{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T12:47:26Z","timestamp":1774270046248,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/iciot48696.2020.9089473","type":"proceedings-article","created":{"date-parts":[[2020,5,12]],"date-time":"2020-05-12T00:36:49Z","timestamp":1589243809000},"page":"422-428","source":"Crossref","is-referenced-by-count":26,"title":["PEBERS: Practical Ethereum Blockchain based Efficient Ride Hailing Service"],"prefix":"10.1109","author":[{"given":"Sowmya","family":"Kudva","sequence":"first","affiliation":[]},{"given":"Renat","family":"Norderhaug","sequence":"additional","affiliation":[]},{"given":"Shahriar","family":"Badsha","sequence":"additional","affiliation":[]},{"given":"Shamik","family":"Sengupta","sequence":"additional","affiliation":[]},{"given":"A.S.M.","family":"Kayes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2019.8666477"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.08.017"},{"key":"ref33","article-title":"Ethereum white paper: a next generation smart contract & decentralized application platform","author":"buterin","year":"2014","journal-title":"first version"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref31","first-page":"1235","article-title":"Oride: A privacy-preserving yet accountable ride-hailing service","author":"pham","year":"0","journal-title":"26th USENIX Security Symposium ( USENIX Security 17)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2016.10.017"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2839587"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-016-0020-2"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68786-5_40"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2959230"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.10.036"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00084"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"ref13","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1186\/s40561-017-0050-x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885769"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC46108.2020.9045674"},{"key":"ref17","article-title":"A light blockchain-powered privacy-preserving organization scheme for ride sharing services","author":"baza","year":"2020","journal-title":"Proc of the IEEE 91 th Vehicular Technology Conference (VTC-Spring)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00076"},{"key":"ref19","article-title":"Blockchain-based distributed key management approach tailored for smart grid","author":"baza","year":"2019","journal-title":"Combating Security Challenges in the Age of Big Data"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212483"},{"key":"ref4","first-page":"2018","article-title":"Revealed: 50 million facebook profiles harvested for cambridge analytica in major data breach","volume":"17","author":"cadwalladr","year":"2018","journal-title":"The Guardian"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2996913.2996974"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2929643"},{"key":"ref6","author":"fletcher","year":"2010","journal-title":"How facebook is redefining privacy"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2016.7795984"},{"key":"ref5","first-page":"4","article-title":"Once more unto the breach: What the equifax and uber data breaches reveal about the intersection of information security and the enforecement of securities laws","volume":"33","author":"robbins","year":"2018","journal-title":"Criminal Justice"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxy065"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-018-0654-1"},{"key":"ref2","first-page":"405","article-title":"Ridesharing in the sharing economy: Should regulators impose uber regulations on uber","volume":"101","author":"posen","year":"2015","journal-title":"Iowa Law Rev"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2000.886455"},{"key":"ref1","first-page":"383","article-title":"The uber-all economy of the future","volume":"20","author":"smith","year":"2016","journal-title":"Independent Review"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2018.8796515"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/LISS.2018.8593271"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC47524.2020.9031164"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2019.8809108"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2786307"}],"event":{"name":"2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)","location":"Doha, Qatar","start":{"date-parts":[[2020,2,2]]},"end":{"date-parts":[[2020,2,5]]}},"container-title":["2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9081868\/9089428\/09089473.pdf?arnumber=9089473","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:16:03Z","timestamp":1656375363000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9089473\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/iciot48696.2020.9089473","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}