{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:38:42Z","timestamp":1730227122812,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,14]]},"DOI":"10.1109\/ic3i56241.2022.10072838","type":"proceedings-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T17:34:44Z","timestamp":1679506484000},"page":"1158-1162","source":"Crossref","is-referenced-by-count":0,"title":["A Survey on Encryption Algorithm with Hybrid Block Chain in Wireless Body Area Network"],"prefix":"10.1109","author":[{"given":"S.","family":"Kayalvizhi","sequence":"first","affiliation":[{"name":"Vaigai Engineering College,Department of CSE,Madurai,625014"}]},{"given":"S.","family":"Mythili","sequence":"additional","affiliation":[{"name":"PSNA College of Engineering,Department of ECE,Dindigu"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2793116"},{"issue":"3","key":"ref2","first-page":"1381","article-title":"Design and implementation of hybrid consensus mechanism for IoT based healthcare system security","volume":"14","author":"Kakali Chatterji","year":"2022","journal-title":"Journal on NLM"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3180336"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s22155763"},{"key":"ref5","first-page":"148946","article-title":"A survey of block chain based IoMT systems towards scalability","volume":"9","author":"Housian","year":"2021","journal-title":"IEEE access on open access journal"},{"key":"ref6","article-title":"P Block chain based Wireless Sensor Network for Malicious node detection","volume":"11","author":"Ramsamy","year":"2021","journal-title":"IEEE Access on Data Science"},{"article-title":"A Data security and Privacy Management Framework for WBAN based Healthcare Applications","volume-title":"IEEE Conference","author":"Chandra","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2966069"},{"key":"ref9","article-title":"A hybrid advanced encryption scheme for a protected WSN data in secure transmission","volume":"29","author":"Moorthy","year":"2020","journal-title":"International Journal of advanced science and Technology"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/jcc.2020.09.004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2020.04.008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/iiceta50496.2020.9318981"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916503"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2896965"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2019.06.002"},{"article-title":"Integration of Block chain in WBAN IEEE","volume-title":"international conference on Block chian","author":"Astaya","key":"ref17"},{"article-title":"The Use of block chain in Wireless Body area Network","volume-title":"2020 international conference on WBAN","author":"Pawar","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2864189"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.23919\/springsim.2019.8732913"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58190-3_8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/mcc.2017.3791019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2019.8761307"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44041-1_45"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/srds47363.2019.00032"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2870644"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/icesip46348.2019.8938241"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/icmsao.2019.8880364"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCT.2019.8869231"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63962-8_308-1"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/s20174937"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70688-7_13"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/csnt.2013.110"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2018.7347"}],"event":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2022,12,14]]},"location":"Uttar Pradesh, India","end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 5th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10072015\/10072297\/10072838.pdf?arnumber=10072838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T14:53:46Z","timestamp":1707836026000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10072838\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/ic3i56241.2022.10072838","relation":{},"subject":[],"published":{"date-parts":[[2022,12,14]]}}}