{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T19:18:52Z","timestamp":1725736732789},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,27]]},"DOI":"10.1109\/brains52497.2021.9569783","type":"proceedings-article","created":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T19:51:25Z","timestamp":1635191485000},"page":"12-14","source":"Crossref","is-referenced-by-count":3,"title":["Innovative Wallet Using Trusted On-Line Keystore"],"prefix":"10.1109","author":[{"given":"Pascal","family":"Urien","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Smart Cards The Developer's Toolkit","year":"0","author":"jurgensen","key":"ref10"},{"key":"ref11","article-title":"Innovative TLS 1.3 Identity Module for Trusted IoT Device","author":"urien","year":"2021","journal-title":"IEEE CCNC 2021"},{"journal-title":"Ethereum developer apis","year":"2020","key":"ref12"},{"key":"ref13","article-title":"BTOOLS: Trusted Transaction Generation for Bitcoin and Ethereum Blockchain Based on Crypto Currency SmartCard","author":"urien","year":"2018","journal-title":"ICDT 2018 The Thirteenth International Conference on Digital Telecommunications"},{"key":"ref4","article-title":"Intel SGX Explained","author":"costan","year":"2016","journal-title":"Cryptology ePrint Archive Report 2006\/086"},{"year":"0","key":"ref3"},{"journal-title":"Identity Module for TLS Version 1 3","year":"2020","key":"ref6"},{"journal-title":"Blockchain server technology on LinuxONE","year":"2020","key":"ref5"},{"year":"0","key":"ref8"},{"journal-title":"Secure Element for TLS Version 1 3","year":"2020","key":"ref7"},{"journal-title":"How Coinbase Builds Secure Infrastructure To Store Bitcoin In The Cloud","year":"2020","key":"ref2"},{"journal-title":"Security requirements for cryptographic modules","year":"0","key":"ref1"},{"journal-title":"Java Card Technology for Smart Cards Architecture and Programmer s Guide","year":"2000","author":"chen","key":"ref9"}],"event":{"name":"2021 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","start":{"date-parts":[[2021,9,27]]},"location":"Paris, France","end":{"date-parts":[[2021,9,30]]}},"container-title":["2021 3rd Conference on Blockchain Research &amp; Applications for Innovative Networks and Services (BRAINS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9568781\/9569777\/09569783.pdf?arnumber=9569783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:47:31Z","timestamp":1652197651000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9569783\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,27]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/brains52497.2021.9569783","relation":{},"subject":[],"published":{"date-parts":[[2021,9,27]]}}}