{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T08:23:07Z","timestamp":1772785387395,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/iccchina.2017.8330337","type":"proceedings-article","created":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T00:51:01Z","timestamp":1522975861000},"page":"1-6","source":"Crossref","is-referenced-by-count":14,"title":["An anonymous and accountable authentication scheme for Wi-Fi hotspot access with the Bitcoin blockchain"],"prefix":"10.1109","author":[{"given":"Yukun","family":"Niu","sequence":"first","affiliation":[]},{"given":"Lingbo","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Chi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jianqing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yuguang","family":"Fang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2535718"},{"key":"ref11","article-title":"iOS security guide","year":"2014","journal-title":"Apple Inc"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref13","article-title":"Majority is not enough: Bitcoin mining is vulnerable","author":"eyal","year":"2014","journal-title":"International Conference on Financial Cryptography and Data Security"},{"key":"ref14","article-title":"Catena: Preventing lies with Bit-coin","author":"tomescu","year":"2016","journal-title":"Cryptology ePrint Archive Report 2016\/1062"},{"key":"ref15","article-title":"An analysis of Bitcoin OP_RETURN metadata","author":"massimo","year":"2017","journal-title":"Arxiv preprint arXiv"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813647"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1145\/1315245.1315256","article-title":"Blacklistable anonymous credentials: Blocking misbehaving users without TTPs","author":"tsang","year":"2007","journal-title":"ACM CCS'07"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2406671"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GCCE.2016.7800479"},{"key":"ref8","article-title":"CoinShuffte: Practical decentralized coin mixing for Bitcoin","author":"rffing","year":"2014","journal-title":"19th European Symposium on Research in Computer Security"},{"key":"ref7","article-title":"Overview of colored coins","author":"rosenfeld","year":"2012","journal-title":"White Paper"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1132469.1132501"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2944789.2949546"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"}],"event":{"name":"2017 IEEE\/CIC International Conference on Communications in China (ICCC)","location":"Qingdao","start":{"date-parts":[[2017,10,22]]},"end":{"date-parts":[[2017,10,24]]}},"container-title":["2017 IEEE\/CIC International Conference on Communications in China (ICCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8326469\/8330314\/08330337.pdf?arnumber=8330337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T00:37:25Z","timestamp":1643157445000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8330337\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iccchina.2017.8330337","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}