{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:36:18Z","timestamp":1763202978898},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679347","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"562-569","source":"Crossref","is-referenced-by-count":2,"title":["Designing Trustworthy Decentralized Cross-Chain Marketplaces: A 6G Network of Networks Perspective"],"prefix":"10.1109","author":[{"given":"Lalita","family":"Jagadeesan","sequence":"first","affiliation":[{"name":"Nokia Bell Labs,USA"}]},{"given":"Shushu","family":"Liu","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs,USA"}]},{"given":"Lizette","family":"Velazquez","sequence":"additional","affiliation":[{"name":"Nokia Cloud and Network Services,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2920154"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900411"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSR57506.2023.10224977"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8202"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/6GSUMMIT49458.2020.9083784"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3315374"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3471140"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3564532"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3638045"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969820"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3184726"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/s23136033"},{"volume-title":"Hyperledger cacti","year":"2024","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA56441.2022.00020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/inventions7040109"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3099898"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3338861"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2024,9,2]]},"location":"London, United Kingdom","end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679347.pdf?arnumber=10679347","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:19:52Z","timestamp":1727241592000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679347\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679347","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}