{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T04:17:56Z","timestamp":1775794676960,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Foundation of Yunnan Key Laboratory of Blockchain Application Technology","award":["202105AG070005"],"award-info":[{"award-number":["202105AG070005"]}]},{"name":"Foundation of Yunnan Key Laboratory of Blockchain Application Technology","award":["YNB202103"],"award-info":[{"award-number":["YNB202103"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972366"],"award-info":[{"award-number":["61972366"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Provincial Key Research and Development Program of Hubei","award":["2020BAB105"],"award-info":[{"award-number":["2020BAB105"]}]},{"name":"Foundation of Henan Key Laboratory of Network Cryptography Technology","award":["LNCT2020-A01"],"award-info":[{"award-number":["LNCT2020-A01"]}]},{"name":"Foundation of Hubei Key Laboratory of Intelligent Geo-Information Processing","award":["KLIGIP-2021B06"],"award-info":[{"award-number":["KLIGIP-2021B06"]}]},{"name":"Cloud Technology Endowed Professorship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2023,2,1]]},"DOI":"10.1109\/tc.2022.3157996","type":"journal-article","created":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T20:28:29Z","timestamp":1646857709000},"page":"501-512","source":"Crossref","is-referenced-by-count":148,"title":["A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things"],"prefix":"10.1109","volume":"72","author":[{"given":"Yizhi","family":"Liu","sequence":"first","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4770-7084","authenticated-orcid":false,"given":"Xiaohan","family":"Hao","sequence":"additional","affiliation":[{"name":"School of Software, University of Technology Sydney, Ultimo, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8590-1737","authenticated-orcid":false,"given":"Wei","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan, China"}]},{"given":"Ruoting","family":"Xiong","sequence":"additional","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0702-7102","authenticated-orcid":false,"given":"Tianqing","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1395-7314","authenticated-orcid":false,"given":"Geyong","family":"Min","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Exeter, Exeter, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3398020"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0456-1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.54"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3372136"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3020092"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3417987"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812239"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46568-5_53"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.010"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2847632"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00099"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2018.8301713"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2018.8390280"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.284"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3332301"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_31"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2903172"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3423166"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89722-6_10"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328743"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_28"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/compcomm.2017.8322752"},{"key":"ref24","first-page":"103","article-title":"Empirical vulnerability analysis of automated smart contracts security testing on blockchains","volume-title":"Proc. 28th Annu. Int. Conf. Comput. Sci. Softw. Eng.","author":"Parizi"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2968505"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.5220\/0006363404000405"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISSC.2018.8585365"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2018.00019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2020.1831870"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Spring48590.2020.9128995"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2017.00112"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3048345"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3050802"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_4"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2004.1310743"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88733-1_22"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229319"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_31"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_12"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2019.00015"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2972923"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3119963"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/10019338\/09732238.pdf?arnumber=9732238","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T04:32:57Z","timestamp":1744345977000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9732238\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,1]]},"references-count":43,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tc.2022.3157996","relation":{},"ISSN":["0018-9340","1557-9956","2326-3814"],"issn-type":[{"value":"0018-9340","type":"print"},{"value":"1557-9956","type":"electronic"},{"value":"2326-3814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,1]]}}}