{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T12:58:43Z","timestamp":1758632323343,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T00:00:00Z","timestamp":1603843200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T00:00:00Z","timestamp":1603843200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T00:00:00Z","timestamp":1603843200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,28]]},"DOI":"10.1109\/uemcon51285.2020.9298090","type":"proceedings-article","created":{"date-parts":[[2020,12,25]],"date-time":"2020-12-25T21:47:33Z","timestamp":1608932853000},"page":"0770-0778","source":"Crossref","is-referenced-by-count":2,"title":["Healthcare Security Based on Blockchain within Multi-parameter Chaotic Map"],"prefix":"10.1109","author":[{"given":"Azhar Hasan","family":"Nsaif Drebee","sequence":"first","affiliation":[]},{"given":"Ahmet E.","family":"Topcu","sequence":"additional","affiliation":[]},{"given":"Yasamin","family":"Alagrash","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"System and method for providing shared hash engine architecture for a bitcoin blockchain","year":"2017","author":"mann","key":"ref10"},{"article-title":"Homomorphic encryption in a healthcare network environment, system, and methods","year":"2019","author":"shiong","key":"ref11"},{"key":"ref12","first-page":"926","article-title":"Image encryption using a chaotic logistic map. Image and vision computing","volume":"24","author":"pareek","year":"2006"},{"article-title":"Chaos-based Cryptography for Voice Encryption in Wireless Communication Literature Survey","year":"2014","author":"sadkhan","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1117\/12.2524356"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/e22040474"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3352411.3352436"},{"article-title":"Verification of a cryptographic primitive: SHA-256. ACM Transactions on Programming Languages and Systems","year":"2015","author":"appel","key":"ref17"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"83","DOI":"10.3390\/s20010083","article-title":"A multidimensional hyperjerk oscillator: Dynamics analysis, analogueand embedded systems implementation, and its application as a cryptosys-tem","volume":"20","author":"nestor","year":"2019","journal-title":"SENSORS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946373"},{"key":"ref4","article-title":"Comparative performance analysis of chaos-based image encryption techniques","volume":"7","author":"sekar","year":"2020","journal-title":"Critical Review"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0659-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.011791712"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/sym12050829"},{"key":"ref8","first-page":"71","article-title":"Blockchain technology: Beyond bitcoin. Applied Innovation","volume":"2","author":"crosby","year":"2016"},{"article-title":"Block Mining Methods and Apparatus","year":"2017","author":"hanke","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4258\/hir.2020.26.1.3"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csbj.2018.06.003"},{"key":"ref9","first-page":"45","article-title":"Bitcoinng: A scalable blockchain protocol. In 13th USENIX Symposium on Networked Systems Design and Implementation ($$NSDI$$ 16)","author":"eyal","year":"2016"},{"journal-title":"SQL Server Security Model","year":"2019","author":"carter","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0574-6"},{"key":"ref21","article-title":"From authentication to &#x2018;Hanseatic governance&#x2019;: Blockchain as organizational technology","author":"miscione","year":"2019","journal-title":"London School of Economics and Political Science (LSE) seminar series organized by the Department of Management"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.3390\/electronics9010094","article-title":"A Blockchain-Based Smart Contract System for Healthcare Management","author":"khatoon","year":"2020"}],"event":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","start":{"date-parts":[[2020,10,28]]},"location":"New York, NY, USA","end":{"date-parts":[[2020,10,31]]}},"container-title":["2020 11th IEEE Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9297925\/9297927\/09298090.pdf?arnumber=9298090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:15:15Z","timestamp":1656602115000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9298090\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,28]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/uemcon51285.2020.9298090","relation":{},"subject":[],"published":{"date-parts":[[2020,10,28]]}}}