{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T16:06:49Z","timestamp":1771258009793,"version":"3.50.1"},"reference-count":38,"publisher":"Informa UK Limited","issue":"2","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072093"],"award-info":[{"award-number":["62072093"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"2023 Hebei Provincial doctoral candidate Innovation Ability training funding project","award":["CXZZBS2023168"],"award-info":[{"award-number":["CXZZBS2023168"]}]},{"name":"VC Research","award":["VCR 00000172"],"award-info":[{"award-number":["VCR 00000172"]}]},{"name":"the Natural Science Foundation of Hebei Province","award":["F2020501013"],"award-info":[{"award-number":["F2020501013"]}]},{"name":"the Key Research and Development Project of Hebei Province","award":["20310702D"],"award-info":[{"award-number":["20310702D"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072092"],"award-info":[{"award-number":["62072092"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Enterprise Information Systems"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1080\/17517575.2023.2243616","type":"journal-article","created":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T17:16:25Z","timestamp":1693934185000},"update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":9,"title":["BUA: a blockchain-based unlinkable authentication scheme for mobile IoT"],"prefix":"10.1080","volume":"18","author":[{"given":"Yihong","family":"Wen","sequence":"first","affiliation":[{"name":"Department of No.54, Research Institute of China Electronics Technology Group Corporation, Shijiazhuang City, Hebei Province, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2124-8713","authenticated-orcid":false,"given":"Mingxi","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of School of Computer Science and Engineering, Northeastern University, Shenyang, China"}]},{"given":"Xiwen","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of School of Computer Science and Engineering, Northeastern University, Shenyang, China"}]},{"given":"Tailong","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of School of Computer Science and Engineering, Northeastern University, Shenyang, China"}]},{"given":"Victor","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Operations and Information Management, Aston Business School, Aston University, Birmingham, UK"}]}],"member":"301","published-online":{"date-parts":[[2023,9,5]]},"reference":[{"key":"e_1_3_4_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2750180"},{"key":"e_1_3_4_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2882610"},{"key":"e_1_3_4_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3069642"},{"key":"e_1_3_4_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_5"},{"key":"e_1_3_4_6_1","first-page":"30","volume-title":"Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms","author":"Chazelle B.","year":"2004","unstructured":"Chazelle, B., J. Kilian, R. Rubinfeld, and A. Tal. 2004. \u201cThe Bloomier Filter: An Efficient Data Structure for Static Support Lookup Tables.\u201c In Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, Citeseer. 30\u201339."},{"key":"e_1_3_4_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS55811.2022.00034"},{"issue":"2","key":"e_1_3_4_8_1","first-page":"241","article-title":"A Hybrid Blockchain-Based Identity Authentication Scheme for Multi-Wsn","volume":"13","author":"Cui Z.","year":"2020","unstructured":"Cui, Z., X. U. E. Fei, S. Zhang, X. Cai, Y. Cao, W. Zhang, and J. Chen. 2020. \u201cA Hybrid Blockchain-Based Identity Authentication Scheme for Multi-Wsn.\u201d IEEE Transactions on Services Computing 13 (2): 241\u2013251.","journal-title":"IEEE Transactions on Services Computing"},{"key":"e_1_3_4_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.004"},{"key":"e_1_3_4_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"e_1_3_4_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.110811.111240"},{"key":"e_1_3_4_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2896064"},{"key":"e_1_3_4_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"e_1_3_4_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2979006"},{"key":"e_1_3_4_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2944400"},{"key":"e_1_3_4_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.08.002"},{"key":"e_1_3_4_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCS52626.2021.9449309"},{"issue":"12","key":"e_1_3_4_18_1","first-page":"1","article-title":"Implementing Blockchain in Information Systems: A Review","volume":"16","author":"Lu Y.","year":"2021","unstructured":"Lu, Y. 2021. \u201cImplementing Blockchain in Information Systems: A Review.\u201d Enterprise Information Systems 16 (12): 1\u201332.","journal-title":"Enterprise Information Systems"},{"key":"e_1_3_4_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2889329"},{"issue":"4","key":"e_1_3_4_20_1","first-page":"1","article-title":"Bts: A Binary Tree Sampling Strategy for Object Identification Based on Deep Learning","volume":"36","author":"Lv X.","year":"2021","unstructured":"Lv, X., Z. Shao, X. Huang, W. Zhou, D. Ming, J. Wang, and C. Tong. 2021. \u201cBts: A Binary Tree Sampling Strategy for Object Identification Based on Deep Learning.\u201d International Journal of Geographical Information Science 36 (4): 1\u201327.","journal-title":"International Journal of Geographical Information Science"},{"key":"e_1_3_4_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953172"},{"key":"e_1_3_4_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2018.1458258"},{"key":"e_1_3_4_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700175"},{"key":"e_1_3_4_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2849509"},{"key":"e_1_3_4_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2919627"},{"key":"e_1_3_4_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-020-07293-z"},{"key":"e_1_3_4_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600492CM"},{"key":"e_1_3_4_28_1","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-10-2020-0395"},{"key":"e_1_3_4_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2022.2037162"},{"issue":"1","key":"e_1_3_4_30_1","first-page":"1","article-title":"Secure and Efficient Mutual Authentication Protocol for Smart Grid Under Blockchain","volume":"14","author":"Wang W.","year":"2020","unstructured":"Wang, W., H. Huang, L. Zhang, and C. Su. 2020. \u201cSecure and Efficient Mutual Authentication Protocol for Smart Grid Under Blockchain.\u201d Peer-To-Peer Networking and Applications 14 (1): 1\u201313.","journal-title":"Peer-To-Peer Networking and Applications"},{"key":"e_1_3_4_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576899"},{"key":"e_1_3_4_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2936278"},{"key":"e_1_3_4_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3607534"},{"key":"e_1_3_4_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2021.1922757"},{"key":"e_1_3_4_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3097440"},{"key":"e_1_3_4_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941836"},{"key":"e_1_3_4_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.08.014"},{"key":"e_1_3_4_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2038222"},{"key":"e_1_3_4_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2970092"}],"container-title":["Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17517575.2023.2243616","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T16:56:58Z","timestamp":1727197018000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17517575.2023.2243616"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,5]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["10.1080\/17517575.2023.2243616"],"URL":"https:\/\/doi.org\/10.1080\/17517575.2023.2243616","relation":{},"ISSN":["1751-7575","1751-7583"],"issn-type":[{"value":"1751-7575","type":"print"},{"value":"1751-7583","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,5]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-01-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-30","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2243616"}}