{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:14:06Z","timestamp":1772554446878,"version":"3.50.1"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,26]]},"DOI":"10.1109\/lcn53696.2022.9843631","type":"proceedings-article","created":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T19:43:27Z","timestamp":1661543007000},"page":"299-302","source":"Crossref","is-referenced-by-count":4,"title":["Blockchain-Based Decentralized Authentication for Information-Centric 5G Networks"],"prefix":"10.1109","author":[{"given":"Muhammad","family":"Hassan","sequence":"first","affiliation":[{"name":"National Institute of Standards and Technology (NIST),Gaithersburg,MD,USA"}]},{"given":"Davide","family":"Pesavento","sequence":"additional","affiliation":[{"name":"National Institute of Standards and Technology (NIST),Gaithersburg,MD,USA"}]},{"given":"Lotfi","family":"Benmohamed","sequence":"additional","affiliation":[{"name":"National Institute of Standards and Technology (NIST),Gaithersburg,MD,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/5GWF.2018.8517046"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2342488.2342507"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2984356.2984376"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2672991"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2365742"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.08.005"},{"key":"ref7","article-title":"Security architecture and procedures for 5g system","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9839088"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2015.7412593"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2000.891926"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2749508"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FGCT.2012.6476561"}],"event":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","location":"Edmonton, AB, Canada","start":{"date-parts":[[2022,9,26]]},"end":{"date-parts":[[2022,9,29]]}},"container-title":["2022 IEEE 47th Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9843189\/9843201\/09843631.pdf?arnumber=9843631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T05:27:29Z","timestamp":1727501249000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9843631\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,26]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/lcn53696.2022.9843631","relation":{},"subject":[],"published":{"date-parts":[[2022,9,26]]}}}