{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T22:35:28Z","timestamp":1769553328655,"version":"3.49.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,3,1]]},"DOI":"10.1109\/healthcom49281.2021.9398978","type":"proceedings-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T21:09:20Z","timestamp":1619125760000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Blockchain-Empowered Contact Tracing for COVID-19 Using Crypto-Spatiotemporal Information"],"prefix":"10.1109","author":[{"given":"Zheng","family":"Wen","sequence":"first","affiliation":[]},{"given":"Keping","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Toshio","family":"Sato","sequence":"additional","affiliation":[]},{"given":"Yutaka","family":"Katsuyama","sequence":"additional","affiliation":[]},{"given":"Takuro","family":"Sato","sequence":"additional","affiliation":[]},{"given":"Wataru","family":"Kameyama","sequence":"additional","affiliation":[]},{"given":"Fumivuki","family":"Kato","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Masatoshi","family":"Yoshikawa","sequence":"additional","affiliation":[]},{"given":"Min","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Hashimoto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Apple and Google are launching a joint COVID-19 tracing tool for iOS and Android","volume":"10","author":"panzzarino","year":"2020","journal-title":"Tech Crunch"},{"key":"ref11","volume":"20","author":"craig","year":"2009","journal-title":"A Fully Homomorphic Encryption Scheme"},{"key":"ref12","volume":"6","author":"gustavo","year":"2008","journal-title":"Geohash"},{"key":"ref13","article-title":"AES Galois Counter Mode (GCM) cipher suites for TLS","volume":"5288","author":"joseph","year":"2008","journal-title":"Request for Comments"},{"key":"ref14","author":"android","year":"2018","journal-title":"Trusty tee"},{"key":"ref15","article-title":"Enrollment using synthetic fingerprint image and fingerprint sensing systems","author":"han","year":"2014","journal-title":"U S Patent No"},{"key":"ref16","article-title":"Architecture of the hyperledger blockchain fabric","volume":"310","author":"christian","year":"0","journal-title":"Workshop on Distributed Cryptocurrencies and Consensus Ledgers (DCCL)"},{"key":"ref17","article-title":"Fastfabric: Scaling hyperledger fabric to 20,000 transactions per second","author":"christian","year":"0","journal-title":"2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"},{"key":"ref18","year":"0","journal-title":"Population and Households (n d ) MIC Japan"},{"key":"ref19","article-title":"Coronavirus Disease 2019 (COVID-19) - Transmission","year":"0","journal-title":"Centers for Disease Control and Prevention"},{"key":"ref4","article-title":"List of epidemics","year":"0","journal-title":"Wikipedia"},{"key":"ref3","article-title":"Trusted execution environment: what it is, and what it is not","volume":"1","author":"mohamed","year":"2015","journal-title":"2015 IEEE Trustcom\/BigDataSE\/ISPA"},{"key":"ref6","article-title":"O'Reilly Media, Inc","author":"melanie","year":"2015","journal-title":"Blockchain Blueprint for a New Economy"},{"key":"ref5","article-title":"COVID19 Q&A Detail","year":"0","journal-title":"WHO"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"18700e","DOI":"10.2196\/18700","article-title":"Data mining and content analysis of the Chinese social media platform Weibo during the early COVID-19 outbreak: retrospective observational infoveillance study","volume":"6","author":"jiawei","year":"2020","journal-title":"JMIR Public Health and Surveillance"},{"key":"ref7","volume":"2304","author":"wei","year":"2020","journal-title":"Response to the COVID-19 Epidemic The Chinese Experience and Implications for Other Countries"},{"key":"ref2","first-page":"1","article-title":"Intel&#x00AE; software guard extensions (intel&#x00AE; sgx) support for dynamic memory management inside an enclave","author":"frank","year":"0","journal-title":"Proceedings of the Hardware and Architectural Support for Security and Privacy 2016"},{"key":"ref1","article-title":"Coronavirus disease (COVID-19) pandemic","year":"0","journal-title":"WHO"},{"key":"ref9","article-title":"BlueTrace: A privacy-preserving protocol for community-driven contact tracing across borders","author":"jason","year":"2020","journal-title":"Government Technology Agency-Singapore Tech Rep"}],"event":{"name":"2020 IEEE International Conference on E-health Networking, Application & Services (HEALTHCOM)","location":"Shenzhen, China","start":{"date-parts":[[2021,3,1]]},"end":{"date-parts":[[2021,3,2]]}},"container-title":["2020 IEEE International Conference on E-health Networking, Application &amp; Services (HEALTHCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9398959\/9398911\/09398978.pdf?arnumber=9398978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T20:20:13Z","timestamp":1643401213000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9398978\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,1]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/healthcom49281.2021.9398978","relation":{},"subject":[],"published":{"date-parts":[[2021,3,1]]}}}