{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T11:33:40Z","timestamp":1770291220323,"version":"3.49.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T00:00:00Z","timestamp":1623628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T00:00:00Z","timestamp":1623628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,14]]},"DOI":"10.1109\/cybersa52016.2021.9478257","type":"proceedings-article","created":{"date-parts":[[2021,7,12]],"date-time":"2021-07-12T21:39:34Z","timestamp":1626125974000},"page":"1-7","source":"Crossref","is-referenced-by-count":17,"title":["Securing IoT-Blockchain Applications Through Honesty-Based Distributed Proof of Authority Consensus Algorithm"],"prefix":"10.1109","author":[{"given":"Subhi","family":"Alrubei","sequence":"first","affiliation":[{"name":"University of Sheffield,Dept. Electronic and Electrical Engineering,Sheffield,Uk"}]},{"given":"Edward","family":"Ball","sequence":"additional","affiliation":[{"name":"University of Sheffield,Dept. Electronic and Electrical Engineering,Sheffield,Uk"}]},{"given":"Jonathan","family":"Rigelsford","sequence":"additional","affiliation":[{"name":"University of Sheffield,Dept. Electronic and Electrical Engineering,Sheffield,Uk"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67816-0_17"},{"key":"ref11","article-title":"Blackcoins proof-of-stake protocol v2","author":"vasin","year":"2014"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref13","article-title":"EIP-225: Clique proof-of-authority consensus protocol","author":"szil\u00e1gyi","year":"2017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2695533.2695545"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191553"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2903342"},{"key":"ref17","article-title":"Microchain: A Hybrid Consensus Mechanism for Lightweight Distributed Ledger for IoT","author":"xu","year":"2019"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00189"},{"key":"ref19","first-page":"664","article-title":"G-PBFT: A location-based and scalable consensus pro-tocol for iot-blockchain applications","author":"lao","year":"2020","journal-title":"IPDPS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2017.3051335"},{"key":"ref3","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2894727"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2014.0699"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.019"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/BF00196791","article-title":"How to Time-Stamp a Digital Document","volume":"3","author":"stornetta","year":"1991","journal-title":"J Cryptol"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1900002"},{"key":"ref9","article-title":"PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake","author":"king","year":"2012"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1007\/978-3-662-48000-7_29","article-title":"Proofs of space","author":"dziembowski","year":"2015","journal-title":"Advances in Cryptology &#x2013; CRYPTO 2015"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.2979031"}],"event":{"name":"2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","location":"Dublin, Ireland","start":{"date-parts":[[2021,6,14]]},"end":{"date-parts":[[2021,6,18]]}},"container-title":["2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9478074\/9478188\/09478257.pdf?arnumber=9478257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:58:53Z","timestamp":1659484733000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9478257\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,14]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/cybersa52016.2021.9478257","relation":{},"subject":[],"published":{"date-parts":[[2021,6,14]]}}}