{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T05:06:27Z","timestamp":1735016787306,"version":"3.32.0"},"reference-count":35,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2024,7,3]]},"DOI":"10.1080\/19393555.2023.2292996","type":"journal-article","created":{"date-parts":[[2023,12,30]],"date-time":"2023-12-30T16:54:10Z","timestamp":1703955250000},"page":"374-393","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["Privacy preservation of inventory management using adaptive key generation with Hyperledger blockchain technology"],"prefix":"10.1080","volume":"33","author":[{"given":"Chinnaraj","family":"Govindasamy","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical And Technical Sciences, Chennai, Tamilnadu, India"}]},{"given":"Arokiasamy","family":"Antonidoss","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Hindustan Institute of Technology &amp; Science, Chennai, India"}]}],"member":"301","published-online":{"date-parts":[[2023,12,30]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2972278"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2020.2989779"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6540"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2021.104001"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMR.2018.2883328"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2928280"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021962202150067X"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2022.126110"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115101"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3049325"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2018.02.013"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0251-9_16"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2013.6637376"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2907092"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2890203"},{"issue":"2","key":"e_1_3_2_17_1","first-page":"343","article-title":"Decentralized services Computing paradigm for blockchain-based data governance: Programmability, interoperability, and intelligence","volume":"13","author":"Liu X.","year":"2020","unstructured":"Liu, X., Sun, S. X., & Huang, G. (2020). Decentralized services Computing paradigm for blockchain-based data governance: Programmability, interoperability, and intelligence. IEEE Transactions on Services Computing, 13(2), 343\u2013355.","journal-title":"IEEE Transactions on Services Computing"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02325-z"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3058689"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42044-019-00044-z"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2934092"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2998166"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2960829"},{"issue":"5","key":"e_1_3_2_24_1","first-page":"411","article-title":"Precision indoor positioning system for 5G","volume":"5","author":"Rajkumar S.","year":"2022","unstructured":"Rajkumar, S. (2022a). Precision indoor positioning system for 5G. International Journal of Scientific Research and Engineering Development, 5(5), 411\u2013418.","journal-title":"International Journal of Scientific Research and Engineering Development"},{"issue":"5","key":"e_1_3_2_25_1","first-page":"300","article-title":"Implementing Software Defined Load Balancer and Firewall","volume":"5","author":"Rajkumar Shreya","year":"2022","unstructured":"Rajkumar Shreya. (2022b). Implementing Software Defined Load Balancer and Firewall. International Journal of Scientific Research and Engineering Development, 5(5), 300\u2013304.","journal-title":"International Journal of Scientific Research and Engineering Development"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.14445\/22315381\/IJETT-V49P240"},{"key":"e_1_3_2_27_1","volume-title":"Hyperledger blockchain-enabled secure medical record management with deep learning-based diagnosis model","author":"Sammeta N.","year":"2021","unstructured":"Sammeta, N., & Parthiban, L. (2021). Hyperledger blockchain-enabled secure medical record management with deep learning-based diagnosis model. Complex & Intelligent Systems."},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3004041"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08582-1"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2948287"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28364-3_17"},{"issue":"2","key":"e_1_3_2_32_1","first-page":"289","article-title":"Blockchain empowered arbitrable data auditing scheme for network storage as a service","volume":"13","author":"Xu Y.","year":"2020","unstructured":"Xu, Y., Ren, J., Zhang, Y., Zhang, C., Shen, B., & Zhang, Y. (2020). Blockchain empowered arbitrable data auditing scheme for network storage as a service. IEEE Transactions on Services Computing, 13(2), 289\u2013300.","journal-title":"IEEE Transactions on Services Computing"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2972776"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2885037"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03373-6"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42524-020-0128-y"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2023.2292996","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T09:19:22Z","timestamp":1734945562000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2023.2292996"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,30]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7,3]]}},"alternative-id":["10.1080\/19393555.2023.2292996"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2023.2292996","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"type":"print","value":"1939-3555"},{"type":"electronic","value":"1939-3547"}],"subject":[],"published":{"date-parts":[[2023,12,30]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-12-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}