{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T20:29:35Z","timestamp":1769200175041,"version":"3.49.0"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T00:00:00Z","timestamp":1671148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T00:00:00Z","timestamp":1671148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s12652-022-04501-9","type":"journal-article","created":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T11:02:56Z","timestamp":1671188576000},"page":"2525-2547","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Blockchain based authentication and access verfication scheme in smart home"],"prefix":"10.1007","volume":"14","author":[{"given":"Afshin","family":"Heshmati","sequence":"first","affiliation":[]},{"given":"Majid","family":"Bayat","sequence":"additional","affiliation":[]},{"given":"MohammadAli","family":"Doostari","sequence":"additional","affiliation":[]},{"given":"Seyed Morteza","family":"Pournaghi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,16]]},"reference":[{"issue":"2","key":"4501_CR1","doi-asserted-by":"publisher","first-page":"1389","DOI":"10.1007\/s11276-020-02523-9","volume":"27","author":"H Abdi Nasib Far","year":"2021","unstructured":"Abdi Nasib Far H, Bayat M, Kumar Das A, Fotouhi M, Pournaghi SM, Doostari MA (2021) LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT. Wireless Netw 27(2):1389\u20131412. https:\/\/doi.org\/10.1007\/s11276-020-02523-9","journal-title":"Wireless Netw"},{"issue":"3","key":"4501_CR2","doi-asserted-by":"publisher","first-page":"102482","DOI":"10.1016\/j.ipm.2020.102482","volume":"58","author":"M Ammi","year":"2021","unstructured":"Ammi M, Alarabi S, Benkhelifa E (2021) Customized blockchain-based architecture for secure smart home for lightweight IoT. Inf Process Manag 58(3):102482. https:\/\/doi.org\/10.1016\/j.ipm.2020.102482","journal-title":"Inf Process Manag"},{"key":"4501_CR3","doi-asserted-by":"publisher","unstructured":"Ashibani Y, Mahmoud QH (2018) An efficient and secure scheme for smart home communication using identity-based signcryption. 2017 IEEE 36th International Performance Computing and Communications Conference, IPCCC 2017 2018-Janua:1\u20137, https:\/\/doi.org\/10.1109\/PCCC.2017.8280497","DOI":"10.1109\/PCCC.2017.8280497"},{"issue":"2","key":"4501_CR4","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1109\/TCE.2012.6227438","volume":"58","author":"S Bhardwaj","year":"2012","unstructured":"Bhardwaj S, Ozcelebi T, Lukkien J, Uysal C (2012) Resource and service management architecture of a low capacity network for smart spaces. IEEE Trans Consum Electron 58(2):389\u2013396. https:\/\/doi.org\/10.1109\/TCE.2012.6227438","journal-title":"IEEE Trans Consum Electron"},{"key":"4501_CR5","doi-asserted-by":"publisher","unstructured":"Chakravorty A, Wlodarczyk T, Rong C (2013) Privacy preserving data analytics for smart homes. In: 2013 IEEE Security and Privacy Workshops, pp 23\u201327, https:\/\/doi.org\/10.1109\/SPW.2013.22","DOI":"10.1109\/SPW.2013.22"},{"key":"4501_CR6","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1016\/j.compeleceng.2017.08.003","volume":"69","author":"S Challa","year":"2018","unstructured":"Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, Vasilakos AV (2018) An efficient ecc-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput Electr Eng 69:534\u2013554","journal-title":"Comput Electr Eng"},{"key":"4501_CR7","doi-asserted-by":"publisher","unstructured":"Chen Y, Luo B (2012) S2A: Secure Smart Household Appliances. Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY \u201912 pp 217\u2013228, https:\/\/doi.org\/10.1145\/2133601.2133628, URL http:\/\/dl.acm.org\/citation.cfm?doid=2133601.2133628","DOI":"10.1145\/2133601.2133628"},{"key":"4501_CR8","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1016\/j.future.2017.05.048","volume":"86","author":"BC Chifor","year":"2018","unstructured":"Chifor BC, Bica I, Patriciu VV, Pop F (2018) A security authorization scheme for smart home Internet of Things devices. Futur Gener Comput Syst 86:740\u2013749. https:\/\/doi.org\/10.1016\/j.future.2017.05.048","journal-title":"Futur Gener Comput Syst"},{"key":"4501_CR9","doi-asserted-by":"publisher","unstructured":"Christidis K, Devetsikiotis M (2016) Blockchains and Smart Contracts for the Internet of Things,\u201d in IEEE Access, vol. 4, no. , pp. 2292-2303, 2016. IEEE Access 4:2292\u20132303, https:\/\/doi.org\/10.1109\/ACCESS.2016.2566339","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"4501_CR10","doi-asserted-by":"crossref","unstructured":"Collen A, Nijdam NA, Augusto-Gonzalez J, Katsikas SK, Giannoutakis KM, Spathoulas G, Gelenbe E, Votis K, Tzovaras D, Ghavami N, et\u00a0al. (2018) Ghost-safe-guarding home iot environments with personalised real-time risk control. In: International ISCIS Security Workshop, Springer, pp 68\u201378","DOI":"10.1007\/978-3-319-95189-8_7"},{"key":"4501_CR11","doi-asserted-by":"publisher","unstructured":"Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for IoT security and privacy: The case study of a smart home. 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2017 (January):618\u2013623, https:\/\/doi.org\/10.1109\/PERCOMW.2017.7917634","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"4501_CR12","doi-asserted-by":"publisher","first-page":"100158","DOI":"10.1016\/j.iot.2020.100158","volume":"9","author":"M Fakroon","year":"2020","unstructured":"Fakroon M, Alshahrani M, Gebali F, Traore I (2020) Secure remote anonymous user authentication scheme for smart home environment. Internet Things 9:100158. https:\/\/doi.org\/10.1016\/j.iot.2020.100158","journal-title":"Internet Things"},{"key":"4501_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102158","author":"X Feng","year":"2021","unstructured":"Feng X, Shi Q, Xie Q, Liu L (2021) An efficient privacy-preserving authentication model based on blockchain for VANETs. J Syst Arch. https:\/\/doi.org\/10.1016\/j.sysarc.2021.102158","journal-title":"J Syst Arch"},{"key":"4501_CR14","doi-asserted-by":"publisher","first-page":"32979","DOI":"10.1109\/ACCESS.2018.2842685","volume":"3536","author":"TM Fern\u00e1ndez-caram\u00e9s","year":"2018","unstructured":"Fern\u00e1ndez-caram\u00e9s TM, Member S (2018) A review on the use of blockchain for the internet of things. Ieee Access 3536:32979\u201333001. https:\/\/doi.org\/10.1109\/ACCESS.2018.2842685","journal-title":"Ieee Access"},{"key":"4501_CR15","doi-asserted-by":"publisher","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, Association for Computing Machinery, New York, NY, USA, CCS \u201906, p 89\u201398, https:\/\/doi.org\/10.1145\/1180405.1180418,","DOI":"10.1145\/1180405.1180418"},{"key":"4501_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.023","author":"V Gramoli","year":"2017","unstructured":"Gramoli V (2017) From blockchain consensus back to Byzantine consensus. Futur Gener Comput Syst. https:\/\/doi.org\/10.1016\/j.future.2017.09.023","journal-title":"Futur Gener Comput Syst"},{"issue":"5","key":"4501_CR17","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1007\/s00779-012-0541-2","volume":"17","author":"K Han","year":"2013","unstructured":"Han K, Kim J, Shon T, Ko D (2013) A novel secure key paring protocol for RF4CE ubiquitous smart home systems. Pers Ubiquit Comput 17(5):945\u2013949. https:\/\/doi.org\/10.1007\/s00779-012-0541-2","journal-title":"Pers Ubiquit Comput"},{"issue":"9","key":"4501_CR18","doi-asserted-by":"publisher","first-page":"2052","DOI":"10.1109\/TIFS.2016.2573746","volume":"11","author":"D He","year":"2016","unstructured":"He D, Zeadally S, Kumar N, Wu W (2016) Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures. IEEE Trans Inf Forensics Secur 11(9):2052\u20132064. https:\/\/doi.org\/10.1109\/TIFS.2016.2573746","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4501_CR19","doi-asserted-by":"publisher","unstructured":"He Q, Guan N, Lv M, Yi W (2018) On the Consensus Mechanisms of Blockchain\/DLT for Internet of Things. 2018 IEEE 13th International Symposium on Industrial Embedded Systems, SIES 2018 - Proceedings pp 1\u201310, https:\/\/doi.org\/10.1109\/SIES.2018.8442076","DOI":"10.1109\/SIES.2018.8442076"},{"key":"4501_CR20","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.cose.2018.07.011","volume":"78","author":"R Heartfield","year":"2018","unstructured":"Heartfield R, Loukas G, Budimir S, Bezemskij A, Fontaine JR, Filippoupolitis A, Roesch E (2018) A taxonomy of cyber-physical threats and impact in the smart home. Comput Secur 78:398\u2013428. https:\/\/doi.org\/10.1016\/j.cose.2018.07.011","journal-title":"Comput Secur"},{"key":"4501_CR21","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.cose.2018.07.011","volume":"78","author":"R Heartfield","year":"2018","unstructured":"Heartfield R, Loukas G, Budimir S, Bezemskij A, Fontaine JR, Filippoupolitis A, Roesch E (2018) A taxonomy of cyber-physical threats and impact in the smart home. Comput Secur 78:398\u2013428","journal-title":"Comput Secur"},{"issue":"13","key":"4501_CR22","doi-asserted-by":"publisher","first-page":"2214","DOI":"10.1002\/sec.1165","volume":"8","author":"SKH Islam","year":"2015","unstructured":"Islam SKH, Khan MK, Al-khouri AM (2015) Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Secur Commun Netw 8(13):2214\u20132231","journal-title":"Secur Commun Netw"},{"issue":"February","key":"4501_CR23","doi-asserted-by":"publisher","first-page":"102787","DOI":"10.1016\/j.jisa.2021.102787","volume":"58","author":"D Kaur","year":"2021","unstructured":"Kaur D, Kumar D (2021) Cryptanalysis and improvement of a two-factor user authentication scheme for smart home. J Inf Secur Appl 58(February):102787. https:\/\/doi.org\/10.1016\/j.jisa.2021.102787","journal-title":"J Inf Secur Appl"},{"key":"4501_CR24","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"MA Khan","year":"2018","unstructured":"Khan MA, Salah K (2018) IoT security: Review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395\u2013411. https:\/\/doi.org\/10.1016\/j.future.2017.11.022","journal-title":"Futur Gener Comput Syst"},{"issue":"2","key":"4501_CR25","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1108\/10662240910952355","volume":"19","author":"GW Kim","year":"2009","unstructured":"Kim GW, Lee DG, Han JW, Lee SH, Kim SW (2009) Security technologies based on a home gateway for making smart homes secure. Internet Res 19(2):209\u2013226. https:\/\/doi.org\/10.1108\/10662240910952355","journal-title":"Internet Res"},{"key":"4501_CR26","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-020-00238-6","author":"Y Kim","year":"2020","unstructured":"Kim Y, Park J (2020) Hybrid decentralized PBFT blockchain framework for openstack message queue. Human-Centr Comput Inf Sci. https:\/\/doi.org\/10.1186\/s13673-020-00238-6","journal-title":"Human-Centr Comput Inf Sci"},{"key":"4501_CR27","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","volume":"141","author":"DE Kouicem","year":"2018","unstructured":"Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: a top-down survey. Comput Netw 141:199\u2013221. https:\/\/doi.org\/10.1016\/j.comnet.2018.03.012","journal-title":"Comput Netw"},{"issue":"1","key":"4501_CR28","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1109\/JSEN.2015.2475298","volume":"16","author":"P Kumar","year":"2016","unstructured":"Kumar P, Gurtov A, Iinatti J, Ylianttila M, Sain M (2016) Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens J 16(1):254\u2013264. https:\/\/doi.org\/10.1109\/JSEN.2015.2475298","journal-title":"IEEE Sens J"},{"issue":"3","key":"4501_CR29","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport L, Shostak R, Pease M (1982) The Byzantine generals problem. ACM Trans Progr Lang Syst (TOPLAS) 4(3):382\u2013401. https:\/\/doi.org\/10.1145\/357172.357176","journal-title":"ACM Trans Progr Lang Syst (TOPLAS)"},{"key":"4501_CR30","doi-asserted-by":"publisher","unstructured":"Li J, Au MH, Susilo W, Xie D, Ren K (2010) Attribute-based signature and its applications. Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010 pp 60\u201369, https:\/\/doi.org\/10.1145\/1755688.1755697","DOI":"10.1145\/1755688.1755697"},{"key":"4501_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020","author":"X Li","year":"2017","unstructured":"Li X, Jiang P, Chen T, Luo X, Wen Q (2017) A survey on the security of blockchain systems. Fut Gen Comput Syst. https:\/\/doi.org\/10.1016\/j.future.2017.08.020","journal-title":"Fut Gen Comput Syst"},{"key":"4501_CR32","doi-asserted-by":"publisher","unstructured":"Li Y (2013) Design of a key establishment protocol for smart home energy management system. Proceedings - 5th International Conference on Computational Intelligence, Communication Systems, and Networks, CICSyN 2013 pp 88\u201393, https:\/\/doi.org\/10.1109\/CICSYN.2013.42","DOI":"10.1109\/CICSYN.2013.42"},{"issue":"February","key":"4501_CR33","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2018.05.005","volume":"116","author":"C Lin","year":"2018","unstructured":"Lin C, He D, Huang X, Choo KKR, Vasilakos AV (2018) BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J Netw Comput Appl 116(February):42\u201352. https:\/\/doi.org\/10.1016\/j.jnca.2018.05.005","journal-title":"J Netw Comput Appl"},{"key":"4501_CR34","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2018.05.005","volume":"116","author":"C Lin","year":"2018","unstructured":"Lin C, He D, Huang X, Choo KKR, Vasilakos AV (2018) BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J Netw Comput Appl 116:42\u201352. https:\/\/doi.org\/10.1016\/j.jnca.2018.05.005","journal-title":"J Netw Comput Appl"},{"key":"4501_CR35","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148863","author":"J Liu","year":"2020","unstructured":"Liu J, Li X, Jiang Q, Obaidat MS, Vijayakumar P (2020) BUA: a blockchain-based unlinkable authentication in VANETs. IEEE Conf Commun. https:\/\/doi.org\/10.1109\/ICC40277.2020.9148863","journal-title":"IEEE Conf Commun"},{"issue":"12","key":"4501_CR36","doi-asserted-by":"publisher","first-page":"2792","DOI":"10.1109\/TVLSI.2019.2929420","volume":"27","author":"Z Lu","year":"2019","unstructured":"Lu Z, Wang Q, Qu G, Zhang H, Liu Z (2019) A blockchain-based privacy-preserving authentication scheme for VANETs. IEEE Trans Very Large Scale Integr Syst 27(12):2792\u20132801. https:\/\/doi.org\/10.1109\/TVLSI.2019.2929420","journal-title":"IEEE Trans Very Large Scale Integr Syst"},{"key":"4501_CR37","doi-asserted-by":"crossref","unstructured":"Maji HK, Prabhakaran M, Rosulek M (2011) Attribute-based signatures. In: Cryptographers\u2019 track at the RSA conference, Springer, pp 376\u2013392","DOI":"10.1007\/978-3-642-19074-2_24"},{"issue":"June","key":"4501_CR38","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.comcom.2019.06.008","volume":"145","author":"QM Malluhi","year":"2019","unstructured":"Malluhi QM, Shikfa A, Tran VD, Trinh VC (2019) Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices. Comput Commun 145(June):113\u2013125. https:\/\/doi.org\/10.1016\/j.comcom.2019.06.008","journal-title":"Comput Commun"},{"key":"4501_CR39","doi-asserted-by":"publisher","unstructured":"Mohanta BK, Jena D, Panda SS, Sobhanayak S (2019) Blockchain technology: A survey on applications and security privacy challenges. Internet of Things 8:100107, https:\/\/doi.org\/10.1016\/j.iot.2019.100107, URL https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2542660518300702","DOI":"10.1016\/j.iot.2019.100107"},{"key":"4501_CR40","doi-asserted-by":"publisher","unstructured":"Mohanty SN, Ramya K, Rani SS, Gupta D, Shankar K, Lakshmanaprabu S, Khanna A (2020) An efficient lightweight integrated blockchain (elib) model for iot security and privacy. Future Generation Computer Systems 102:1027\u20131037, https:\/\/doi.org\/10.1016\/j.future.2019.09.050, URL https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X19319843","DOI":"10.1016\/j.future.2019.09.050"},{"key":"4501_CR41","first-page":"21260","volume":"2","author":"S Nakamoto","year":"2008","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentr Bus Rev 2:21260","journal-title":"Decentr Bus Rev"},{"key":"4501_CR42","doi-asserted-by":"publisher","unstructured":"Peng L, Feng W, Yan Z, Li Y, Zhou X, Shimizu S (2021) Privacy preservation in permissionless blockchain: A survey. Digital Communications and Networks 7(3):295\u2013307, https:\/\/doi.org\/10.1016\/j.dcan.2020.05.008, URL https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2352864819303827","DOI":"10.1016\/j.dcan.2020.05.008"},{"key":"4501_CR43","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.comnet.2018.01.015","volume":"134","author":"SM Pournaghi","year":"2018","unstructured":"Pournaghi SM, Zahednejad B, Bayat M, Farjami Y (2018) NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET. Comput Netw 134:78\u201392. https:\/\/doi.org\/10.1016\/j.comnet.2018.01.015","journal-title":"Comput Netw"},{"key":"4501_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12652-020-01710-y","volume":"0123456789","author":"SM Pournaghi","year":"2020","unstructured":"Pournaghi SM, Bayat M, Farjami Y (2020) MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption. J Ambient Intell Humaniz Comput 0123456789:1\u201329. https:\/\/doi.org\/10.1007\/s12652-020-01710-y","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"4501_CR45","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.1016\/j.jclepro.2016.10.006","volume":"140","author":"BL Risteska Stojkoska","year":"2017","unstructured":"Risteska Stojkoska BL, Trivodaliev KV (2017) A review of Internet of Things for smart home: Challenges and solutions. J Clean Prod 140:1454\u20131464. https:\/\/doi.org\/10.1016\/j.jclepro.2016.10.006","journal-title":"J Clean Prod"},{"issue":"7","key":"4501_CR46","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/129902.129905","volume":"35","author":"RL Rivest","year":"1992","unstructured":"Rivest RL, Hellman ME, Anderson JC (1992) Responses to NIST\u2019s Proposal. Commun ACM 35(7):41\u201354. https:\/\/doi.org\/10.1145\/129902.129905","journal-title":"Commun ACM"},{"issue":"4","key":"4501_CR47","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1016\/j.jnca.2007.01.001","volume":"31","author":"K Salah","year":"2008","unstructured":"Salah K, Calyam P, Buhari MI (2008) Assessing readiness of IP networks to support desktop videoconferencing using OPNET. J Netw Comput Appl 31(4):921\u2013943. https:\/\/doi.org\/10.1016\/j.jnca.2007.01.001","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"4501_CR48","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1109\/COMST.2018.2863956","volume":"21","author":"T Salman","year":"2019","unstructured":"Salman T, Zolanvari M, Erbad A, Jain R, Samaka M (2019) Security services using blockchains: a state of the art survey. IEEE Commun Surv Tutori 21(1):858\u2013880. https:\/\/doi.org\/10.1109\/COMST.2018.2863956","journal-title":"IEEE Commun Surv Tutori"},{"key":"4501_CR49","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.cose.2019.06.002","volume":"86","author":"M Shuai","year":"2019","unstructured":"Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132\u2013146. https:\/\/doi.org\/10.1016\/j.cose.2019.06.002","journal-title":"Comput Secur"},{"key":"4501_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.smhl.2021.100190","volume":"20","author":"T de Oliveira","year":"2021","unstructured":"de Oliveira T, Dang HV, L\u00facio LH, Marquering HA, Olabarriaga S (2021) AC-AC: Dynamic revocable access control for acute care teams to access medical records. Smart Health 20:100190. https:\/\/doi.org\/10.1016\/j.smhl.2021.100190","journal-title":"Smart Health"},{"key":"4501_CR51","doi-asserted-by":"crossref","unstructured":"Tschofenig H, Arkko J, Thaler D, McPherson D (2015) Architectural considerations in smart object networking. RFC 7452","DOI":"10.17487\/rfc7452"},{"key":"4501_CR52","doi-asserted-by":"publisher","unstructured":"Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper pp 1\u201332, https:\/\/doi.org\/10.1017\/CBO9781107415324.004, arXiv:1011.1669v3","DOI":"10.1017\/CBO9781107415324.004"},{"issue":"2","key":"4501_CR53","doi-asserted-by":"publisher","first-page":"3775","DOI":"10.1109\/JIOT.2019.2892009","volume":"6","author":"Y Yao","year":"2019","unstructured":"Yao Y, Chang X, Misic J, Misic VB, Li L (2019) BLA: Blockchain-assisted lightweight anonymous authentication for distributed vehicular fog services. IEEE Internet Things J 6(2):3775\u20133784. https:\/\/doi.org\/10.1109\/JIOT.2019.2892009","journal-title":"IEEE Internet Things J"},{"issue":"March","key":"4501_CR54","doi-asserted-by":"publisher","first-page":"106140","DOI":"10.1016\/j.ijepes.2020.106140","volume":"121","author":"S Zhang","year":"2020","unstructured":"Zhang S, Rong J, Wang B (2020) A privacy protection scheme of smart meter for decentralized smart home environment based on consortium blockchain. Int J Electr Power Energy Syst 121(March):106140. https:\/\/doi.org\/10.1016\/j.ijepes.2020.106140","journal-title":"Int J Electr Power Energy Syst"},{"issue":"8","key":"4501_CR55","doi-asserted-by":"publisher","first-page":"1721","DOI":"10.1109\/TPDS.2018.2808283","volume":"29","author":"J Zhu","year":"2018","unstructured":"Zhu J, Li Q, Wang C, Yuan X, Wang Q, Ren K (2018) Enabling generic, verifiable, and secure data search in cloud services. IEEE Trans Parallel Distrib Syst 29(8):1721\u20131735","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"4501_CR56","doi-asserted-by":"publisher","unstructured":"Zyskind G, Nathan O, Pentland AS (2015) Decentralizing privacy: Using blockchain to protect personal data. Proceedings - 2015 IEEE Security and Privacy Workshops. SPW 2015 pp 180\u2013184, https:\/\/doi.org\/10.1109\/SPW.2015.27","DOI":"10.1109\/SPW.2015.27"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-022-04501-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-022-04501-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-022-04501-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T16:15:01Z","timestamp":1677773701000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-022-04501-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,16]]},"references-count":56,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["4501"],"URL":"https:\/\/doi.org\/10.1007\/s12652-022-04501-9","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,16]]},"assertion":[{"value":"18 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}