{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T06:28:35Z","timestamp":1725690515866},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T00:00:00Z","timestamp":1645401600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T00:00:00Z","timestamp":1645401600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,21]]},"DOI":"10.1109\/icaiic54071.2022.9722646","type":"proceedings-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T20:41:38Z","timestamp":1646167298000},"page":"457-460","source":"Crossref","is-referenced-by-count":4,"title":["Blockchain based Secure Data Exchange between Cloud Networks and Smart Hand-held Devices for use in Smart Cities"],"prefix":"10.1109","author":[{"given":"Muneer Ahmad","family":"Dar","sequence":"first","affiliation":[{"name":"National Institute of Electronics and Information Technology (NIELIT),Jammu & Kashmir,India"}]},{"given":"Aadil","family":"Askar","sequence":"additional","affiliation":[{"name":"King Saud University,Dept. of Self Development Skills,Riyadh,Saudi Arabia"}]},{"given":"Sameer Ahmad","family":"Bhat","sequence":"additional","affiliation":[{"name":"Gulf University for Science and Technology (GUST),Mehref,Kuwait"}]}],"member":"263","reference":[{"journal-title":"Wikipedia the Free Encyclopedia","year":"0","author":"tree","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"ref13","first-page":"19","article-title":"Blockchain-based trusted computing in social network","author":"fu","year":"2016","journal-title":"IEEE International Conference on Computer and Communications"},{"article-title":"Human resource information management model based","year":"0","author":"wang","key":"ref14"},{"key":"ref15","first-page":"168","article-title":"on Blockchain technology","year":"2017","journal-title":"The IEEE International Symposium on Service-Oriented System Engineering"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2828369"},{"journal-title":"Technavio&#x2019;s Report","article-title":"Global M-commerce Market 2016-2020","year":"0","key":"ref17"},{"key":"ref18","first-page":"173","article-title":"Towards an Optimized BlockChain for IoT","author":"ali dorri","year":"2017","journal-title":"2017 IEEE\/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)"},{"key":"ref19","article-title":"BigchainDB:a scalable Blockchain database","author":"mcconaghy","year":"2016","journal-title":"white paper BigChainDB"},{"article-title":"Bitcoin: A peer-to-peer electronic cash system","year":"2008","author":"nakamoto","key":"ref4"},{"article-title":"Using Blockchains in smart cities","year":"0","author":"gupta","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"article-title":"Digital signature &#x2014; Wikipedia, the free encyclopedia","year":"2019","author":"contributors","key":"ref5"},{"key":"ref8","first-page":"369","article-title":"A digital signature based on a conventional encryption function","author":"merkle","year":"1987","journal-title":"Conference on the Theory and Application of Cryptographic Techniques"},{"key":"ref7","first-page":"417","article-title":"Use of elliptic curves in cryptography","author":"miller","year":"1985","journal-title":"Conference on the Theory and Application of Cryptographic Techniques"},{"journal-title":"PWC &#x2013; PWC&#x2019;s Global Blockchain Survey","year":"2018","key":"ref2"},{"journal-title":"Smart Cities Cyber Security Management Consultancy Report","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44893-9_12"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/AEEICB.2018.8480914"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2017.11.6.03"},{"journal-title":"Lightweight Session Key Establishment for Android Platform Using ECC","year":"2019","author":"dar","key":"ref21"}],"event":{"name":"2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","start":{"date-parts":[[2022,2,21]]},"location":"Jeju Island, Korea, Republic of","end":{"date-parts":[[2022,2,24]]}},"container-title":["2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9722611\/9722613\/09722646.pdf?arnumber=9722646","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T21:15:33Z","timestamp":1656364533000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9722646\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,21]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icaiic54071.2022.9722646","relation":{},"subject":[],"published":{"date-parts":[[2022,2,21]]}}}