{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T14:40:26Z","timestamp":1732804826188,"version":"3.29.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T00:00:00Z","timestamp":1728432000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T00:00:00Z","timestamp":1728432000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,9]]},"DOI":"10.1109\/brains63024.2024.10732879","type":"proceedings-article","created":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T18:35:40Z","timestamp":1731090940000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Web3-Powered Service Provisioning in Cellular Networks using NFT and Self-Sovereign Identity"],"prefix":"10.1109","author":[{"given":"Nischal","family":"Aryal","sequence":"first","affiliation":[{"name":"Orange Innovation,France,14000"}]},{"given":"Fariba","family":"Ghaffari","sequence":"additional","affiliation":[{"name":"Institut Polytechnique de Paris,SAMOVAR, Telecom SudParis,France,91120"}]},{"given":"Emmanuel","family":"Bertin","sequence":"additional","affiliation":[{"name":"Orange Innovation,France,14000"}]},{"given":"Noel","family":"Crespi","sequence":"additional","affiliation":[{"name":"Institut Polytechnique de Paris,SAMOVAR, Telecom SudParis,France,91120"}]}],"member":"263","reference":[{"year":"2023","key":"ref1","article-title":"Ericsson Mobility Report"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM59352.2023.10327810"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2200244"},{"key":"ref4","article-title":"The path to self-sovereign identity"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.10.002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3117588"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3486622.3493917"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.11.238"},{"article-title":"Non-fungible token (nft): Overview, evaluation, opportunities and challenges","year":"2021","author":"Wang","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982542"},{"key":"ref11","first-page":"100590","article-title":"Distributed ledger technologies for authentication and access control in networking applications: A comprehensive survey","volume-title":"Computer Science Review","volume":"50","author":"Ghaffari","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3077276"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11050711"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3085831"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3145851"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s24072267"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3371521"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2967099"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2023.106778"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/fi15060208"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/NoF62948.2024.10741405"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2989002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM55787.2022.9964713"},{"key":"ref24","article-title":"go-ethereum"},{"key":"ref25","article-title":"Go ethereum - github"},{"key":"ref26","article-title":"Clique poa protocol rinkeby poa testnet"},{"first-page":"11","article-title":"PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain","author":"Angelis","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2535-6"},{"issue":"2014","key":"ref29","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood","year":"2014","journal-title":"Ethereum project yellow paper"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-819816-2.00015-0"}],"event":{"name":"2024 6th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","start":{"date-parts":[[2024,10,9]]},"location":"Berlin, Germany","end":{"date-parts":[[2024,10,11]]}},"container-title":["2024 6th Conference on Blockchain Research &amp; Applications for Innovative Networks and Services (BRAINS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10732025\/10732044\/10732879.pdf?arnumber=10732879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T10:24:51Z","timestamp":1732703091000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10732879\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/brains63024.2024.10732879","relation":{},"subject":[],"published":{"date-parts":[[2024,10,9]]}}}