{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T17:21:01Z","timestamp":1715707261717},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s11623-017-0816-x","type":"journal-article","created":{"date-parts":[[2017,8,4]],"date-time":"2017-08-04T03:32:34Z","timestamp":1501817554000},"page":"482-486","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Anwendung der Blockchain au\u00dferhalb von Geldw\u00e4hrungen"],"prefix":"10.1007","volume":"41","author":[{"given":"Stephan","family":"Wiefling","sequence":"first","affiliation":[]},{"given":"Luigi","family":"Lo Iacono","sequence":"additional","affiliation":[]},{"given":"Frederik","family":"Sandbrink","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,5]]},"reference":[{"key":"816_CR1","unstructured":"https:\/\/www.heise.de\/newsticker\/meldung\/Bitcoin-Technik-Blockchainals-Wunderwaffe-der-Finanzwirtschaft-2699919.html, abgerufen am 21.02.2017"},{"key":"816_CR2","unstructured":"http:\/\/www.sueddeutsche.de\/wissen\/energie-wie-blockchain-technikdas-energiesystem-revolutionieren-kann-1.3117309#redirectedFromLa ndingpage, abgerufen am 21.02.17"},{"key":"816_CR3","unstructured":"http:\/\/www.verbraucherzentrale.nrw\/blockchain, abgerufen am 21.02.2017"},{"key":"816_CR4","unstructured":"https:\/\/anwaltsblatt.anwaltverein.de\/files\/anwaltsblatt.de\/Rubriken\/news\/2016\/AnwBl%202016,%20612_Blocher.pdf, abgerufen am 21.02.17"},{"key":"816_CR5","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1257\/jep.29.2.213","volume":"29","author":"R. B\u00f6hme","year":"2015","unstructured":"B\u00f6hme R, Christin N, Edelman B, Moore T (2015): Bitcoin: Economics, Technology, and Governance. J Econ Perspect 29:213\u2013238. Siehe auch den Beitrag von B\u00f6hme und Pesch in diesem Heft [16].","journal-title":"J Econ Perspect"},{"key":"816_CR6","unstructured":"https:\/\/fahrplan.events.ccc.de\/congress\/2016\/Fahrplan\/system\/event_attachments\/attachments\/000\/003\/123\/original\/handout.pdf, abgerufen am 21.02.17"},{"issue":"3","key":"816_CR7","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2014.49","volume":"12","author":"A. Gervais","year":"2014","unstructured":"Gervais, A., Karame, G., Capkun, S., Capkun, V.: Is Bitcoin a Decentralized Currency? IEEE Security & Privacy 12, no. 3 (May 2014), 54\u201360.","journal-title":"IEEE Security & Privacy"},{"key":"816_CR8","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"S. Nakamoto","year":"2008","unstructured":"Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. www.bitcoin. org (2008)."},{"key":"816_CR9","volume-title":"Decentralizing privacy: Using blockchain to protect personal data","author":"G. Zyskind","year":"2015","unstructured":"Zyskind, G., Nathan, O. und Pentland A. S. Decentralizing privacy: Using blockchain to protect personal data. Security and Privacy Workshops (SPW), 2015 IEEE (July 2015)"},{"key":"816_CR10","first-page":"25","volume-title":"Medrec: Using blockchain for medical data access and permission management","author":"A. Azaria","year":"2016","unstructured":"Azaria, A., Ekblaw, A., Vieira, T., Lippman, A. Medrec: Using blockchain for medical data access and permission management. 2016 2nd International Conference on Open and Big Data (OBD) 1 (August 2016), 25\u201330."},{"key":"816_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI.2015.39","volume-title":"World of empowered IoT users","author":"S. H. Hashemi","year":"2016","unstructured":"Hashemi, S. H, Faghari, F., Rausch, P., Campbell, R.H. World of empowered IoT users. Internet-of-Things Design and Implementation (IoTDI), 2016 IEEE First International Conference on (April 2016)."},{"key":"816_CR12","volume-title":"BRIGHT: A concept for a decentralized rights management system based on blockchain","author":"S. Fujimura","year":"2015","unstructured":"Fujimura, S., Watanbe, H., Nakadaira, A., Yamada, T., Akutsu, A., Kishigami, J. J. BRIGHT: A concept for a decentralized rights management system based on blockchain. Consumer Electronics\u2013Berlin (ICCE-Berlin), 2015 IEEE 5thInternational Conference on (September 2015)."},{"key":"816_CR13","volume-title":"Distributed decentral-ized domain name service","author":"B. Benshoof","year":"2016","unstructured":"Benshoof, B., Rosen, A., Bourgeois, A.G., Harrison, R.W. Distributed decentral-ized domain name service. Parallel and Distributed Processing Symposium Work-shops, 2016 IEEE International (August 2016)."},{"key":"816_CR14","volume-title":"Rep on the block: A next generation reputation system based on the blockchain","author":"R. Dennis","year":"2015","unstructured":"Dennis, R., Owen, G. Rep on the block: A next generation reputation system based on the blockchain. International Conference for Internet Technology and Secured Transactions (December 2015)."},{"key":"816_CR15","volume-title":"An agri-food supply chain traceability system for china based on RFID & blockchain technology","author":"F. Tian","year":"2016","unstructured":"Tian, F. An agri-food supply chain traceability system for china based on RFID & blockchain technology. Service Systems and Service Management (ICSSSM), 2016 13th International Conference on (August 2016)."},{"key":"816_CR16","volume-title":"Technische Grundlagen und datenschutzrechtliche Fragen der Blockchain-Technologie","author":"R. B\u00f6hme","year":"2017","unstructured":"B\u00f6hme, R. und Pesch, P. Technische Grundlagen und datenschutzrechtliche Fragen der Blockchain-Technologie, Datenschutz und Datensicherheit (DuD) 8\/2017 (in diesem Heft)."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-017-0816-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-017-0816-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-017-0816-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,9]],"date-time":"2018-05-09T04:54:59Z","timestamp":1525841699000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-017-0816-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":16,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["816"],"URL":"https:\/\/doi.org\/10.1007\/s11623-017-0816-x","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8]]}}}