{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T11:03:48Z","timestamp":1772103828769,"version":"3.50.1"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"National Key Research and Development Program, China","award":["2016YFD0702001"],"award-info":[{"award-number":["2016YFD0702001"]}]},{"name":"Modern Agriculture Projects of Jiangsu Province","award":["BE201735B"],"award-info":[{"award-number":["BE201735B"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2968621","type":"journal-article","created":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T21:40:41Z","timestamp":1579729241000},"page":"25863-25876","source":"Crossref","is-referenced-by-count":19,"title":["Privacy Enhancement Scheme (PES) in a Blockchain-Edge Computing Environment"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7170-8936","authenticated-orcid":false,"given":"Bonnah","family":"Ernest","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6839-4489","authenticated-orcid":false,"given":"Ju","family":"Shiguang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2596292"},{"key":"ref32","year":"2006","journal-title":"HLPSL Tutorial the Beginner's Guide to Modelling and Analysing Internet Security Protocols"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2834351"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3226-4_12"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2439964"},{"key":"ref34","year":"2019","journal-title":"Automated Validation of Internet Security Protocols and Applications"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"ref11","author":"knibbs","year":"2015","journal-title":"A Friendly Reminder Bitcoin Is Not Anonymous"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2016.7559080"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054122"},{"key":"ref15","first-page":"1076","article-title":"Analysis of attribute based encryption schemes","volume":"3","author":"lakshmi","year":"2015","journal-title":"J Comput Sci Commun Eng"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.08.018"},{"key":"ref17","first-page":"87","article-title":"Efficient chosen-ciphertext secure proxy re-encryption scheme","volume":"34","author":"zhang","year":"2013","journal-title":"J Commun"},{"key":"ref18","year":"2019","journal-title":"Homomorphic Encryption"},{"key":"ref19","article-title":"A fully homomorphic encryption scheme","author":"gentry","year":"2009","journal-title":"Department of Computer Science"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.05.071"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2585681"},{"key":"ref27","article-title":"Blockchain based trust & authentication for decentralized sensor networks","author":"moinet","year":"2017","journal-title":"arXiv 1706 01730"},{"key":"ref3","article-title":"SPX: Preserving end-to-end security for edge computing","author":"bhardwaj","year":"2018","journal-title":"arXiv 1809 09038"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21837-3_67"},{"key":"ref29","year":"1999","journal-title":"Public key cryptography for the financial services industry The Elliptic Curve Digital Signature Algorithm (ECDSA)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"ref8","article-title":"Blockchain in Internet of Things: Challenges and solutions","author":"dorri","year":"2016","journal-title":"arXiv 1608 05187 [cs]"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"key":"ref2","article-title":"On the convergence of blockchain and Internet of Things (IoT) technologies","author":"maroufi","year":"2019","journal-title":"arXiv 1904 01936"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2820162"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.09.310"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1655"},{"key":"ref21","author":"byun","year":"2019","journal-title":"The Advantages and Disadvantages of Homomorphic Encryption"},{"key":"ref24","first-page":"708","article-title":"Two birds with one stone: Two-factor authentication with security beyond conventional bound","volume":"15","author":"wang","year":"2018","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.206"},{"key":"ref26","author":"gaal","year":"2019","journal-title":"Blockchain the Next Authentication Provider?"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.283"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08966296.pdf?arnumber=8966296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:51:08Z","timestamp":1639770668000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8966296\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2968621","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}