{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:18:01Z","timestamp":1774628281129,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/ipccc47392.2019.8958754","type":"proceedings-article","created":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T21:04:32Z","timestamp":1579208672000},"page":"1-9","source":"Crossref","is-referenced-by-count":8,"title":["A Blockchain-Based Authentication Method with One-Time Password"],"prefix":"10.1109","author":[{"given":"Mingli","family":"Zhang","sequence":"first","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China"}]},{"given":"Liming","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China"}]},{"given":"Jing","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China"}]}],"member":"263","reference":[{"key":"ref10","author":"axon","year":"2016","journal-title":"PB-PKI a privacy-aware blockchain-based PKI"},{"key":"ref11","article-title":"Portable trust: biometric-based authentication and blockchain storage for self-sovereign identity systems","author":"hammudoglu","year":"2017","journal-title":"arXiv preprint arXiv 1706 03744"},{"key":"ref12","article-title":"Biometric and password two-factor cross domain authentication scheme based on blockchain technology","author":"zhou","year":"2018","journal-title":"Journal of Computer Applications"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422733"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_26"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866025"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4226"},{"key":"ref17","article-title":"Totp: Time-based one-time password algorithm","author":"rydell","year":"1997","journal-title":"Informational RFC"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1760"},{"key":"ref19","year":"0","journal-title":"A blockchain platform for the enterprise"},{"key":"ref4","author":"wood","year":"2014","journal-title":"Ethereum A secure decentralized transaction ledger"},{"key":"ref3","article-title":"Research progress of blockchain technology and its application in information security","author":"liu","year":"2018","journal-title":"Journal of Software"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v2i9.548"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.010"},{"key":"ref7","author":"kogan","year":"2017","journal-title":"T\/key Second-factor authentication from secure hash chains"},{"key":"ref2","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1179529.1179532"},{"key":"ref9","article-title":"Certcoin: A namecoin based decentralized authentication system 6.857 class project","author":"fromknecht","year":"2014","journal-title":"Unpublished class project"},{"key":"ref20","year":"0","journal-title":"Hyperledger fabric samples"}],"event":{"name":"2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC)","location":"London, UK","start":{"date-parts":[[2019,10,29]]},"end":{"date-parts":[[2019,10,31]]}},"container-title":["2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8955479\/8958711\/08958754.pdf?arnumber=8958754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T18:34:59Z","timestamp":1755714899000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8958754\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ipccc47392.2019.8958754","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}