{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T23:16:41Z","timestamp":1774048601143,"version":"3.50.1"},"reference-count":46,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2023JJ30266"],"award-info":[{"award-number":["2023JJ30266"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2025JJ50399"],"award-info":[{"award-number":["2025JJ50399"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011823","name":"Education Department of Guangxi Zhuang Autonomous Region","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011823","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372168"],"award-info":[{"award-number":["62372168"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Standards &amp; Interfaces"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1016\/j.csi.2026.104140","type":"journal-article","created":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T16:39:58Z","timestamp":1770655198000},"page":"104140","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Hybrid-blockchain-based cross-domain authentication for internet of marine things"],"prefix":"10.1016","volume":"97","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-2830-8202","authenticated-orcid":false,"given":"Biao","family":"Hu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5479-5994","authenticated-orcid":false,"given":"Xiaoliang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3203-2173","authenticated-orcid":false,"given":"Yuzhen","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1381-4364","authenticated-orcid":false,"given":"Kuanching","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kim Fung","family":"Tsang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.csi.2026.104140_b1","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.future.2023.01.013","article-title":"A hybrid blockchain-based identity authentication scheme for mobile crowd sensing","volume":"143","author":"Wang","year":"2023","journal-title":"Futur. Gener. Comp. Syst."},{"issue":"11","key":"10.1016\/j.csi.2026.104140_b2","doi-asserted-by":"crossref","first-page":"9768","DOI":"10.1109\/JIOT.2023.3235707","article-title":"A caching-based dual k-anonymous location privacy-preserving scheme for edge computing","volume":"10","author":"Zhang","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.csi.2026.104140_b3","article-title":"A privacy-preserving certificate-less aggregate signature scheme with detectable invalid signatures for vanets","volume":"89","author":"Wang","year":"2025","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.csi.2026.104140_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.csi.2025.104050","article-title":"LFD-PEKS: A lightweight and fast dynamic public-key encryption with keyword search scheme for multi-user environments","volume":"95","author":"Zhang","year":"2026","journal-title":"Comput. Stand. Interfaces"},{"issue":"9","key":"10.1016\/j.csi.2026.104140_b5","article-title":"A heterogeneous iot node authentication scheme based on hybrid blockchain and trust value","volume":"14","author":"Zhang","year":"2020","journal-title":"KSII Trans. Internet Inf. Syst."},{"issue":"4","key":"10.1016\/j.csi.2026.104140_b6","doi-asserted-by":"crossref","first-page":"5745","DOI":"10.1109\/JIOT.2023.3308073","article-title":"A trajectory privacy-preserving scheme based on transition matrix and caching for iiot","volume":"11","author":"Zhang","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.csi.2026.104140_b7","article-title":"Iatraj: multi-modal trajectory prediction through contextual information spatio-temporal interaction and awareness","author":"Wang","year":"2024","journal-title":"Int. J. Interact. Multimed. Artif. Intell."},{"key":"10.1016\/j.csi.2026.104140_b8","doi-asserted-by":"crossref","DOI":"10.1109\/JSEN.2025.3585616","article-title":"LAEC: lightweight authentication protocol for energy-efficient and cost-effective communication in wireless sensor network environments","author":"Yoo","year":"2025","journal-title":"IEEE Sens. J."},{"key":"10.1016\/j.csi.2026.104140_b9","doi-asserted-by":"crossref","DOI":"10.1016\/j.dcan.2025.03.004","article-title":"Large language model-driven probabilistic trajectory prediction in the internet of things using spatio-temporal encoding and normalizing flows","author":"Wang","year":"2025","journal-title":"Digit. Commun. Netw."},{"issue":"13","key":"10.1016\/j.csi.2026.104140_b10","doi-asserted-by":"crossref","first-page":"24035","DOI":"10.1109\/JIOT.2024.3387934","article-title":"Bcae: a blockchain-based cross domain authentication scheme for edge computing","volume":"11","author":"Zhang","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"10.1016\/j.csi.2026.104140_b11","doi-asserted-by":"crossref","DOI":"10.1145\/3700640","article-title":"Security and reliability of internet of underwater things: architecture, challenges, and opportunities","volume":"57","author":"Jiang","year":"2024","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"10.1016\/j.csi.2026.104140_b12","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1109\/TIV.2025.3599909","article-title":"SAEV-FL: Lightweight secure aggregation and efficient verification scheme for federated learning in cloud-edge collaborative environment","volume":"11","author":"Zhang","year":"2026","journal-title":"IEEE Trans. Intell. Veh."},{"issue":"2","key":"10.1016\/j.csi.2026.104140_b13","first-page":"2322","article-title":"A blockchain-based authentication scheme and secure architecture for iot-enabled maritime transportation systems","volume":"24","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.csi.2026.104140_b14","doi-asserted-by":"crossref","first-page":"58800","DOI":"10.1109\/ACCESS.2020.2982542","article-title":"Xdbauth: blockchain based cross domain authentication and authorization framework for internet of things","volume":"8","author":"Ali","year":"2020","journal-title":"IEEE Aaccess"},{"key":"10.1016\/j.csi.2026.104140_b15","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110353","article-title":"Blockchain-enabled authentication framework for maritime transportation system empowered by 6g-iot","volume":"244","author":"Kumar","year":"2024","journal-title":"Comput. Netw."},{"key":"10.1016\/j.csi.2026.104140_b16","doi-asserted-by":"crossref","first-page":"3789","DOI":"10.1109\/TIFS.2022.3214733","article-title":"Ccap: a complete cross-domain authentication based on blockchain for internet of things","volume":"17","author":"Tong","year":"2022","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"5","key":"10.1016\/j.csi.2026.104140_b17","doi-asserted-by":"crossref","first-page":"4175","DOI":"10.1109\/TNSM.2025.3592122","article-title":"GPVO-FL: Grouped privacy-preserving and verification-outsourced federated learning in cloud-edge collaborative environment","volume":"22","author":"Zhang","year":"2025","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"3","key":"10.1016\/j.csi.2026.104140_b18","doi-asserted-by":"crossref","first-page":"2664","DOI":"10.1109\/TNSM.2022.3180357","article-title":"A blockchain-based multi-ca cross-domain authentication scheme in decentralized autonomous network","volume":"19","author":"Wang","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"5","key":"10.1016\/j.csi.2026.104140_b19","doi-asserted-by":"crossref","first-page":"3416","DOI":"10.1109\/TII.2021.3101651","article-title":"A provable and privacy-preserving authentication scheme for uav-enabled intelligent transportation systems","volume":"18","author":"Khan","year":"2022","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.csi.2026.104140_b20","article-title":"BCGS: blockchain-assisted privacy-preserving cross-domain authentication for vanets","volume":"41","author":"Chen","year":"2023","journal-title":"Veh. Commun."},{"key":"10.1016\/j.csi.2026.104140_b21","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1109\/TIFS.2024.3523198","article-title":"Efficient revocable cross-domain anonymous authentication scheme for iiot","volume":"20","author":"Zeng","year":"2025","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"7","key":"10.1016\/j.csi.2026.104140_b22","doi-asserted-by":"crossref","first-page":"8738","DOI":"10.1109\/TVT.2023.3244077","article-title":"An efficient cross-layer authentication scheme for secure communication in vehicular ad-hoc networks","volume":"72","author":"Shawky","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"10.1016\/j.csi.2026.104140_b23","doi-asserted-by":"crossref","first-page":"3209","DOI":"10.1109\/TNSM.2024.3379587","article-title":"Split-chain based efficient blockchain-assisted cross-domain authentication for iot","volume":"21","author":"Luo","year":"2024","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.csi.2026.104140_b24","doi-asserted-by":"crossref","DOI":"10.1016\/j.bcra.2025.100293","article-title":"Blockchain hybrid-model scheme for scalable cross-domain authorisation","author":"Mukhandi","year":"2025","journal-title":"Blockchain-Res. Appl."},{"issue":"1","key":"10.1016\/j.csi.2026.104140_b25","article-title":"Cross-domain identity authentication scheme based on blockchain and pki system","volume":"3","author":"Zhang","year":"2023","journal-title":"High-Confid. Comput."},{"issue":"12","key":"10.1016\/j.csi.2026.104140_b26","doi-asserted-by":"crossref","first-page":"329","DOI":"10.3390\/computers13120329","article-title":"Integrating blockchains with the iot: a review of architectures and marine use cases","volume":"13","author":"Delladetsimas","year":"2024","journal-title":"Computers"},{"key":"10.1016\/j.csi.2026.104140_b27","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2025.110538","article-title":"Hybrid blockchain enabled authenticated fine grained access control for iomt enabled smart healthcare systems","volume":"127","author":"Mahor","year":"2025","journal-title":"Comput. Electr. Eng."},{"issue":"5","key":"10.1016\/j.csi.2026.104140_b28","first-page":"66","article-title":"Staibt: blockchain and cp-abe empowered secure and trusted agricultural iot blockchain terminal","volume":"7","author":"Zhang","year":"2022","journal-title":"Int. J. Interact. Multimed. Artif. Intell."},{"key":"10.1016\/j.csi.2026.104140_b29","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2020.101955","article-title":"A provably secure and lightweight authentication scheme for internet of drones for smart city surveillance","volume":"115","author":"Nikooghadam","year":"2021","journal-title":"J. Syst. Archit."},{"issue":"2","key":"10.1016\/j.csi.2026.104140_b30","first-page":"241","article-title":"A hybrid blockchain-based identity authentication scheme for multi-wsn","volume":"13","author":"Cui","year":"2020","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"10.1016\/j.csi.2026.104140_b31","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/s42979-025-03655-5","article-title":"A hybrid blockchain-based authentication protocol for a multiserver environment","volume":"6","author":"Kumar","year":"2025","journal-title":"SN Comput. Sci."},{"key":"10.1016\/j.csi.2026.104140_b32","doi-asserted-by":"crossref","first-page":"3892","DOI":"10.1109\/TIFS.2024.3372806","article-title":"Blockchain-based secure cross-domain data sharing for edge-assisted industrial internet of things","volume":"19","author":"Wang","year":"2024","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"1","key":"10.1016\/j.csi.2026.104140_b33","doi-asserted-by":"crossref","first-page":"11077","DOI":"10.1038\/s41598-025-96002-w","article-title":"A secure end-to-end communication framework for cooperative iot networks using hybrid blockchain system","volume":"15","author":"Erukala","year":"2025","journal-title":"Sci. Rep."},{"key":"10.1016\/j.csi.2026.104140_b34","doi-asserted-by":"crossref","DOI":"10.1109\/TVT.2024.3424786","article-title":"A hybrid blockchain-based privacy-preserving authentication scheme for vehicular ad hoc networks","author":"Su","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.csi.2026.104140_b35","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121329","article-title":"A blockchain-enabled privacy-preserving authentication management protocol for internet of medical things","volume":"237","author":"Miao","year":"2024","journal-title":"Expert Syst. Appl."},{"issue":"20","key":"10.1016\/j.csi.2026.104140_b36","doi-asserted-by":"crossref","first-page":"20214","DOI":"10.1109\/JIOT.2022.3171791","article-title":"A robust authentication protocol for wireless medical sensor networks using blockchain and physically unclonable functions","volume":"9","author":"Yu","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.csi.2026.104140_b37","doi-asserted-by":"crossref","first-page":"113945","DOI":"10.1109\/ACCESS.2022.3216850","article-title":"Blockchain based privacy preserving authentication and malicious node detection in internet of underwater things (iout) networks","volume":"10","author":"Abbas","year":"2022","journal-title":"IEEE Access"},{"issue":"7","key":"10.1016\/j.csi.2026.104140_b38","doi-asserted-by":"crossref","first-page":"10196","DOI":"10.1109\/TVT.2024.3367945","article-title":"Big data-enabled authentication framework for offshore maritime communication using drones","volume":"73","author":"Vangala","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"10.1016\/j.csi.2026.104140_b39","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/j.csi.2026.104140_b40","series-title":"International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"453","article-title":"Analysis of key-exchange protocols and their use for building secure channels","author":"Canetti","year":"2001"},{"key":"10.1016\/j.csi.2026.104140_b41","series-title":"Advances in Cryptology\u2014EUROCRYPT 2002: International Conference on the Theory and Applications of Cryptographic Techniques Amsterdam, the Netherlands, April 28\u2013May 2, 2002 Proceedings 21","first-page":"337","article-title":"Universally composable notions of key exchange and secure channels","author":"Canetti","year":"2002"},{"key":"10.1016\/j.csi.2026.104140_b42","series-title":"Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings 8","first-page":"65","article-title":"Password-based authenticated key exchange in the three-party setting","author":"Abdalla","year":"2005"},{"key":"10.1016\/j.csi.2026.104140_b43","series-title":"Digital Technologies and Applications","first-page":"118","article-title":"A comparative study of protocols\u2019 security verification tools: avispa, scyther, ProVerif, and tamarin","author":"Belfaik","year":"2024"},{"issue":"3","key":"10.1016\/j.csi.2026.104140_b44","doi-asserted-by":"crossref","first-page":"5118","DOI":"10.1109\/JIOT.2023.3302620","article-title":"Baka: biometric authentication and key agreement scheme based on fuzzy extractor for wireless body area networks","volume":"11","author":"Zhang","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"10.1016\/j.csi.2026.104140_b45","doi-asserted-by":"crossref","first-page":"9097","DOI":"10.1109\/TVT.2020.3000576","article-title":"Blockchain-envisioned secure data delivery and collection scheme for 5g-based iot-enabled internet of drones environment","volume":"69","author":"Bera","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.csi.2026.104140_b46","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.comcom.2020.12.005","article-title":"Private blockchain-based access control mechanism for unauthorized uav detection and mitigation in internet of drones environment","volume":"166","author":"Bera","year":"2021","journal-title":"Comput. Commun."}],"container-title":["Computer Standards &amp; Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548926000140?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548926000140?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T22:30:59Z","timestamp":1774045859000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548926000140"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":46,"alternative-id":["S0920548926000140"],"URL":"https:\/\/doi.org\/10.1016\/j.csi.2026.104140","relation":{},"ISSN":["0920-5489"],"issn-type":[{"value":"0920-5489","type":"print"}],"subject":[],"published":{"date-parts":[[2026,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Hybrid-blockchain-based cross-domain authentication for internet of marine things","name":"articletitle","label":"Article Title"},{"value":"Computer Standards & Interfaces","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.csi.2026.104140","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104140"}}