{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:15:26Z","timestamp":1730279726429,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1109\/iwcmc61514.2024.10592428","type":"proceedings-article","created":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T17:18:34Z","timestamp":1721236714000},"page":"1649-1654","source":"Crossref","is-referenced-by-count":0,"title":["Task Integrity Checker: A Block Chain - Enabled Trust Management System for Fog Nodes"],"prefix":"10.1109","author":[{"given":"V","family":"Rasagna","sequence":"first","affiliation":[{"name":"Bits Pilani,Dept of CSIS,Hyderabad,India"}]},{"given":"G","family":"Geethakumari","sequence":"additional","affiliation":[{"name":"Bits Pilani,Dept of CSIS,Hyderabad,India"}]},{"given":"Jinil Bhavin","family":"Shah","sequence":"additional","affiliation":[{"name":"Bits Pilani,Dept of EEE,Hyderabad,India"}]},{"given":"Nisarg","family":"Chaudhari","sequence":"additional","affiliation":[{"name":"Bits Pilani,Dept of CSIS,Hyderabad,India"}]}],"member":"263","reference":[{"issue":"2","key":"ref1","first-page":"4116","article-title":"A comprehensive review on fog computing: State-of-the-art and research challenges","volume":"6","author":"Hossain","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"ref2","article-title":"Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review","author":"Patwary","year":"2020","journal-title":"arXiv preprint arXiv:2003.00395"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5772\/7263"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.10.006"},{"key":"ref5","article-title":"The keccak reference","author":"Bertoni","year":"2011","journal-title":"Keccak Team"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.049"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.030"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2365797"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205993"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/859731"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6063456"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.258"},{"key":"ref14","first-page":"40","article-title":"itrust: a trust-aware ontology for information systems development","author":"Bimrah","year":"2008","journal-title":"Proceedings of Advances in Computing and Technology"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA47632.2019.9035252"},{"issue":"1999","key":"ref16","first-page":"173","article-title":"Practical byzantine fault tolerance","volume":"99","author":"Castro","year":"1999","journal-title":"OsDI"}],"event":{"name":"2024 International Wireless Communications and Mobile Computing (IWCMC)","start":{"date-parts":[[2024,5,27]]},"location":"Ayia Napa, Cyprus","end":{"date-parts":[[2024,5,31]]}},"container-title":["2024 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10592105\/10592309\/10592428.pdf?arnumber=10592428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T05:48:23Z","timestamp":1721368103000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10592428\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iwcmc61514.2024.10592428","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]}}}