{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T19:29:10Z","timestamp":1767900550754,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:00:00Z","timestamp":1750204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:00:00Z","timestamp":1750204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100018693","name":"Horizon Europe","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,18]]},"DOI":"10.1109\/ntms65597.2025.11076964","type":"proceedings-article","created":{"date-parts":[[2025,7,18]],"date-time":"2025-07-18T17:42:27Z","timestamp":1752860547000},"page":"136-143","source":"Crossref","is-referenced-by-count":1,"title":["A Blockchain-based data management approach for swarm-edge computing"],"prefix":"10.1109","author":[{"given":"Adnan","family":"Imeri","sequence":"first","affiliation":[{"name":"Reliable, Secure and Connected Systems (READY) Unit Luxembourg Institute of Science and Technology (LIST),Esch-sur-Alzette,Luxembourg"}]},{"given":"Oussama","family":"Gharsallaoui","sequence":"additional","affiliation":[{"name":"Reliable, Secure and Connected Systems (READY) Unit Luxembourg Institute of Science and Technology (LIST),Esch-sur-Alzette,Luxembourg"}]},{"given":"Thierry","family":"Grandjean","sequence":"additional","affiliation":[{"name":"Reliable, Secure and Connected Systems (READY) Unit Luxembourg Institute of Science and Technology (LIST),Esch-sur-Alzette,Luxembourg"}]},{"given":"Uwe","family":"Roth","sequence":"additional","affiliation":[{"name":"Reliable, Secure and Connected Systems (READY) Unit Luxembourg Institute of Science and Technology (LIST),Esch-sur-Alzette,Luxembourg"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3076759"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/I2CT54291.2022.9824566"},{"issue":"3","key":"ref3","first-page":"50","article-title":"A Study of Blockchain Oracles","volume":"10","author":"Beniiche","year":"2020","journal-title":"Journal of Blockchain Research"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-34171-7_7"},{"issue":"3","key":"ref5","first-page":"200","article-title":"Access Control Mechanisms in Decentralized Storage Systems","volume":"18","author":"Clark","year":"2022","journal-title":"Journal of Distributed Systems and Security"},{"key":"ref6","article-title":"ERC-1271: Standard Signature Validation Method for Contracts","year":"2025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3184726"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300834"},{"issue":"2","key":"ref9","first-page":"45","article-title":"Homomorphic Encryption: A Technique for Secure Data Processing","volume":"12","author":"Bob Johnson","year":"2021","journal-title":"Cryptography and Data Security"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPS57946.2023.00018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CANDAR.2019.00026"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58779-6_2"},{"key":"ref13","article-title":"How to set up on-chain governance","year":"2025"},{"key":"ref14","article-title":"Gravity: A Blockchain-Agnostic Cross-Chain Communication and Data Oracles Protocol","author":"Pupyshev","year":"2020","journal-title":"arXiv:2007.00966"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC347590.2019.9036792"},{"issue":"5","key":"ref16","first-page":"e461","article-title":"Promise of Zero-Knowledge Proofs (ZKPs) for Blockchain Privacy and Security: Opportunities and Challenges","volume":"6","author":"Sahu","year":"2023","journal-title":"Security Privacy"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12071545"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.62051\/ijcsit.v2n2.16"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.2581"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9122041"}],"event":{"name":"2025 12th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","location":"Paris, France","start":{"date-parts":[[2025,6,18]]},"end":{"date-parts":[[2025,6,20]]}},"container-title":["2025 12th IFIP International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11076604\/11076612\/11076964.pdf?arnumber=11076964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T05:05:38Z","timestamp":1752901538000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11076964\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,18]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ntms65597.2025.11076964","relation":{},"subject":[],"published":{"date-parts":[[2025,6,18]]}}}