{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:50:58Z","timestamp":1730296258273,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T00:00:00Z","timestamp":1700438400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T00:00:00Z","timestamp":1700438400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,20]]},"DOI":"10.1109\/sin60469.2023.10475049","type":"proceedings-article","created":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T18:33:02Z","timestamp":1711564382000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A Comparative Analysis of Autonomous Ledger Systems for Enhanced Blockchain Computing Applications"],"prefix":"10.1109","author":[{"given":"Soumi","family":"Ghosh","sequence":"first","affiliation":[{"name":"Maharaja Agrasen Institute of Technology,Department of IT,Delhi,India"}]},{"given":"Kamal","family":"Upreti","sequence":"additional","affiliation":[{"name":"CHRIST (Deemed to be University),Department of Computer Science,Delhi NCR, Ghaziabad,India"}]},{"given":"Samreen","family":"Jafri","sequence":"additional","affiliation":[{"name":"Imam Abdulrahman bin Faisal University,Dammam,KSA"}]},{"given":"Prakash","family":"Divakaran","sequence":"additional","affiliation":[{"name":"Himalayan University,Itanagar,Arunachal Pradesh,India"}]},{"given":"Vandana Mishra","family":"Chaturvedi","sequence":"additional","affiliation":[{"name":"D Y Patil Deemed to be University,Navi Mumbai,India"}]},{"given":"Prashant","family":"Vats","sequence":"additional","affiliation":[{"name":"SCSE, Manipal University Jaipur,Faculty of Engineering,Dept. of CSE,Jaipur,Rajasthan,India"}]}],"member":"263","reference":[{"issue":"5","key":"ref1","first-page":"2035","article-title":"Blockchain-based security framework for autonomous vehicles","volume":"11","author":"Al-Turjman","year":"2020","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"ref2","first-page":"1","article-title":"Securing autonomous vehicles with blockchain technology","volume-title":"2019 IEEE 91st Vehicular Technology Conference (VTC Spring)","author":"Biswas","year":"2019"},{"issue":"3","key":"ref3","first-page":"1126","article-title":"A blockchain-based approach for securing autonomous vehicles against cyber-attacks","volume":"20","author":"Yli-Huumo","year":"2018","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"ref4","first-page":"135880","article-title":"A blockchain-based framework for securing autonomous vehicles in smart cities","volume":"7","author":"Zheng","year":"2019","journal-title":"IEEE Access"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/globecom42002.2020.9322156"},{"issue":"2","key":"ref6","first-page":"553","article-title":"A blockchain-based access control framework for securing autonomous vehicles","volume":"10","author":"Kim","year":"2020","journal-title":"Applied Sciences"},{"issue":"6","key":"ref7","first-page":"2489","article-title":"A blockchain-based secure and privacy-preserving vehicle platoon system","volume":"21","author":"Xiong","year":"2019","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/aiccsa.2016.7945805"},{"issue":"10","key":"ref9","first-page":"11956","article-title":"Blockchain-based data sharing and communication security in intelligent transportation systems","volume":"69","author":"Guo","year":"2020","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"ref10","first-page":"1","article-title":"Blockchain-based Secure and Privacy-Preserving Framework for Vehicular Ad Hoc Networks","volume-title":"Proceedings of the 14th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2020)","author":"Rahman","year":"2020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-1142-2_38"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICESC.2014.67"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-0098-3_55"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-0098-3_46"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIPTM54933.2022.9753887"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICACITE53722.2022.9823471"},{"key":"ref17","first-page":"751","article-title":"A sustainable green approach to the virtualized environment in cloud computing","volume-title":"Smart Trends in Computing and Communications: Proceedings of SmartCom 2022","author":"Anjani","year":"2022"},{"key":"ref18","article-title":"A comparative study of various wireless network optimization techniques","volume-title":"Information and Communication Technology for Competitive Strategies (ICTCS 2020) ICT: Applications and Social Interfaces","author":"Kanika","year":"2022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JICTEE.2014.6804068"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-5655-2_14"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/9781119879862.ch9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT55121.2022.10064580"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-5221-0_2"},{"issue":"4","key":"ref24","first-page":"3836","article-title":"A Literature Review on Security Aspects for Fault Tolerance in Networks","volume":"6","author":"Vats","year":"2015","journal-title":"(IJCSIT) International Journal of Computer Science and Information Technologies"},{"key":"ref25","article-title":"Blockchain-Based Secure Cloud Data Management: A Novel Approach for Data Privacy and Integrity","volume-title":"International Conference on ICT for Sustainable Development","author":"Gaurav","year":"2023"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/icdsns58469.2023.10245763"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4018\/IJEBR.294110"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/hbe2.302"},{"key":"ref29","article-title":"Blockchain adoption intention in higher education: role of trust, perceived security and privacy in technology adoption model","volume-title":"Proceedings of International Conference on Emerging Technologies and Intelligent Systems: ICETIS 2021 (Volume 1)","author":"Nishant","year":"2022"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSEC51865.2021.9591954"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCS51141.2021.9432268"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2386139"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12510"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.13052\/jmm1550-4646.1941"},{"key":"ref35","first-page":"1","article-title":"A systematic meta-analysis of blockchain technology for educational sector and its advancements towards education 4.0","author":"Mustafizul","year":"2023","journal-title":"Education and Information Technologies"},{"journal-title":"An Experimental Evaluation of Hybrid Learning Methodology based Internet of Things Assisted Health Care Monitoring System","year":"2021","author":"Kamal","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.037"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427067"},{"key":"ref39","first-page":"1","article-title":"Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network","author":"Rati","year":"2023","journal-title":"The Journal of Supercomputing"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.30534\/ijatcse\/2020\/288942020"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISEA-ISAP54304.2021.9689709"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2896380"},{"key":"ref43","article-title":"Techniques For Analysis And Detection Of Android Malware \u2026 Diss","author":"Faruki","year":"2016","journal-title":"MNIT Jaipur"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2523514.2523539"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICDABI53623.2021.9655928"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3390\/info14070374"}],"event":{"name":"2023 16th International Conference on Security of Information and Networks (SIN)","start":{"date-parts":[[2023,11,20]]},"location":"Jaipur, India","end":{"date-parts":[[2023,11,21]]}},"container-title":["2023 16th International Conference on Security of Information and Networks (SIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10474597\/10474609\/10475049.pdf?arnumber=10475049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T20:34:11Z","timestamp":1711658051000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10475049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,20]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/sin60469.2023.10475049","relation":{},"subject":[],"published":{"date-parts":[[2023,11,20]]}}}