{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:03:27Z","timestamp":1730235807153,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9996071","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T21:53:52Z","timestamp":1672782832000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain Technology in Requisites of Openscience, Bigdata It's Applications"],"prefix":"10.1109","author":[{"given":"Umang","family":"Srivastava","sequence":"first","affiliation":[{"name":"Chandigarh University,Department of Computer Science,Gharuan,Punjab,India"}]},{"given":"Bhupinder","family":"Kaur","sequence":"additional","affiliation":[{"name":"Chandigarh University,Department of Computer Science,Gharuan,Punjab,India"}]},{"given":"Amit","family":"Semwal","sequence":"additional","affiliation":[{"name":"Uttaranchal University,Dehradun,India,248007"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1451-7_59"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0324-5_10"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0198"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s21144749"},{"journal-title":"Applied Security Design Patterns Using Test Templates I. N. Secure Aware Sdlc","author":"Aruna","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2017.3571042"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/sym13081447"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/s40854-016-0034-9"},{"journal-title":"A novel method for decentralised peer-to-peer software license validation using cryptocurrency blockchain technology","year":"2015","author":"Herbert","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/icccn.2017.8038519"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/eurocon.2017.8011213"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3098011"},{"journal-title":"Challenges and Opportunities with Big Data","year":"2016","author":"Labrinidis","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1108\/rmj-12-2015-0042"},{"key":"ref15","article-title":"Towards Secure, and Privacy-Preserving Data","author":"Lin","year":"2018","journal-title":"Sharing in e-Health Systems via Consortium Blockchain"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3421510"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/mpul.2018.2814878"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.33166\/AETiC.2018.01.001"},{"issue":"9","key":"ref19","doi-asserted-by":"crossref","first-page":"3717","DOI":"10.1166\/jctn.2019.8240","article-title":"Optimal path planning using swarm intelligence based hybrid techniaues","volume":"16","author":"Sood","year":"2019","journal-title":"JCTN."},{"key":"ref20","article-title":"What blockchain technology cancontribute to smart cities","author":"J.","year":"2017","journal-title":"Y.a.K.Z.K.Z., Blockchain-based sharing services"},{"journal-title":"Y. and Yuanl. and a. F.-Y","year":"2016","key":"ref21"},{"journal-title":"A survey, Blockchain challenges and opportunities","year":"2017","author":"Zhenz","key":"ref22"},{"key":"ref23","article-title":"An Overview of Blockchain Technology: Architecture","author":"Zhengl","year":"2017","journal-title":"Consensus, and Future Trends"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","start":{"date-parts":[[2022,10,6]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09996071.pdf?arnumber=9996071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T04:35:38Z","timestamp":1710390938000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9996071\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9996071","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}