{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T10:44:21Z","timestamp":1777373061487,"version":"3.51.4"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1109\/fmec49853.2020.9144845","type":"proceedings-article","created":{"date-parts":[[2020,7,21]],"date-time":"2020-07-21T21:29:00Z","timestamp":1595366940000},"page":"347-352","source":"Crossref","is-referenced-by-count":23,"title":["Privacy-Aware and Authentication based on Blockchain with Fault Tolerance for IoT enabled Fog Computing"],"prefix":"10.1109","author":[{"given":"Oussama","family":"Mounnan","sequence":"first","affiliation":[]},{"given":"Abdelkrim El","family":"Mouatasim","sequence":"additional","affiliation":[]},{"given":"Otman","family":"Manad","sequence":"additional","affiliation":[]},{"given":"Tarik","family":"Hidar","sequence":"additional","affiliation":[]},{"given":"Anas Abou","family":"El Kalam","sequence":"additional","affiliation":[]},{"given":"Noureddine","family":"Idboufker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3316481"},{"key":"ref11","article-title":"What is Authentication? Definition of Authentication, Authentication Meaning","year":"0","journal-title":"The Economic Times"},{"key":"ref12","first-page":"95","article-title":"A Review on Authentication Methods","volume":"7","author":"syed","year":"2013","journal-title":"Aust J Basic Appl Sci"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2018.8612856"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8757184"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487449"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2018.8625141"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1748"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5224-6"},{"key":"ref19","author":"moinet","year":"2017","journal-title":"Blockchain based trust & authentication for decentralized sensor networks[J]"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803194"},{"key":"ref3","first-page":"112","article-title":"Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance","volume":"26","author":"attaran","year":"2017","journal-title":"Int J Inf Tech Manage"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2485206"},{"key":"ref8","author":"yi","year":"0","journal-title":"A Survey of Fog Computing | Proceedings of the 2015 Workshop on Mobile Big Data"},{"key":"ref7","article-title":"Fog Computing Distributing Data and Intelligence for Resiliency and Scale Necessary for IoT","author":"b c","year":"2015","journal-title":"Ubiquity"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMT.2011.6002149"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2749422"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9324035"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8756952"},{"key":"ref22","article-title":"Blockchain, smart contracts and the management of unregistered IP rights","author":"riedo","year":"2018","journal-title":"Ius in itinere"},{"key":"ref21","article-title":"Security and Privacy on Blockchain","author":"rui","year":"2019","journal-title":"ACM Comput Surv CSUR"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HotWeb.2015.22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc2020010"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1927-3_31"},{"key":"ref25","author":"rao","year":"2015","journal-title":"A Paradigm Shift from Cloud to Fog Computing"}],"event":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","location":"Paris, France","start":{"date-parts":[[2020,4,20]]},"end":{"date-parts":[[2020,4,23]]}},"container-title":["2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9141176\/9144692\/09144845.pdf?arnumber=9144845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:47:13Z","timestamp":1656344833000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9144845\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/fmec49853.2020.9144845","relation":{},"subject":[],"published":{"date-parts":[[2020,4]]}}}