{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:16:46Z","timestamp":1760080606938,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T00:00:00Z","timestamp":1643155200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T00:00:00Z","timestamp":1643155200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,26]]},"DOI":"10.1109\/kst53302.2022.9729059","type":"proceedings-article","created":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T20:27:49Z","timestamp":1647030469000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Blockchain for Transport (BC<sub>4<\/sub> T), Performance Simulations of Blockchain Network for Emission Monitoring"],"prefix":"10.1109","author":[{"given":"Dermot","family":"O'Brien","sequence":"first","affiliation":[{"name":"Sustainable Transport, Unit C4 DG JRC, European Commission,Ispra,Italy"}]},{"given":"Vasileios","family":"Christaras","sequence":"additional","affiliation":[{"name":"Digital Citizens&#x0027; Security, Unit E3 DG JRC, European Commission,Ispra,Italy"}]},{"given":"Ioannis","family":"Kounelis","sequence":"additional","affiliation":[{"name":"Digital Citizens&#x0027; Security, Unit E3 DG JRC, European Commission,Ispra,Italy"}]},{"given":"Igor Nai","family":"Fovino","sequence":"additional","affiliation":[{"name":"Digital Citizens&#x0027; Security, Unit E3 DG JRC, European Commission,Ispra,Italy"}]},{"given":"Georgios","family":"Fontaras","sequence":"additional","affiliation":[{"name":"Sustainable Transport, Unit C4 DG JRC, European Commission,Ispra,Italy"}]}],"member":"263","reference":[{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3028189"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149366"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2977361"},{"journal-title":"Towards an interoperable identity management framework: a comparative study","year":"2019","author":"Haddouti","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICITIS.2010.5689468"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2008.18"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5280"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS49054.2020.9119664"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00067"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS49054.2020.9119664"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2440"},{"key":"ref14","article-title":"Decentralized identifiers (dids) vl, 0","volume-title":"Draft Community Group Report","author":"Reed","year":"2020"},{"volume-title":"Verifiable credentials data model 1. 0: Expressing verifiable information on the web","year":"2019","author":"Consortium","key":"ref15"},{"volume-title":"The path for self-soverign identity; last accessed march of 2021","author":"Allen","key":"ref16"},{"volume-title":"The electronic identification and trust services (eidas) regulation, regulation no 910\/2014","key":"ref18"},{"volume-title":"Directive 2002\/58\/ec of the european parliament and of the council of 12 july 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (directive on privacy and electronic communications)","key":"ref19"},{"volume-title":"Internet x. 509 public key infrastructure certificate and certificate revocation list (crl) profile","key":"ref20"},{"issue":"2","key":"ref21","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1109\/TETC.2013.2287188","article-title":"Epic: A testbed for scientifically rigorous cyber-physical security experimentation","volume":"1","author":"S. C. G. B","year":"2013","journal-title":"IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12971-2_9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076752"},{"volume-title":"Hyperledger fabric docs release 2. 2 rafter orderer","key":"ref24"},{"journal-title":"Hyperledger fabric docs release 2. 0 transaction detaails","key":"ref25"}],"event":{"name":"2022 14th International Conference on Knowledge and Smart Technology (KST)","start":{"date-parts":[[2022,1,26]]},"location":"Chon buri, Thailand","end":{"date-parts":[[2022,1,29]]}},"container-title":["2022 14th International Conference on Knowledge and Smart Technology (KST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9727229\/9727230\/09729059.pdf?arnumber=9729059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T05:06:48Z","timestamp":1725340008000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9729059\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,26]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/kst53302.2022.9729059","relation":{},"subject":[],"published":{"date-parts":[[2022,1,26]]}}}