{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:26Z","timestamp":1750220906288,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,10]]},"DOI":"10.1145\/3377644.3377656","type":"proceedings-article","created":{"date-parts":[[2020,2,26]],"date-time":"2020-02-26T08:16:17Z","timestamp":1582704977000},"page":"89-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A Personal Data Determination Method Based On Blockchain Technology and Smart Contract"],"prefix":"10.1145","author":[{"given":"Hongman","family":"Wang","sequence":"first","affiliation":[{"name":"Institute of Network Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Yongbin","family":"Yuan","sequence":"additional","affiliation":[{"name":"Institute of Network Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Fangchun","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Network Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,2,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Zhenhua Du. 2105. Research on data right confirmation in big data application.LECT NOTES COMPUT SC.(2015.07) 12--16.  Zhenhua Du. 2105. Research on data right confirmation in big data application.LECT NOTES COMPUT SC.(2015.07) 12--16."},{"key":"e_1_3_2_1_2_1","volume-title":"Visual analysis of the research status of digital copyright protection technology abroad. Science and Technology Management Research","author":"Yuehong Yin","year":"2014","unstructured":"Yuehong Yin . 2014. Visual analysis of the research status of digital copyright protection technology abroad. Science and Technology Management Research ( 2014 . 03),133--137. Yuehong Yin. 2014. Visual analysis of the research status of digital copyright protection technology abroad. Science and Technology Management Research (2014. 03),133--137."},{"key":"e_1_3_2_1_3_1","unstructured":"Maojun Zhou. Ning Pan.Weighting and reconstruction: blockchain technology's solution to data island. Journalism & Communication Review. (2018-10) 59--68. DOI=10.14086\/j.cnki.xwycbpl.2018.05.006.  Maojun Zhou. Ning Pan.Weighting and reconstruction: blockchain technology's solution to data island. Journalism & Communication Review. (2018-10) 59--68. DOI=10.14086\/j.cnki.xwycbpl.2018.05.006."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500727.2500733"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89965-5_5"},{"key":"e_1_3_2_1_6_1","volume-title":"Cryptography Mailing List","author":"Satoshi N.","year":"2009","unstructured":"Satoshi N. 2009. Bitcoin :a peer-to-peer electronic cash system. Cryptography Mailing List . ( 2009 ,03). Satoshi N. 2009. Bitcoin:a peer-to-peer electronic cash system. Cryptography Mailing List. (2009,03)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"LAMPORT L. 1982. The Byzantine generals problem [J]. ACM Transactions on Programming Languages and Systems.(1982 ) 382--401. DOI=10.1145\/357172.357176.  LAMPORT L. 1982. The Byzantine generals problem [J]. ACM Transactions on Programming Languages and Systems.(1982 ) 382--401. DOI=10.1145\/357172.357176.","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_8_1","volume-title":"Summary of Research on Blockchain Technology","author":"Junfeng Huang","year":"2018","unstructured":"Junfeng Huang . Jie Liu. 2018. Summary of Research on Blockchain Technology . Journal of Beijing University of Posts and Telecommunications . ( 2018 ,02),5--12.DOI=10.13190\/j.jbupt.2018--039. Junfeng Huang. Jie Liu. 2018. Summary of Research on Blockchain Technology.Journal of Beijing University of Posts and Telecommunications. (2018,02),5--12.DOI=10.13190\/j.jbupt.2018--039."},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE Computer Society, 2015","author":"Zyskind G","year":"2015","unstructured":"Zyskind G , Nathan O , Alex .2015. Decentralizing Privacy : Using Blockchain to Protect Personal Data[C]\/\/ 2015 IEEE Security and Privacy Workshops (SPW) . IEEE Computer Society, 2015 .DOI= 10.1109\/SPW. 2015 .27. Zyskind G, Nathan O, Alex.2015. Decentralizing Privacy: Using Blockchain to Protect Personal Data[C]\/\/ 2015 IEEE Security and Privacy Workshops (SPW). IEEE Computer Society, 2015.DOI= 10.1109\/SPW.2015.27."},{"key":"e_1_3_2_1_10_1","unstructured":"Hailong Wang.Youliang Tian.Xin Yin.2018.Big data validation model based on blockchain.Computer Science.(2018 )15--19+24.  Hailong Wang.Youliang Tian.Xin Yin.2018.Big data validation model based on blockchain.Computer Science.(2018 )15--19+24."},{"key":"e_1_3_2_1_11_1","volume-title":"Blockchain-based personal privacy protection mechanism. Journal of Computer Applications","author":"Ning Zhang","year":"2017","unstructured":"Ning Zhang . Shan Zhong, 2017. Blockchain-based personal privacy protection mechanism. Journal of Computer Applications . ( 2017 , 10),59--65. DOI= CNKI:SUN:JSJY.0.2017-10-010. Ning Zhang. Shan Zhong, 2017. Blockchain-based personal privacy protection mechanism. Journal of Computer Applications. (2017, 10),59--65. DOI= CNKI:SUN:JSJY.0.2017-10-010."},{"key":"e_1_3_2_1_12_1","volume-title":"IoT data assetization method based on blockchain intelligent contract","author":"Nianzu Sheng Li.","year":"2018","unstructured":"Nianzu Sheng . Fang Li. Xiaofeng Li . He Zhao. Tong Zhou. 2018. IoT data assetization method based on blockchain intelligent contract . Journal of Zhejiang University . ( 2018 ), 2150--2158. DOI=10.3785\/j.issn.1008-973X.2018.11.014. Nianzu Sheng. Fang Li. Xiaofeng Li. He Zhao. Tong Zhou. 2018. IoT data assetization method based on blockchain intelligent contract. Journal of Zhejiang University. (2018), 2150--2158. DOI=10.3785\/j.issn.1008-973X.2018.11.014."},{"key":"e_1_3_2_1_13_1","volume-title":"2016. MedRec: Using Blockchain for Medical Data Access and Permission Management[C]\/\/ 2016 2nd International Conference on Open and Big Dat (OBD)","author":"Azaria A","year":"2016","unstructured":"Azaria A , Ekblaw A , Vieira T , 2016. MedRec: Using Blockchain for Medical Data Access and Permission Management[C]\/\/ 2016 2nd International Conference on Open and Big Dat (OBD) . IEEE. ( 2016 , 11), 25--30. DOI=10.1109\/OBD.2016.11. Azaria A, Ekblaw A, Vieira T, et al.2016. MedRec: Using Blockchain for Medical Data Access and Permission Management[C]\/\/ 2016 2nd International Conference on Open and Big Dat (OBD). IEEE. (2016, 11), 25--30. DOI=10.1109\/OBD.2016.11."},{"key":"e_1_3_2_1_14_1","volume-title":"Decentralizing Privacy: Using Blockchain to Protect Personal Data[C]\/\/ IEEE Security & Privacy Workshops.","author":"Zyskind G","year":"2015","unstructured":"Zyskind G , Nathan O , Pentland A' . 2015 . Decentralizing Privacy: Using Blockchain to Protect Personal Data[C]\/\/ IEEE Security & Privacy Workshops. 2015. DOI= 10.1109\/SPW.2015.27. Zyskind G, Nathan O, Pentland A'. 2015. Decentralizing Privacy: Using Blockchain to Protect Personal Data[C]\/\/ IEEE Security & Privacy Workshops. 2015. DOI= 10.1109\/SPW.2015.27."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(16)30056-3"},{"key":"e_1_3_2_1_16_1","volume-title":"Key and Certificate Life Cycles. CA Certificate Renewal. PKI: Implementing and Managing E-Security","author":"Nash","year":"2001","unstructured":"Nash ; Duane; Joseph; Brink. Key and Certificate Life Cycles. CA Certificate Renewal. PKI: Implementing and Managing E-Security . RSA Press - Osborne\/McGraw-Hill . 2001 . Nash; Duane; Joseph; Brink. Key and Certificate Life Cycles. CA Certificate Renewal. PKI: Implementing and Managing E-Security. RSA Press - Osborne\/McGraw-Hill. 2001."},{"key":"e_1_3_2_1_18_1","volume-title":"Quantum circuit and Byzantine generals problem[C]\/\/ Nanotechnology","author":"Chien C H","year":"2012","unstructured":"Chien C H , Lin T S , Lu C Y , Quantum circuit and Byzantine generals problem[C]\/\/ Nanotechnology . IEEE. DOI =10.1109\/NANO. 2012 .6322082. Chien C H, Lin T S, Lu C Y, et al. 2012. Quantum circuit and Byzantine generals problem[C]\/\/ Nanotechnology. IEEE. DOI=10.1109\/NANO.2012.6322082."}],"event":{"name":"ICCSP 2020: 2020 4th International Conference on Cryptography, Security and Privacy","sponsor":["NJU Nanjing University"],"location":"Nanjing China","acronym":"ICCSP 2020"},"container-title":["Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377644.3377656","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377644.3377656","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:53Z","timestamp":1750203893000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377644.3377656"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":17,"alternative-id":["10.1145\/3377644.3377656","10.1145\/3377644"],"URL":"https:\/\/doi.org\/10.1145\/3377644.3377656","relation":{},"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2020-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}