{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:19:50Z","timestamp":1766067590523,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,22]]},"DOI":"10.1109\/dsc54232.2022.9888800","type":"proceedings-article","created":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T21:10:18Z","timestamp":1664226618000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["A Low Cost Blockchain-Based Framework for Preserving Critical Data in Health-Care IoT Systems Using Classification"],"prefix":"10.1109","author":[{"given":"Heba Takruri","family":"Tamemi","sequence":"first","affiliation":[{"name":"An-Najah National University,Networks &#x0026; Information Security Department,Nablus,Palestine"}]},{"given":"Manar","family":"Rabayah","sequence":"additional","affiliation":[{"name":"An-Najah National University,Networks &#x0026; Information Security Department,Nablus,Palestine"}]},{"given":"Kareem Abu","family":"Raad","sequence":"additional","affiliation":[{"name":"An-Najah National University,Networks &#x0026; Information Security Department,Nablus,Palestine"}]},{"given":"Mai","family":"Kanaan","sequence":"additional","affiliation":[{"name":"An-Najah National University,Computer Science Department,Nablus,Palestine"}]},{"given":"Ahmed","family":"Awad","sequence":"additional","affiliation":[{"name":"An-Najah National University,Computer Science Department,Nablus,Palestine"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISESD.2018.8605485"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC48688.2020.0-219"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.35940\/ijrte.E6861.018520"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GCC45510.2019.1570521015"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2019.8885029"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPC51351.2021.9451813"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102656"},{"journal-title":"Blockchain explained","year":"2022","author":"hayes","key":"ref17"},{"journal-title":"Mastering ethereum Implement advanced blockchain applications using Ethereum-supported tools &#x2026; services and protocols","year":"2019","author":"grincalaitis","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-020-10272-1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3051602"},{"key":"ref3","article-title":"The cloud is not enough: Saving IoT from the cloud","author":"zhang","year":"2015","journal-title":"7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 15)"},{"year":"2021","key":"ref6","first-page":"1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.31585\/jbba-5-1-(3)2022"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.3390\/s21134388","article-title":"Blockchain-iot sensor(biots): A solution to iot-ecosystems security issues","volume":"21","author":"gonzalez-amarillo","year":"2021","journal-title":"SENSORS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00030"},{"key":"ref2","first-page":"12","article-title":"Recent advances in the internet of medical things (iomt) systems security","author":"ghubaish","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"ref9","first-page":"1","author":"jaiyen","year":"2020","journal-title":"A proof-of-concept of farmer-to-consumer food traceability on blockchain for local commu-nities"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/WF-IoT.2019.8767227","article-title":"Internet of things security - multilayered method for end to end data communications over cellular networks","author":"lee","year":"2019","journal-title":"2019 IEEE 5th World Forum on Internet of Things (WF-IoT)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14429\/dsj.71.16454"},{"journal-title":"How to integrate ipfs with ethereum","year":"0","key":"ref22"},{"journal-title":"What is ifps? the hard drive for blockchain","year":"2021","key":"ref21"},{"journal-title":"128 or 256 bit encryption Which should i use? ubiq","year":"2019","author":"tobias","key":"ref24"},{"journal-title":"What is aes - the world's most popular encryption method","year":"2022","key":"ref23"},{"journal-title":"What's the real cost of ipfs?","year":"2019","author":"tut","key":"ref26"},{"year":"2019","key":"ref25"}],"event":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","start":{"date-parts":[[2022,6,22]]},"location":"Edinburgh, United Kingdom","end":{"date-parts":[[2022,6,24]]}},"container-title":["2022 IEEE Conference on Dependable and Secure Computing (DSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9888143\/9888794\/09888800.pdf?arnumber=9888800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,14]],"date-time":"2022-11-14T22:08:57Z","timestamp":1668463737000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9888800\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,22]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/dsc54232.2022.9888800","relation":{},"subject":[],"published":{"date-parts":[[2022,6,22]]}}}