{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:56:21Z","timestamp":1773154581363,"version":"3.50.1"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1109\/commnet49926.2020.9199622","type":"proceedings-article","created":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T16:50:45Z","timestamp":1600447845000},"page":"1-7","source":"Crossref","is-referenced-by-count":16,"title":["Security on Blockchain Technology"],"prefix":"10.1109","author":[{"given":"Mohamed","family":"Fartitchou","sequence":"first","affiliation":[]},{"given":"Khalid El","family":"Makkaoui","sequence":"additional","affiliation":[]},{"given":"Nabil","family":"Kannouf","sequence":"additional","affiliation":[]},{"given":"Zakaria El","family":"Allali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"653","article-title":"A survey of Block chain security issues and challenges","volume":"19","author":"lin","year":"2017","journal-title":"IJ Network Security"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2018.10.014"},{"key":"ref33","year":"2020","journal-title":"Luxoft&#x2019;s e-voting platform enables first consultative vote based on Block chain in switzerland"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.06.051"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2952942"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102407"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-5736-4.ch016"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2015.7336997"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.060"},{"key":"ref34","article-title":"LifeID: An open-source","year":"2020","journal-title":"Block chain-based platform for self-sovereign identity"},{"key":"ref28","first-page":"2663","article-title":"Towards Block chain-based intelligent transportation systems","author":"yuan","year":"2016","journal-title":"19th International Conference on Intelligent Transportation Systems (ITSC)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100254"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography1020015"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.020"},{"key":"ref1","article-title":"Beginning Blockchain: A Begin-ner&#x2019;s Guide to Building Block chain Solutions","author":"singhal","year":"2018","journal-title":"Apress"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-4847-8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS48668.2019.9044957"},{"key":"ref21","first-page":"141","article-title":"7 Block chain-Based Trust and Security in Content-Centric Networking-Based Internet of Things","author":"labbi","year":"2020","journal-title":"Block chain for Cybersecurity and Privacy Architectures Challenges and Applications"},{"key":"ref24","first-page":"650","article-title":"Secure and trustable electronic medical records sharing using Block chain","author":"dubovitskaya","year":"2017","journal-title":"AMIA Annual Symposium Proceedings American Medical Informatics Association"},{"key":"ref23","first-page":"656","article-title":"Block chain-based PKI for content-centric networking","author":"labbi","year":"2018","journal-title":"The Proceedings of the Third International Conference on Smart City Applications"},{"key":"ref26","first-page":"1","article-title":"Architectures and Frameworks for Developing and Applying Block chain Technology","author":"shi","year":"2019","journal-title":"IGI Global"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00281"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884650"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"key":"ref52","author":"luu","year":"2016","journal-title":"Oyente An Analysis Tool for Smart Contracts"},{"key":"ref10","first-page":"1","article-title":"An overview of smart contract and use cases in Block chain technology","author":"mohanta","year":"2018","journal-title":"9th International Conference On Computing Communication and Networking Technologies (ICCCNT)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.12.019"},{"key":"ref40","article-title":"Analysis of hashrate-based double spending","author":"rosenfeld","year":"2014","journal-title":"arXiv preprint arXiv 1402 2009"},{"key":"ref12","article-title":"Block iot intelligence: A Block chain-enabled intelligent IoT architecture with artificial intelligence","author":"singh","year":"2019","journal-title":"Future Generation Computer Systems"},{"key":"ref13","first-page":"1","article-title":"Architecture for Block chain applications","author":"xu","year":"2019","journal-title":"Heidelberg Springer"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100212"},{"key":"ref17","article-title":"Behind the biggest bitcoin heist in history: Inside the implosion of mt. gox","volume":"19","author":"adelstein","year":"2016","journal-title":"The Daily Beast"},{"key":"ref18","author":"buterin","year":"2016","journal-title":"CRITICAL UPDATE Re DAO Vulnerability"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"ref4","first-page":"369","article-title":"A digital signature based on a conventional encryption function","author":"merkle","year":"1987","journal-title":"Conference on the Theory and Application of Cryptographic Techniques"},{"key":"ref3","article-title":"Block chain-based mobility management for 5G","author":"lee","year":"2019","journal-title":"Future Generation Computer Systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100198"},{"key":"ref5","article-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"nakamoto","year":"2008"},{"key":"ref8","year":"2019","journal-title":"White Paper Library"},{"key":"ref7","article-title":"The ripple protocol consensus algorithm","volume":"5","author":"schwartz","year":"2014","journal-title":"Ripple Labs Inc White Paper"},{"key":"ref49","author":"ethereum","year":"2017","journal-title":"Official go implementation of the ethereum protocol"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2060"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2016.7778636"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102635"},{"key":"ref48","year":"2017","journal-title":"Parity Technologies"},{"key":"ref47","first-page":"1409","article-title":"Smartpool: Practical decentralized pooled mining","author":"luu","year":"2017","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/app9091788"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/sym9080164"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382292"},{"key":"ref43","first-page":"126","article-title":"ECDSA security in bitcoin and ethereum: a research survey","volume":"28","author":"mayer","year":"2016","journal-title":"CoinFaabrik"}],"event":{"name":"2020 3rd International Conference on Advanced Communication Technologies and Networking (CommNet)","location":"Marrakech, Morocco","start":{"date-parts":[[2020,9,4]]},"end":{"date-parts":[[2020,9,6]]}},"container-title":["2020 3rd International Conference on Advanced Communication Technologies and Networking (CommNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9198828\/9199585\/09199622.pdf?arnumber=9199622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T11:47:23Z","timestamp":1656330443000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9199622\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/commnet49926.2020.9199622","relation":{},"subject":[],"published":{"date-parts":[[2020,9]]}}}