{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:51:46Z","timestamp":1730220706951,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/eucnc.2018.8443212","type":"proceedings-article","created":{"date-parts":[[2018,8,23]],"date-time":"2018-08-23T22:05:56Z","timestamp":1535061956000},"page":"256-260","source":"Crossref","is-referenced-by-count":20,"title":["Smart Contracts for the Internet of Things: Opportunities and Challenges"],"prefix":"10.1109","author":[{"given":"Nikos","family":"Fotiou","sequence":"first","affiliation":[]},{"given":"George C.","family":"Polyzos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6698"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2016.7562112"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-72738-5_19","article-title":"Identity-based proxy re-encryption","volume":"4521","author":"green","year":"2007","journal-title":"Applied Cryptography and Network Security Ser Lecture Notes in Computer Science"},{"journal-title":"Catenis","year":"2018","key":"ref13"},{"key":"ref14","article-title":"Decentralizing privacy: Using blockchain to protect personal data","author":"zyskind","year":"2015","journal-title":"Proc IEEE CS Security and Privacy Workshops"},{"key":"ref15","article-title":"TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation","author":"ritzdorf","year":"2017","journal-title":"Cryptology ePrint Archive Report 2017\/578"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/diss.2018.23001"},{"journal-title":"The Deadline","year":"2017","author":"haring","key":"ref17"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2018.23082","article-title":"Zeus: Analyzing safety of smart contracts","author":"kalra","year":"2018","journal-title":"Proc Network and Distributed System Security Symposium"},{"journal-title":"Ethereum Project Yellow Paper","year":"2014","author":"wood","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"journal-title":"IBM Institute for Business Value","year":"2014","author":"cohn","key":"ref6"},{"journal-title":"Linux Foundation","year":"2018","key":"ref5"},{"key":"ref8","article-title":"An empirical study of Namecoin and lessons for decentralized namespace design","author":"kalodner","year":"2015","journal-title":"Proc Workshop Economics of Information Security"},{"key":"ref7","article-title":"Blockchain-assisted information distribution for the Internet of Things","author":"polyzos","year":"2017","journal-title":"Proc IEEE InternationaL Conference on Information Reuse and Integration"},{"journal-title":"W3C","year":"2018","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970748"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504755"}],"event":{"name":"2018 European Conference on Networks and Communications (EuCNC)","start":{"date-parts":[[2018,6,18]]},"location":"Ljubljana, Slovenia","end":{"date-parts":[[2018,6,21]]}},"container-title":["2018 European Conference on Networks and Communications (EuCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8412474\/8442432\/08443212.pdf?arnumber=8443212","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T12:32:40Z","timestamp":1643200360000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8443212\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/eucnc.2018.8443212","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}