{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T15:21:12Z","timestamp":1767626472965,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T00:00:00Z","timestamp":1557014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,5]]},"DOI":"10.1145\/3312614.3312650","type":"proceedings-article","created":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T13:37:58Z","timestamp":1554730678000},"page":"172-178","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection"],"prefix":"10.1145","author":[{"given":"Lydia","family":"Negka","sequence":"first","affiliation":[{"name":"University of Thessaly, Greece"}]},{"given":"Georgios","family":"Gketsios","sequence":"additional","affiliation":[{"name":"University of Thessaly, Greece"}]},{"given":"Nikolaos A.","family":"Anagnostopoulos","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Georgios","family":"Spathoulas","sequence":"additional","affiliation":[{"name":"University of Thessaly, Greece"}]},{"given":"Athanasios","family":"Kakarountas","sequence":"additional","affiliation":[{"name":"University of Thessaly, Greece"}]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,5,5]]},"reference":[{"unstructured":"S. Ahmad. 2018. Using Physical Unclonable Functions for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training. Master's thesis. Technische Universit\u00e4t Darmstadt.  S. Ahmad. 2018. Using Physical Unclonable Functions for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training. Master's thesis. Technische Universit\u00e4t Darmstadt.","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/2899007.2899013"},{"doi-asserted-by":"crossref","unstructured":"N. A. Anagnostopoulos T. Arul Y. Fan C. Hatzfeld A. Schaller W. Xiong M. Jain M. U. Saleem J. Lotichius S. Gabmeyer J. Szefer and S. Katzenbeisser. 2018. Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security. Cryptography 2 3 (2018).  N. A. Anagnostopoulos T. Arul Y. Fan C. Hatzfeld A. Schaller W. Xiong M. Jain M. U. Saleem J. Lotichius S. Gabmeyer J. Szefer and S. Katzenbeisser. 2018. Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security. Cryptography 2 3 (2018).","key":"e_1_3_2_1_3_1","DOI":"10.3390\/cryptography2030013"},{"volume-title":"Securing IoT Devices Using Robust DRAM PUFs. In 2018 Global Information Infrastructure and Networking Symposium (GIIS'18)","author":"Anagnostopoulos N. A.","unstructured":"N. A. Anagnostopoulos , T. Arul , Y. Fan , J. Lotichius , C. Hatzfeld , F. Fernandes , R. Sharma , F. Tehranipoor , and S. Katzenbeisser . 2018 . Securing IoT Devices Using Robust DRAM PUFs. In 2018 Global Information Infrastructure and Networking Symposium (GIIS'18) . Thessaloniki, Greece. N. A. Anagnostopoulos, T. Arul, Y. Fan, J. Lotichius, C. Hatzfeld, F. Fernandes, R. Sharma, F. Tehranipoor, and S. Katzenbeisser. 2018. Securing IoT Devices Using Robust DRAM PUFs. In 2018 Global Information Infrastructure and Networking Symposium (GIIS'18). Thessaloniki, Greece.","key":"e_1_3_2_1_4_1"},{"volume-title":"Low-Temperature Data Remanence Attacks Against Intrinsic SRAM PUFs. In 2018 21st Euromicro Conference on Digital System Design (DSD). 581--585","author":"Anagnostopoulos N. A.","unstructured":"N. A. Anagnostopoulos , T. Arul , M. Rosenstihl , A. Schaller , S. Gabmeyer , and S. Katzenbeisser . 2018 . Low-Temperature Data Remanence Attacks Against Intrinsic SRAM PUFs. In 2018 21st Euromicro Conference on Digital System Design (DSD). 581--585 . N. A. Anagnostopoulos, T. Arul, M. Rosenstihl, A. Schaller, S. Gabmeyer, and S. Katzenbeisser. 2018. Low-Temperature Data Remanence Attacks Against Intrinsic SRAM PUFs. In 2018 21st Euromicro Conference on Digital System Design (DSD). 581--585.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","volume-title":"LDPUF: Exploiting DRAM Latency Variations to Generate Robust Device Signatures. ArXiv e-prints (Aug","author":"Bahar Talukder B. M. S.","year":"2018","unstructured":"B. M. S. Bahar Talukder , B. Ray , M. Tehranipoor , D. Forte , and M. T. Rahman . 2018 . LDPUF: Exploiting DRAM Latency Variations to Generate Robust Device Signatures. ArXiv e-prints (Aug 2018). arXiv:1808.02584 http:\/\/arxiv.org\/abs\/1808.02584 B. M. S. Bahar Talukder, B. Ray, M. Tehranipoor, D. Forte, and M. T. Rahman. 2018. LDPUF: Exploiting DRAM Latency Variations to Generate Robust Device Signatures. ArXiv e-prints (Aug 2018). arXiv:1808.02584 http:\/\/arxiv.org\/abs\/1808.02584"},{"volume-title":"Design Patterns for the Industrial Internet of Things. In 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS). IEEE, 1--10","author":"Bloom G.","unstructured":"G. Bloom , B. Alsulami , E. Nwafor , and I. C. Bertolotti . 2018 . Design Patterns for the Industrial Internet of Things. In 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS). IEEE, 1--10 . G. Bloom, B. Alsulami, E. Nwafor, and I. C. Bertolotti. 2018. Design Patterns for the Industrial Internet of Things. In 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS). IEEE, 1--10.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","volume-title":"Supply Chain: Case Study Alimentary Supply Chain. Procedia computer science 134","author":"Casado-Vara R.","year":"2018","unstructured":"R. Casado-Vara , J. Prieto , F. De la Prieta , and J. M. Corchado . 2018 . How Blockchain Improves the Supply Chain: Case Study Alimentary Supply Chain. Procedia computer science 134 (2018), 393--398. R. Casado-Vara, J. Prieto, F. De la Prieta, and J. M. Corchado. 2018. How Blockchain Improves the Supply Chain: Case Study Alimentary Supply Chain. Procedia computer science 134 (2018), 393--398."},{"doi-asserted-by":"crossref","unstructured":"C. Chaintoutis M. Akriotou C. Mesaritakis I. Komnios D. Karamitros A. Fragkos and D. Syvridis. 2018. Optical PUFs as Physical Root of Trust for Blockchain-Driven Applications. IET Software (2018).  C. Chaintoutis M. Akriotou C. Mesaritakis I. Komnios D. Karamitros A. Fragkos and D. Syvridis. 2018. Optical PUFs as Physical Root of Trust for Blockchain-Driven Applications. IET Software (2018).","key":"e_1_3_2_1_9_1","DOI":"10.1049\/iet-sen.2018.5291"},{"volume-title":"TBDCT: A Framework of Trusted Big Data Collection and Trade System Based on Blockchain and TSM. In 2018 IEEE International Conference on Smart Cloud (SmartCloud). 77--83","author":"Guan Z.","unstructured":"Z. Guan , Y. Zhao , D. Li , and J. Liu . 2018 . TBDCT: A Framework of Trusted Big Data Collection and Trade System Based on Blockchain and TSM. In 2018 IEEE International Conference on Smart Cloud (SmartCloud). 77--83 . Z. Guan, Y. Zhao, D. Li, and J. Liu. 2018. TBDCT: A Framework of Trusted Big Data Collection and Trade System Based on Blockchain and TSM. In 2018 IEEE International Conference on Smart Cloud (SmartCloud). 77--83.","key":"e_1_3_2_1_10_1"},{"unstructured":"GuardTime & Intrinsic ID. 2016. Internet of Things Authentication: A Blockchain Solution Using SRAM Physical Unclonable Functions. https:\/\/www.intrinsic-id.com\/wp-content\/uploads\/2017\/05\/gt_KSI-PUF-web-1611.pdf  GuardTime & Intrinsic ID. 2016. Internet of Things Authentication: A Blockchain Solution Using SRAM Physical Unclonable Functions. https:\/\/www.intrinsic-id.com\/wp-content\/uploads\/2017\/05\/gt_KSI-PUF-web-1611.pdf","key":"e_1_3_2_1_11_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1016\/j.future.2013.01.010"},{"volume-title":"Overview of PUF-Based Hardware Security Solutions for the Internet of Things. In 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS). 1--4.","author":"Halak B.","unstructured":"B. Halak , M. Zwolinski , and M. S. Mispan . 2016 . Overview of PUF-Based Hardware Security Solutions for the Internet of Things. In 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS). 1--4. B.Halak, M. Zwolinski, and M. S. Mispan. 2016. Overview of PUF-Based Hardware Security Solutions for the Internet of Things. In 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS). 1--4.","key":"e_1_3_2_1_13_1"},{"volume-title":"2018 International Symposium on VLSI Design, Automation and Test (VLSI-DAT). 1--4.","author":"Islam M. N.","unstructured":"M. N. Islam , V. C. Patii , and S. Kundu . 2018. On IC Traceability via Blockchain . In 2018 International Symposium on VLSI Design, Automation and Test (VLSI-DAT). 1--4. M. N. Islam, V. C. Patii, and S. Kundu. 2018. On IC Traceability via Blockchain. In 2018 International Symposium on VLSI Design, Automation and Test (VLSI-DAT). 1--4.","key":"e_1_3_2_1_14_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/3282278.3282281"},{"unstructured":"J. J. Karst and G. Brodar. 2017. Connecting Multiple Devices with Blockchain in the Internet of Things. https:\/\/courses.cs.ut.ee\/MTAT.03.323\/2016_fall\/uploads\/Main\/002.pdf Research paper for \"Seminar on Blockchain Technology (MTAT.03.323)\".  J. J. Karst and G. Brodar. 2017. Connecting Multiple Devices with Blockchain in the Internet of Things. https:\/\/courses.cs.ut.ee\/MTAT.03.323\/2016_fall\/uploads\/Main\/002.pdf Research paper for \"Seminar on Blockchain Technology (MTAT.03.323)\".","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"crossref","unstructured":"G. Keramidas N. Voros and M. H\u00fcbner. 2016. Components and Services for IoT Platforms: Paving the Way for IoT Standards. Springer.   G. Keramidas N. Voros and M. H\u00fcbner. 2016. Components and Services for IoT Platforms: Paving the Way for IoT Standards. Springer.","key":"e_1_3_2_1_17_1","DOI":"10.1007\/978-3-319-42304-3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1007\/978-3-642-32298-3_18"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/2593069.2593192"},{"doi-asserted-by":"crossref","unstructured":"I. Kumari M. Oh Y. Kang and D. Choi. 2018. Rapid Run-Time DRAM PUF Based on Bit-Flip Position for Secure IoT Devices. In 2018 IEEE SENSORS. 1--4.  I. Kumari M. Oh Y. Kang and D. Choi. 2018. Rapid Run-Time DRAM PUF Based on Bit-Flip Position for Secure IoT Devices. In 2018 IEEE SENSORS. 1--4.","key":"e_1_3_2_1_20_1","DOI":"10.1109\/ICSENS.2018.8589608"},{"volume-title":"Collaborative and Accountable Hardware Governance Using Blockchain. In 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC). 114--121","author":"Kundu A.","unstructured":"A. Kundu , Z. Sura , and U. Sharma . 2018 . Collaborative and Accountable Hardware Governance Using Blockchain. In 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC). 114--121 . A. Kundu, Z. Sura, and U. Sharma. 2018. Collaborative and Accountable Hardware Governance Using Blockchain. In 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC). 114--121.","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"crossref","unstructured":"K. H. Kwak J. T. Kong S. I. Cho H. T. Phuong and G. Y. Gim. 2019. A Study on the Design of Efficient Private Blockchain. Springer International Publishing Cham 93--121.  K. H. Kwak J. T. Kong S. I. Cho H. T. Phuong and G. Y. Gim. 2019. A Study on the Design of Efficient Private Blockchain. Springer International Publishing Cham 93--121.","key":"e_1_3_2_1_22_1","DOI":"10.1007\/978-3-319-96806-3_8"},{"volume-title":"2018 1st International Conference on Data Intelligence and Security (ICDIS). 36--42","author":"Lipps C.","unstructured":"C. Lipps , A. Weinand , D. Krummacker , C. Fischer , and H. D. Schotten . 2018. Proof of Concept for IoT Device Authentication Based on SRAM PUFs Using ATMEGA 2560-MCU . In 2018 1st International Conference on Data Intelligence and Security (ICDIS). 36--42 . C. Lipps, A. Weinand, D. Krummacker, C. Fischer, and H. D. Schotten. 2018. Proof of Concept for IoT Device Authentication Based on SRAM PUFs Using ATMEGA 2560-MCU. In 2018 1st International Conference on Data Intelligence and Security (ICDIS). 36--42.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","volume-title":"Blockchain and Supply Chain Management: Aircrafts' Parts' Business Case. Annals of DAAAM & Proceedings","author":"Madhwal Y.","year":"2018","unstructured":"Y. Madhwal and P. B. Panfilov . 2018 . Blockchain and Supply Chain Management: Aircrafts' Parts' Business Case. Annals of DAAAM & Proceedings ( 2018 ), 1051--1057. Y. Madhwal and P. B. Panfilov. 2018. Blockchain and Supply Chain Management: Aircrafts' Parts' Business Case. Annals of DAAAM & Proceedings (2018), 1051--1057."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.7763\/IJMO.2018.V8.642"},{"key":"e_1_3_2_1_26_1","volume-title":"Bitcoin: A Peer-to-peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto . 2008 . Bitcoin: A Peer-to-peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf S. Nakamoto. 2008. Bitcoin: A Peer-to-peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.25165\/j.ijabe.20181105.3092"},{"doi-asserted-by":"crossref","unstructured":"P. Prabhu A. Akel L. M. Grupp W.-K. S. Yu G. E. Suh E. Kan and S. Swanson. 2011. Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations. In Trust and Trustworthy Computing J. M. McCune B. Balacheff A. Perrig A.-R. Sadeghi A. Sasse and Y. Beres (Eds.). Springer Berlin Heidelberg Berlin Heidelberg 188--201.   P. Prabhu A. Akel L. M. Grupp W.-K. S. Yu G. E. Suh E. Kan and S. Swanson. 2011. Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations. In Trust and Trustworthy Computing J. M. McCune B. Balacheff A. Perrig A.-R. Sadeghi A. Sasse and Y. Beres (Eds.). Springer Berlin Heidelberg Berlin Heidelberg 188--201.","key":"e_1_3_2_1_28_1","DOI":"10.1007\/978-3-642-21599-5_14"},{"volume-title":"2018 International Conference on Applied and Engineering Mathematics (ICAEM). 102--108","author":"Rahim K.","unstructured":"K. Rahim , H. Tahir , and N. Ikram . 2018. Sensor Based PUF IoT Authentication Model for a Smart Home with Private Blockchain . In 2018 International Conference on Applied and Engineering Mathematics (ICAEM). 102--108 . K. Rahim, H. Tahir, and N. Ikram. 2018. Sensor Based PUF IoT Authentication Model for a Smart Home with Private Blockchain. In 2018 International Conference on Applied and Engineering Mathematics (ICAEM). 102--108.","key":"e_1_3_2_1_29_1"},{"unstructured":"S. Schurig. 2014. Public-Key Kryptographie mit Hilfe von SRAM PUFs. Bachelor's thesis. Technische Universit\u00e4t Darmstadt.  S. Schurig. 2014. Public-Key Kryptographie mit Hilfe von SRAM PUFs. Bachelor's thesis. Technische Universit\u00e4t Darmstadt.","key":"e_1_3_2_1_30_1"},{"unstructured":"S. Schurig. 2017. Development of a User Interface and Implementation of Specific Software Tools for the Evaluation and Realization of PUFs With Respect to Security Applications. Master's thesis. Technische Universit\u00e4t Darmstadt.  S. Schurig. 2017. Development of a User Interface and Implementation of Specific Software Tools for the Evaluation and Realization of PUFs With Respect to Security Applications. Master's thesis. Technische Universit\u00e4t Darmstadt.","key":"e_1_3_2_1_31_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1109\/TVLSI.2017.2762398"},{"volume-title":"Tamper-Resistant Authentication System with Side-Channel Attack Resistant AES and PUF Using MDR-ROM.In 2015 IEEE International Symposium on Circuits and Systems (ISCAS). 1462--1465","author":"Shiozaki M.","unstructured":"M. Shiozaki , T. Kubota , T. Nakai , A. Takeuchi , T. Nishimura , and T. Fujino . 2015 . Tamper-Resistant Authentication System with Side-Channel Attack Resistant AES and PUF Using MDR-ROM.In 2015 IEEE International Symposium on Circuits and Systems (ISCAS). 1462--1465 . M. Shiozaki, T. Kubota, T. Nakai, A. Takeuchi, T. Nishimura, and T. Fujino. 2015. Tamper-Resistant Authentication System with Side-Channel Attack Resistant AES and PUF Using MDR-ROM.In 2015 IEEE International Symposium on Circuits and Systems (ISCAS). 1462--1465.","key":"e_1_3_2_1_33_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/3287921.3287933"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1109\/COMST.2018.2855563"},{"volume-title":"2017 IEEE Custom Integrated Circuits Conference (CICC). 1--4.","author":"Tang Q.","unstructured":"Q. Tang , C. Zhou , W. Choi , G. Kang , J. Park , K. K. Parhi , and C. H. Kim . 2017. A DRAM Based Physical Unclonable Function Capable of Generating &gt; 1032 Challenge Response Pairs per 1Kbit Array for Secure Chip Authentication . In 2017 IEEE Custom Integrated Circuits Conference (CICC). 1--4. Q. Tang, C. Zhou, W. Choi, G. Kang, J. Park, K. K. Parhi, and C. H. Kim. 2017. A DRAM Based Physical Unclonable Function Capable of Generating &gt; 1032 Challenge Response Pairs per 1Kbit Array for Secure Chip Authentication. In 2017 IEEE Custom Integrated Circuits Conference (CICC). 1--4.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_38_1","volume-title":"Towards Implementation of Robust and Low-Cost Security Primitives for Resource-Constrained IoT Devices. ArXiv e-prints (June","author":"Tehranipoor F.","year":"2018","unstructured":"F. Tehranipoor . 2018. Towards Implementation of Robust and Low-Cost Security Primitives for Resource-Constrained IoT Devices. ArXiv e-prints (June 2018 ). arXiv:1806.05332 http:\/\/arxiv.org\/abs\/1806.05332 F. Tehranipoor. 2018. Towards Implementation of Robust and Low-Cost Security Primitives for Resource-Constrained IoT Devices. ArXiv e-prints (June 2018). arXiv:1806.05332 http:\/\/arxiv.org\/abs\/1806.05332"},{"volume-title":"IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI). Poster.","author":"Tehranipoor F.","unstructured":"F. Tehranipoor , N. Karimian , P. A. Wortman , and J. A. Chandy . 2017. Investigation of the Internet of Things in Its Application to Low-Cost Authentication Within Healthcare . In IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI). Poster. F. Tehranipoor, N. Karimian, P. A. Wortman, and J. A. Chandy. 2017. Investigation of the Internet of Things in Its Application to Low-Cost Authentication Within Healthcare. In IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI). Poster.","key":"e_1_3_2_1_39_1"},{"volume-title":"Low-Cost Authentication Paradigm for Consumer Electronics Within the Internet of Wearable Fitness Tracking Applications. In 2018 IEEE International Conference on Consumer Electronics (ICCE). 1--6.","author":"Tehranipoor F.","unstructured":"F. Tehranipoor , N. Karimian , P. A. Wortman , and J. A. Chandy . 2018 . Low-Cost Authentication Paradigm for Consumer Electronics Within the Internet of Wearable Fitness Tracking Applications. In 2018 IEEE International Conference on Consumer Electronics (ICCE). 1--6. F. Tehranipoor, N. Karimian, P. A. Wortman, and J. A. Chandy. 2018. Low-Cost Authentication Paradigm for Consumer Electronics Within the Internet of Wearable Fitness Tracking Applications. In 2018 IEEE International Conference on Consumer Electronics (ICCE). 1--6.","key":"e_1_3_2_1_40_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1109\/ICSSSM.2016.7538424"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1109\/ICSSSM.2017.7996119"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1109\/ACCESS.2017.2720760"},{"volume-title":"2nd Advanced Workshop on Blockchain: Technology, Applications, Challenges.","author":"Venkatesan S.","unstructured":"S. Venkatesan , S. S. Srivastava , and S. K. Shukla . 2017. Decentralized Authentication Scheme for IoT using the Blockchain Technology . In 2nd Advanced Workshop on Blockchain: Technology, Applications, Challenges. S. Venkatesan, S. S. Srivastava, and S. K. Shukla. 2017. Decentralized Authentication Scheme for IoT using the Blockchain Technology. In 2nd Advanced Workshop on Blockchain: Technology, Applications, Challenges.","key":"e_1_3_2_1_44_1"},{"key":"e_1_3_2_1_45_1","volume-title":"Hyperconnected Society: Internet of Things Research and Innovation Value Chains, Ecosystems and Markets","author":"Vermesan O.","year":"2015","unstructured":"O. Vermesan and P. Friess (Eds.). 2015 . Building the Hyperconnected Society: Internet of Things Research and Innovation Value Chains, Ecosystems and Markets . River Publishers Series in Communications, Vol. 43 . River Publishers , Aalborg \u00d8st, Denmark. O. Vermesan and P. Friess (Eds.). 2015. Building the Hyperconnected Society: Internet of Things Research and Innovation Value Chains, Ecosystems and Markets. River Publishers Series in Communications, Vol. 43. River Publishers, Aalborg \u00d8st, Denmark."},{"key":"e_1_3_2_1_46_1","volume-title":"Can Blockchain Protect Internet-of-Things? A New Concept to Allow Blockchain to Protect Internet-of-Things. ArXiv e-prints (July","author":"Watanabe H.","year":"2018","unstructured":"H. Watanabe . 2018. Can Blockchain Protect Internet-of-Things? A New Concept to Allow Blockchain to Protect Internet-of-Things. ArXiv e-prints (July 2018 ). arXiv:1807.06357 http:\/\/arxiv.org\/abs\/1807.06357 H. Watanabe. 2018. Can Blockchain Protect Internet-of-Things? A New Concept to Allow Blockchain to Protect Internet-of-Things. ArXiv e-prints (July 2018). arXiv:1807.06357 http:\/\/arxiv.org\/abs\/1807.06357"}],"event":{"acronym":"COINS '19","name":"COINS '19: INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS","location":"Crete Greece"},"container-title":["Proceedings of the International Conference on Omni-Layer Intelligent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3312614.3312650","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3312614.3312650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:00Z","timestamp":1750208520000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3312614.3312650"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,5]]},"references-count":45,"alternative-id":["10.1145\/3312614.3312650","10.1145\/3312614"],"URL":"https:\/\/doi.org\/10.1145\/3312614.3312650","relation":{},"subject":[],"published":{"date-parts":[[2019,5,5]]},"assertion":[{"value":"2019-05-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}