{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:49:43Z","timestamp":1770846583567,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,15]]},"DOI":"10.1109\/bibm66473.2025.11357073","type":"proceedings-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:19:40Z","timestamp":1769721580000},"page":"7356-7363","source":"Crossref","is-referenced-by-count":0,"title":["BioLedger: A Token Incentive-Based Framework for the Secure Sharing of Genetic Data in Consortium Blockchain"],"prefix":"10.1109","author":[{"given":"Xin","family":"Wang","sequence":"first","affiliation":[{"name":"Shenzhen Technology University,Shenzhen,China,518118"}]},{"given":"Ruixuan","family":"Lin","sequence":"additional","affiliation":[{"name":"Shenzhen Technology University,Shenzhen,China,518118"}]},{"given":"Jiaming","family":"Tang","sequence":"additional","affiliation":[{"name":"Shenzhen Technology University,Shenzhen,China,518118"}]},{"given":"Ruisheng","family":"Huang","sequence":"additional","affiliation":[{"name":"Shenzhen Technology University,Shenzhen,China,518118"}]},{"given":"Huankai","family":"Chen","sequence":"additional","affiliation":[{"name":"Shenzhen Technology University,Shenzhen,China,518118"}]},{"given":"Lixin","family":"Liang","sequence":"additional","affiliation":[{"name":"Shenzhen Technology University,Shenzhen,China,518118"}]},{"given":"Bingding","family":"Huang","sequence":"additional","affiliation":[{"name":"Shenzhen Technology University,Shenzhen,China,518118"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2019.104040"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.15252\/embr.201948316"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/nrg3723"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102892"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.15265\/IYS-2016-s006"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.15252\/embr.201948316"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.csbj.2018.06.003"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMp1500523"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2767007"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1038\/s41587-019-0304-y"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994090"},{"issue":"5","key":"ref12","article-title":"A Hyperledger Fabric-based framework for secure and interoperable electronic health records management","volume":"29","author":"Sharma","year":"2019","journal-title":"International Journal of Network Management"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18632\/oncotarget.22345"},{"issue":"2","key":"ref14","first-page":"234","article-title":"GDPR compliance in blockchain-based healthcare systems: A systematic review","volume":"3","author":"Villarreal","year":"2023","journal-title":"Journal of Cybersecurity and Privacy"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102892"},{"key":"ref16","first-page":"879336","article-title":"Health data interoperability through blockchain technology: Challenges and opportunities","volume":"5","author":"Lehner","year":"2022","journal-title":"Frontiers in Blockchain"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100107"},{"issue":"3","key":"ref18","first-page":"441","article-title":"Exploring selfsovereign identity in market applications","volume":"2","author":"Feulner","year":"2022","journal-title":"Journal of Cybersecurity and Privacy"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3111247"},{"issue":"4","key":"ref20","first-page":"46","article-title":"Consent management in blockchain-based healthcare systems","volume":"45","author":"Kakarlapudi","year":"2021","journal-title":"Journal of Medical Systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3581784.3607053"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0995-5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2017.0619"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2013.6627810"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2019.103188"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2018.02.014"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3563044"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/BIBM58861.2023.10385970"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/BIBM58861.2023.10385627"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3581784.3607053"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.2196\/12426"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare7020056"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/sym10100470"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.5731\/pdajpst.2016.006734"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref37","article-title":"SEC 1: Elliptic Curve Cryptography, Version 2.0","year":"2009","journal-title":"Standards for Efficient Cryptography Group"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref39","volume-title":"Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform","author":"Buterin","year":"2014"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"}],"event":{"name":"2025 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","location":"Wuhan, China","start":{"date-parts":[[2025,12,15]]},"end":{"date-parts":[[2025,12,18]]}},"container-title":["2025 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11355913\/11355975\/11357073.pdf?arnumber=11357073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:53:48Z","timestamp":1770843228000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11357073\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,15]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/bibm66473.2025.11357073","relation":{},"subject":[],"published":{"date-parts":[[2025,12,15]]}}}