science, vol. 576, pp 129\u2013140. Springer, Heidelberg (1991)","DOI":"10.1007\/3-540-46766-1_9"},{"issue":"9","key":"1106_CR34","doi-asserted-by":"publisher","first-page":"7684","DOI":"10.1109\/TVT.2015.2480761","volume":"65","author":"L Zhang","year":"2016","unstructured":"Zhang, L., Song, J., Pan, J.: A privacy-preserving and secure framework for opportunistic routing in dtns. IEEE Trans. Veh. Technol. 65(9), 7684\u20137697 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1106_CR35","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.future.2019.08.002","volume":"102","author":"Y Chen","year":"2020","unstructured":"Chen, Y., Fan, J., Deng, Z., Du, B., Huang, X., Gui, Q.: PR-KELM: Icing level prediction for transmission lines in smart grid. Future Gener. Comput. Syst. 102, 75\u201383 (2020)","journal-title":"Future Gener. Comput. Syst."},{"key":"1106_CR36","doi-asserted-by":"crossref","unstructured":"Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) Selected Areas in Cryptography, 6Th Annual International Workshop, SAC\u201999, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings. Lecture Notes in Computer Science, vol. 1758, pp 184\u2013199. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-46513-8_14"},{"key":"1106_CR37","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M.K. (ed.) Advances in Cryptology - CRYPTO 2004, 24Th Annual International Cryptologyconference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings. Lecture Notes in Computer Science, vol. 3152, pp 56\u201372. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-28628-8_4"},{"key":"1106_CR38","unstructured":"Chen, L., Morrissey, P., Smart, N.P.: Pairings in trusted computing. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings. Lecture Notes in Computer Science, vol. 5209, pp 1\u201317. Springer, Heidelberg (2008)"},{"issue":"4","key":"1106_CR39","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/TDSC.2017.2707085","volume":"16","author":"F Rao","year":"2019","unstructured":"Rao, F.: On the security of a variant of elgamal encryption scheme. IEEE Trans. Dependable Secur. Comput. 16(4), 725\u2013728 (2019)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"1106_CR40","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.ins.2019.09.001","volume":"510","author":"M Khalili","year":"2020","unstructured":"Khalili, M., Dakhilalian, M., Susilo, W.: Efficient chameleon hash functions in the enhanced collision resistant model. Inf. Sci. 510, 155\u2013164 (2020)","journal-title":"Inf. Sci."},{"key":"1106_CR41","doi-asserted-by":"crossref","unstructured":"Berman, I., Degwekar, A., Rothblum, R.D., Vasudevan, P.N.: Multi-collision resistant hash functions and their applications. In: Nielsen, J.B. (ed.) Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II. Lecture Notes in Computer Science, vol. 10821, pp 133\u2013161. Springer, Heidelberg (2020)","DOI":"10.1007\/978-3-319-78375-8_5"},{"key":"1106_CR42","unstructured":"Metere, R., Dong, C.: Automated cryptographic analysis of the Pedersen commitment scheme. In: Rak, J., Bay, J., Kotenko, I.V., Popyack, L.J., Skormin, V.A., Szczypiorski, K. (eds.) Computer Network Security - 7Th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10446, pp 275\u2013287. Springer (2017)"},{"key":"1106_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES - the Advanced Encryption Standard. Information Security and Cryptography","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - the Advanced Encryption Standard. Information Security and Cryptography. Springer, Heidelberg (2002)"},{"key":"1106_CR44","doi-asserted-by":"crossref","unstructured":"Park, S., Sung, S.H., Chee, S., Yoon, E., Lim, J.: On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis. In: Zheng, Y. (ed.) Advances in Cryptology - ASIACRYPT 2002, 8Th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings. Lecture Notes in Computer Science, vol. 2501, pp 176\u2013191. Springer, Heidelberg (2002)","DOI":"10.1007\/3-540-36178-2_11"},{"key":"1106_CR45","doi-asserted-by":"publisher","first-page":"146348","DOI":"10.1109\/ACCESS.2019.2941972","volume":"7","author":"K Tsai","year":"2019","unstructured":"Tsai, K., Leu, F., You, I., Chang, S., Hu, S., Park, H.: Low-power AES data encryption architecture for a lorawan. IEEE Access 7, 146348\u2013146357 (2019)","journal-title":"IEEE Access"},{"key":"1106_CR46","doi-asserted-by":"crossref","unstructured":"Lai, R.W.F., Ronge, V., Ruffing, T., Schr\u00f6der, D., Thyagarajan, S.A.K., Wang, J.: Omniring: Scaling up private payments without trusted setup - formal foundations and constructions of ring confidential transactions with log-size proofs. IACR Cryptol. ePrint Arch. 580 (2019)","DOI":"10.1145\/3319535.3345655"},{"key":"1106_CR47","unstructured":"Demirel, D., Lancrenon, J.: How to securely prolong the computational bindingness of pedersen commitments. IACR Cryptol. ePrint Arch. 584 (2015)"},{"key":"1106_CR48","doi-asserted-by":"crossref","unstructured":"Boneh, D.: The Decision Diffie-Hellman Problem. In: Buhler, J. (ed.) Algorithmic Number Theory, Third International Symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998, Proceedings. Lecture Notes in Computer Science, vol. 1423, pp 48\u201363. Springer, Heidelberg (1998)","DOI":"10.1007\/BFb0054851"},{"key":"1106_CR49","doi-asserted-by":"crossref","unstructured":"Scott, M., Costigan, N., Abdulwahab, W.: Implementing cryptographic pairings on smartcards. In: Goubin, L., Matsui, M. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2006, 8Th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings. Lecture Notes in Computer Science, vol. 4249, pp 134\u2013147. Springer, Heidelberg (2006)","DOI":"10.1007\/11894063_11"},{"key":"1106_CR50","unstructured":"Zillow Group: Zillow. https:\/\/www.zillow.com\/research\/data\/, Last accessed on 2022\u20135-1 (2006-2022)"},{"key":"1106_CR51","doi-asserted-by":"publisher","first-page":"3838","DOI":"10.1109\/ACCESS.2020.3047365","volume":"9","author":"K Nicolas","year":"2021","unstructured":"Nicolas, K., Wang, Y., Giakos, G.C., Wei, B., Shen, H.: Blockchain system defensive overview for double-spend and selfish mining attacks: a systematic approach. IEEE Access 9, 3838\u20133857 (2021)","journal-title":"IEEE Access"},{"key":"1106_CR52","doi-asserted-by":"crossref","unstructured":"Kumar, P., Kumar, R., Gupta, G.P., Tripathi, R.: A distributed framework for detecting ddos attacks in smart contract-based blockchain-iot systems by leveraging fog computing. Trans. Emerg. Telecommun. Technol 32(6) (2021)","DOI":"10.1002\/ett.4112"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-022-01106-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11280-022-01106-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-022-01106-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T14:38:17Z","timestamp":1690382297000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11280-022-01106-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,4]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["1106"],"URL":"https:\/\/doi.org\/10.1007\/s11280-022-01106-2","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,4]]},"assertion":[{"value":"1 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"With regard to this submitted manuscript entitled \u201cEBSS: A secure blockchain-based sharing scheme for real estate financial credentials\u201d, we declare as follows:","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that the work described in this submission is original research that has not been previously published or under consideration by other conferences or journals.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All authors have agreed to publish this paper due to the original contribution prior to this submission.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"(check journal-specific guidelines for which heading to use): We declare that we do not have any commercial or associative interests that represent a conflict of interest and a conflict of competing interests in relation to the work submitted.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}},{"value":"All authors have agreed to participate in this work due to the collaboration and contribution in advance of this submission.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}}]}}