{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:07:37Z","timestamp":1730293657661,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/rtsi.2018.8548405","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T00:56:47Z","timestamp":1543885007000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["BlAsT: Blockchain-Assisted Key Transparency for Device Authentication"],"prefix":"10.1109","author":[{"given":"Alessandro","family":"Gattolin","sequence":"first","affiliation":[]},{"given":"Cristina","family":"Rottondi","sequence":"additional","affiliation":[]},{"given":"Giacomo","family":"Verticale","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Predicting Bitcoin fees for transactions","year":"0","key":"ref10"},{"journal-title":"Solidity","year":"0","key":"ref11"},{"journal-title":"Ethereum Charts & Statistics","year":"2017","key":"ref12"},{"key":"ref13","article-title":"State tree pruning","author":"buterin","year":"2015","journal-title":"Ethereum Blog"},{"journal-title":"Geth","year":"0","key":"ref14"},{"journal-title":"Parity","year":"0","key":"ref15"},{"journal-title":"Infura - scalable blockchain infrastructure","year":"0","key":"ref16"},{"key":"ref4","first-page":"95","article-title":"Ethiks: Using ethereum to audit a coniks key transparency log","author":"bonneau","year":"2016","journal-title":"International Conference on Financial Cryptography and Data Security"},{"journal-title":"Google key transparency","year":"2017","key":"ref3"},{"journal-title":"Chronicled - smart supply chains solutions","year":"0","key":"ref6"},{"key":"ref5","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.19"},{"key":"ref7","first-page":"803","article-title":"A decentralized public key infrastructure with identity retention","volume":"2014","author":"fromknecht","year":"2014","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref2","first-page":"383","article-title":"Coniks: Bringing key transparency to end users","author":"melara","year":"2015","journal-title":"Usenix Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6962"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0072"}],"event":{"name":"2018 IEEE 4th International Forum on Research and Technology for Society and Industry (RTSI)","start":{"date-parts":[[2018,9,10]]},"location":"Palermo","end":{"date-parts":[[2018,9,13]]}},"container-title":["2018 IEEE 4th International Forum on Research and Technology for Society and Industry (RTSI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8528317\/8548348\/08548405.pdf?arnumber=8548405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:57:17Z","timestamp":1598230637000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8548405\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/rtsi.2018.8548405","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}