{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:29:27Z","timestamp":1775744967690,"version":"3.50.1"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1807800"],"award-info":[{"award-number":["2020YFB1807800"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1109\/tnsm.2022.3180357","type":"journal-article","created":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T19:31:09Z","timestamp":1654630269000},"page":"2664-2676","source":"Crossref","is-referenced-by-count":63,"title":["A Blockchain-Based Multi-CA Cross-Domain Authentication Scheme in Decentralized Autonomous Network"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2198-5676","authenticated-orcid":false,"given":"Miaomiao","family":"Wang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7581-383X","authenticated-orcid":false,"given":"Lanlan","family":"Rui","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7848-5421","authenticated-orcid":false,"given":"Yang","family":"Yang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0563-6396","authenticated-orcid":false,"given":"Zhipeng","family":"Gao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Xingyu","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100291"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2019.00026"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2005.03.003"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2014.07.011"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107431"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCS49078.2020.9118421"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3107443"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.psep.2020.09.049"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1722\/1\/012078"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101962"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2018.00143"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980916"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102812"},{"key":"ref2","article-title":"6G networks: Beyond Shannon towards semantic and goal-oriented communications","volume":"190","author":"strinati","year":"2021","journal-title":"Comput Netw"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/s21051709"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.23919\/JCIN.2021.9387704"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108676"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3056540"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC51575.2020.9345108"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102538"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3113321"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9942950"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxaa046"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107731"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxz013"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00850-z"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102436"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxaa119"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102791"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1989.0125"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103050"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01103-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3120912"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01127-0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s21061985"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2920987"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23597-0_12"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3116049"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2584681"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103320"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2882794"},{"key":"ref5","first-page":"92","article-title":"Collaborative validation of public-key certificates for IoT by distributed caching","volume":"29","author":"wang","year":"2021","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.046"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3146929"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2021040108"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.12.028"},{"key":"ref46","article-title":"Blockchain on security and forensics management in edge computing for IoT: A comprehensive survey","author":"liao","year":"2021","journal-title":"IEEE Trans Netw Service Manag"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3118642"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.06.013"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1109\/TNSM.2021.3097903","article-title":"DAD: Domain adversarial defense system against DDoS attacks in cloud","volume":"19","author":"divyasree","year":"2022","journal-title":"IEEE Trans Netw Service Manag"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/396\/1\/012030"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3078072"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3074544"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9917435\/09789481.pdf?arnumber=9789481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T17:42:00Z","timestamp":1665769320000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9789481\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":54,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2022.3180357","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9]]}}}