{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:45:43Z","timestamp":1730249143334,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T00:00:00Z","timestamp":1597968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T00:00:00Z","timestamp":1597968000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T00:00:00Z","timestamp":1597968000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8,21]]},"DOI":"10.1109\/ickii50300.2020.9318935","type":"proceedings-article","created":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T17:04:10Z","timestamp":1615827850000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["Novel Data Protection for Bounded-Error IoT with Blockchain Smart Contract"],"prefix":"10.1109","author":[{"given":"Yu-Kai","family":"Tseng","sequence":"first","affiliation":[]},{"given":"Chia-Hui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ray-I","family":"Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672311"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/2.869369"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"3577","DOI":"10.3390\/s18103577","article-title":"Smart contract-based review system for an IoT data marketplace","volume":"18 10","author":"park","year":"2018","journal-title":"SENSORS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2018.2880806"},{"key":"ref15","first-page":"111","article-title":"Error-bounded data compression using data, temporal and spatial correlations in wireless sensor networks","author":"meng-han","year":"0","journal-title":"2010 International Conference on Multimedia Information Networking and Security"},{"key":"ref16","first-page":"1","article-title":"Dynamic bounded-error data compression and aggregation in wireless sensor network","author":"yu-hao","year":"2012","journal-title":"Sensors 2012 IEEE"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENS.2014.6985234"},{"key":"ref18","first-page":"133","article-title":"Compression using Huffman coding","volume":"10 5","author":"mamta","year":"2010","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"journal-title":"Data compression using run length encoding and statistical encoding","year":"1986","author":"hauck","key":"ref19"},{"year":"0","key":"ref28"},{"key":"ref4","article-title":"Long-Term Surface Wind Speed Trends over Taiwan between 1961&#x2013;2008","author":"chu","year":"0","journal-title":"Research Report in the Department of Civil Engineering National Central University"},{"year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2015.121"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-809859-2.00009-7"},{"journal-title":"Standard Method for Temperature Measurement","year":"2013","key":"ref5"},{"key":"ref8","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151 2014","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2018.01.006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"ref1","article-title":"UPHSM: Ubiquitous personal health surveillance and management system via WSN agent on open source smartphone","author":"chu","year":"0","journal-title":"2011 IEEE 13th International Conference on e-Health Networking Applications and Services IEEE"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/app10186512"},{"journal-title":"IPFS - Content Addressed Versioned P2P File System","year":"2014","author":"juan","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENS.2014.6985428"},{"key":"ref24","first-page":"460","article-title":"An Internet of energy things based on wireless LPWAN","volume":"3 4","author":"yonghua","year":"2017","journal-title":"Engineering"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"375","DOI":"10.3390\/en9050375","article-title":"Telecommunication technologies for smart grid projects with focus on smart metering applications","volume":"9 5","author":"andreadou","year":"2016","journal-title":"Energies"},{"year":"0","key":"ref26"},{"year":"0","key":"ref25"}],"event":{"name":"2020 3rd IEEE International Conference on Knowledge Innovation and Invention (ICKII)","start":{"date-parts":[[2020,8,21]]},"location":"Kaohsiung, Taiwan","end":{"date-parts":[[2020,8,23]]}},"container-title":["202020 3rd IEEE International Conference on Knowledge Innovation and Invention (ICKII)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9318770\/9318813\/09318935.pdf?arnumber=9318935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:47:31Z","timestamp":1656438451000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9318935\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,21]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ickii50300.2020.9318935","relation":{},"subject":[],"published":{"date-parts":[[2020,8,21]]}}}