{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:17Z","timestamp":1750220597907,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,21]],"date-time":"2020-09-21T00:00:00Z","timestamp":1600646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,25]]},"DOI":"10.1145\/3410699.3413794","type":"proceedings-article","created":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T04:05:29Z","timestamp":1599192329000},"page":"29-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Actor-based risk analysis for blockchains in smart mobility"],"prefix":"10.1145","author":[{"given":"Ranwa Al","family":"Mallah","sequence":"first","affiliation":[{"name":"Ryerson University, Toronto, Ontario"}]},{"given":"Bilal","family":"Farooq","sequence":"additional","affiliation":[{"name":"Ryerson University, Toronto, Ontario"}]}],"member":"320","published-online":{"date-parts":[[2020,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345805"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Johannes Eckert David L\u00f3pez Carlos Lima Azevedo and Bilal Farooq. 2019. A blockchain-based user-centric emission monitoring and trading system for multi-modal mobility. 1--6.  Johannes Eckert David L\u00f3pez Carlos Lima Azevedo and Bilal Farooq. 2019. A blockchain-based user-centric emission monitoring and trading system for multi-modal mobility. 1--6.","DOI":"10.1109\/FISTS46898.2020.9264892"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45507-5_11"},{"key":"e_1_3_2_1_5_1","unstructured":"GAO. 2005. Cyber Threat Source Descriptions. https:\/\/www.us-cert.gov\/ics\/content\/cyber-threat-source-descriptions [Online; accessed 20-March-2020].  GAO. 2005. Cyber Threat Source Descriptions. https:\/\/www.us-cert.gov\/ics\/content\/cyber-threat-source-descriptions [Online; accessed 20-March-2020]."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2060"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00060"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382292"},{"key":"e_1_3_2_1_9_1","unstructured":"Xiaoqi Li Peng Jiang Ting Chen Xiapu Luo and Qiaoyan Wen. 2017. A survey on the security of blockchain systems. Future Generation Computer Systems (2017).  Xiaoqi Li Peng Jiang Ting Chen Xiapu Luo and Qiaoyan Wen. 2017. A survey on the security of blockchain systems. Future Generation Computer Systems (2017)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2020.01.002"},{"volume-title":"2019 IEEE International Smart Cities Conference (ISC2). 187--192","author":"L\u00f3pez D.","key":"e_1_3_2_1_11_1"},{"volume-title":"2019 International Choice Modelling Symposium (ICMC). 1--13","author":"L\u00f3pez D.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.4018\/JCIT.2019010102"},{"key":"e_1_3_2_1_14_1","unstructured":"Ryan Nakashima. 2018. AP Exclusive: Google tracks your movements like it or not. AP News (August 13) https:\/\/www.apnews.com\/828aefab64d4411bac257a07c1af0ecb (2018).  Ryan Nakashima. 2018. AP Exclusive: Google tracks your movements like it or not. AP News (August 13) https:\/\/www.apnews.com\/828aefab64d4411bac257a07c1af0ecb (2018)."},{"key":"e_1_3_2_1_15_1","unstructured":"K Rector. 2018. MTA real-time bus data'hacked 'offered on private mobile application.  K Rector. 2018. MTA real-time bus data'hacked 'offered on private mobile application."},{"volume-title":"Wired","year":"2016","author":"Stewart Jack","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","unstructured":"Julia Carrie Wong. 2017. Uber concealed massive hack that exposed data of 57m users and drivers. The Guardian 22 (2017).  Julia Carrie Wong. 2017. Uber concealed massive hack that exposed data of 57m users and drivers. The Guardian 22 (2017)."}],"event":{"name":"MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"London United Kingdom","acronym":"MobiCom '20"},"container-title":["Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410699.3413794","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3410699.3413794","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:55Z","timestamp":1750195915000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410699.3413794"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,21]]},"references-count":17,"alternative-id":["10.1145\/3410699.3413794","10.1145\/3410699"],"URL":"https:\/\/doi.org\/10.1145\/3410699.3413794","relation":{},"subject":[],"published":{"date-parts":[[2020,9,21]]},"assertion":[{"value":"2020-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}