{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:43:28Z","timestamp":1775745808926,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T00:00:00Z","timestamp":1714348800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T00:00:00Z","timestamp":1714348800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,29]]},"DOI":"10.1109\/isdfs60797.2024.10527226","type":"proceedings-article","created":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T17:33:23Z","timestamp":1715794403000},"page":"01-08","source":"Crossref","is-referenced-by-count":20,"title":["HNMblock: Blockchain Technology Powered Healthcare Network Model for Epidemiological Monitoring, Medical Systems Security, and Wellness"],"prefix":"10.1109","author":[{"given":"Naresh","family":"Kshetri","sequence":"first","affiliation":[{"name":"CyROC, School of Business &#x0026; Technology Emporia State University,Emporia,Kansas,USA"}]},{"given":"Rahul","family":"Mishra","sequence":"additional","affiliation":[{"name":"University of Allahabad,Department of Electronics &#x0026; Communication,Uttar Pradesh,India"}]},{"given":"Mir Mehedi","family":"Rahman","sequence":"additional","affiliation":[{"name":"CyROC, School of Business &#x0026; Technology Emporia State University,Emporia,Kansas,USA"}]},{"given":"Tanja","family":"Steigner","sequence":"additional","affiliation":[{"name":"School of Business &#x0026; Technology Emporia State University,Emporia,Kansas,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2021.3085913"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3236505"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2022.02.004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2022.0131140"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.34306\/bfront.v1i01.4"},{"issue":"1","key":"ref6","article-title":"FinChain: Adaptation of Blockchain Technology in Finance and Business - An Ethical Analysis of Applications, Challenges, Issues, and Solutions","volume-title":"IJEDIE: VISIONARlUM","volume":"1","author":"Kshetri","year":"2023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3183519.3183546"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3149781"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2952687"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ichi.2019.8904634"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/mitp.2021.3072535"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-73100-7_52"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1301-5_27"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2931531"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/asew.2019.00032"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3245046"},{"key":"ref17","author":"Wizad","year":"2023","journal-title":"Design of Robust Blockchain-Envisioned Authenticated Key Management Mechanism for Smart Healthcare Applications"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/20479700.2020.1843887"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.07.089"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3236505"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3326155"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3185016"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11152314"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2986789"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.health.2023.100175"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/icepe50861.2021.9404496"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2023.100151"}],"event":{"name":"2024 12th International Symposium on Digital Forensics and Security (ISDFS)","location":"San Antonio, TX, USA","start":{"date-parts":[[2024,4,29]]},"end":{"date-parts":[[2024,4,30]]}},"container-title":["2024 12th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10526462\/10526466\/10527226.pdf?arnumber=10527226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T05:01:56Z","timestamp":1715835716000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10527226\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,29]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/isdfs60797.2024.10527226","relation":{},"subject":[],"published":{"date-parts":[[2024,4,29]]}}}