{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:46:59Z","timestamp":1769748419384,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3594556.3594605","type":"proceedings-article","created":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T21:34:46Z","timestamp":1694554486000},"page":"34-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Blockchain-Empowered Search Over Encrypted Data With Forward and Backward Privacy"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-7548-5663","authenticated-orcid":false,"given":"Shaolong","family":"Tang","sequence":"first","affiliation":[{"name":"Beijing Institute of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3366-7973","authenticated-orcid":false,"given":"Jie","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4234-9772","authenticated-orcid":false,"given":"Xiaoyao","family":"Luo","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5786-1512","authenticated-orcid":false,"given":"Peng","family":"Jiang","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6784-0221","authenticated-orcid":false,"given":"Keke","family":"Gai","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7349-5417","authenticated-orcid":false,"given":"Lei","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3277-3887","authenticated-orcid":false,"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_3_2_1_2_1","volume-title":"Advances in Cryptology - EUROCRYPT 2009(Lecture Notes in Computer Science)","author":"Boldyreva Alexandra","unstructured":"Alexandra Boldyreva , Nathan Chenette , Younho Lee , and Adam O\u2019Neill . 2009. Order-Preserving Symmetric Encryption . In Advances in Cryptology - EUROCRYPT 2009(Lecture Notes in Computer Science) , Antoine Joux (Ed.). Springer , Berlin, Heidelberg , 224\u2013241. https:\/\/doi.org\/10.1007\/978-3-642-01001-9_13 10.1007\/978-3-642-01001-9_13 Alexandra Boldyreva, Nathan Chenette, Younho Lee, and Adam O\u2019Neill. 2009. Order-Preserving Symmetric Encryption. In Advances in Cryptology - EUROCRYPT 2009(Lecture Notes in Computer Science), Antoine Joux (Ed.). Springer, Berlin, Heidelberg, 224\u2013241. https:\/\/doi.org\/10.1007\/978-3-642-01001-9_13"},{"key":"e_1_3_2_1_3_1","volume-title":"Advances in Cryptology - EUROCRYPT 2004(Lecture Notes in Computer Science), Christian Cachin and Jan\u00a0L","author":"Boneh Dan","unstructured":"Dan Boneh , Giovanni Di\u00a0Crescenzo , Rafail Ostrovsky , and Giuseppe Persiano . 2004. Public Key Encryption with Keyword Search . In Advances in Cryptology - EUROCRYPT 2004(Lecture Notes in Computer Science), Christian Cachin and Jan\u00a0L . Camenisch (Eds.). Springer , Berlin, Heidelberg , 506\u2013522. https:\/\/doi.org\/10.1007\/978-3-540-24676-3_30 10.1007\/978-3-540-24676-3_30 Dan Boneh, Giovanni Di\u00a0Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. 2004. Public Key Encryption with Keyword Search. In Advances in Cryptology - EUROCRYPT 2004(Lecture Notes in Computer Science), Christian Cachin and Jan\u00a0L. Camenisch (Eds.). Springer, Berlin, Heidelberg, 506\u2013522. https:\/\/doi.org\/10.1007\/978-3-540-24676-3_30"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978303"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133980"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"David Cash Joseph Jaeger Stanislaw Jarecki Charanjit Jutla Hugo Krawczyk Marcel-C\u0103t\u0103lin Ro\u015fu and Michael Steiner. 2014. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.  David Cash Joseph Jaeger Stanislaw Jarecki Charanjit Jutla Hugo Krawczyk Marcel-C\u0103t\u0103lin Ro\u015fu and Michael Steiner. 2014. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.","DOI":"10.14722\/ndss.2014.23264"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364125"},{"key":"e_1_3_2_1_10_1","first-page":"6","article-title":"A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks","volume":"69","author":"Chen Biwen","year":"2020","unstructured":"Biwen Chen , Libing Wu , Huaqun Wang , Lu Zhou , and Debiao He . 2020 . A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks . IEEE Transactions on Vehicular Technology 69 , 6 (June 2020), 5813\u20135825. https:\/\/doi.org\/10.1109\/TVT.2019.2959383 10.1109\/TVT.2019.2959383 Biwen Chen, Libing Wu, Huaqun Wang, Lu Zhou, and Debiao He. 2020. A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks. IEEE Transactions on Vehicular Technology 69, 6 (June 2020), 5813\u20135825. https:\/\/doi.org\/10.1109\/TVT.2019.2959383","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2945714"},{"key":"e_1_3_2_1_12_1","volume-title":"Blockchain Based Searchable Encryption for Electronic Health Record Sharing. Future Generation Computer Systems 95 (June","author":"Chen Lanxiang","year":"2019","unstructured":"Lanxiang Chen , Wai-Kong Lee , Chin-Chen Chang , Kim- Kwang\u00a0Raymond Choo , and Nan Zhang . 2019. Blockchain Based Searchable Encryption for Electronic Health Record Sharing. Future Generation Computer Systems 95 (June 2019 ), 420\u2013429. https:\/\/doi.org\/10.1016\/j.future.2019.01.018 10.1016\/j.future.2019.01.018 Lanxiang Chen, Wai-Kong Lee, Chin-Chen Chang, Kim-Kwang\u00a0Raymond Choo, and Nan Zhang. 2019. Blockchain Based Searchable Encryption for Electronic Health Record Sharing. Future Generation Computer Systems 95 (June 2019), 420\u2013429. https:\/\/doi.org\/10.1016\/j.future.2019.01.018"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2959306"},{"key":"e_1_3_2_1_14_1","volume-title":"Verifiable Blockchain-Based Searchable Encryption with Forward and Backward Privacy. In 2020 16th International Conference on Mobility, Sensing and Networking (MSN). IEEE","author":"Du Ruizhong","year":"2020","unstructured":"Ruizhong Du and Yi Wang . 2020 . Verifiable Blockchain-Based Searchable Encryption with Forward and Backward Privacy. In 2020 16th International Conference on Mobility, Sensing and Networking (MSN). IEEE , Tokyo, Japan, 630\u2013635. https:\/\/doi.org\/10.1109\/MSN50589. 2020.00105 10.1109\/MSN50589.2020.00105 Ruizhong Du and Yi Wang. 2020. Verifiable Blockchain-Based Searchable Encryption with Forward and Backward Privacy. In 2020 16th International Conference on Mobility, Sensing and Networking (MSN). IEEE, Tokyo, Japan, 630\u2013635. https:\/\/doi.org\/10.1109\/MSN50589.2020.00105"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-018-00426-7"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2596138"},{"key":"e_1_3_2_1_17_1","volume-title":"TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption. In Advances in Cryptology \u2013 CRYPTO 2016(Lecture Notes in Computer Science)","author":"Garg Sanjam","year":"2016","unstructured":"Sanjam Garg , Payman Mohassel , and Charalampos Papamanthou . 2016 . TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption. In Advances in Cryptology \u2013 CRYPTO 2016(Lecture Notes in Computer Science) , Matthew Robshaw and Jonathan Katz (Eds.). Springer, Berlin , Heidelberg , 563\u2013592. https:\/\/doi.org\/10.1007\/978-3-662-53015-3_20 10.1007\/978-3-662-53015-3_20 Sanjam Garg, Payman Mohassel, and Charalampos Papamanthou. 2016. TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption. In Advances in Cryptology \u2013 CRYPTO 2016(Lecture Notes in Computer Science), Matthew Robshaw and Jonathan Katz (Eds.). Springer, Berlin, Heidelberg, 563\u2013592. https:\/\/doi.org\/10.1007\/978-3-662-53015-3_20"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243833"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2864186"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991088"},{"key":"e_1_3_2_1_22_1","volume-title":"Attack and Mitigation. In 19th Annual Network and Distributed System Security Symposium. The Internet Society","author":"Islam Mohammad\u00a0Saiful","year":"2012","unstructured":"Mohammad\u00a0Saiful Islam , Mehmet Kuzu , and Murat Kantarcioglu . 2012 . Access Pattern Disclosure on Searchable Encryption: Ramification , Attack and Mitigation. In 19th Annual Network and Distributed System Security Symposium. The Internet Society , San Diego, California, USA. Mohammad\u00a0Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern Disclosure on Searchable Encryption: Ramification, Attack and Mitigation. In 19th Annual Network and Distributed System Security Symposium. The Internet Society, San Diego, California, USA."},{"key":"e_1_3_2_1_23_1","volume-title":"Financial Cryptography and Data Security(Lecture Notes in Computer Science), Ahmad-Reza Sadeghi (Ed.)","author":"Kamara Seny","unstructured":"Seny Kamara and Charalampos Papamanthou . 2013. Parallel and Dynamic Searchable Symmetric Encryption . In Financial Cryptography and Data Security(Lecture Notes in Computer Science), Ahmad-Reza Sadeghi (Ed.) . Springer , Berlin, Heidelberg , 258\u2013274. https:\/\/doi.org\/10.1007\/978-3-642-39884-1_22 10.1007\/978-3-642-39884-1_22 Seny Kamara and Charalampos Papamanthou. 2013. Parallel and Dynamic Searchable Symmetric Encryption. In Financial Cryptography and Data Security(Lecture Notes in Computer Science), Ahmad-Reza Sadeghi (Ed.). Springer, Berlin, Heidelberg, 258\u2013274. https:\/\/doi.org\/10.1007\/978-3-642-39884-1_22"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133970"},{"key":"e_1_3_2_1_26_1","unstructured":"Huige Li Fangguo Zhang Jiejie He and Haibo Tian. 2017. A Searchable Symmetric Encryption Scheme Using BlockChain. arxiv:1711.01030\u00a0[cs]  Huige Li Fangguo Zhang Jiejie He and Haibo Tian. 2017. A Searchable Symmetric Encryption Scheme Using BlockChain. arxiv:1711.01030\u00a0[cs]"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3043754"},{"key":"e_1_3_2_1_28_1","volume-title":"Verifiable Searchable Encryption with Aggregate Keys for Data Sharing System. Future Generation Computer Systems 78 (Jan","author":"Liu Zheli","year":"2018","unstructured":"Zheli Liu , Tong Li , Ping Li , Chunfu Jia , and Jin Li. 2018. Verifiable Searchable Encryption with Aggregate Keys for Data Sharing System. Future Generation Computer Systems 78 (Jan . 2018 ), 778\u2013788. https:\/\/doi.org\/10.1016\/j.future.2017.02.024 10.1016\/j.future.2017.02.024 Zheli Liu, Tong Li, Ping Li, Chunfu Jia, and Jin Li. 2018. Verifiable Searchable Encryption with Aggregate Keys for Data Sharing System. Future Generation Computer Systems 78 (Jan. 2018), 778\u2013788. https:\/\/doi.org\/10.1016\/j.future.2017.02.024"},{"key":"e_1_3_2_1_29_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Muhammad Naveed Manoj Prabhakaran and Carl\u00a0A. Gunter. 2014. Dynamic Searchable Encryption via Blind Storage.  Muhammad Naveed Manoj Prabhakaran and Carl\u00a0A. Gunter. 2014. Dynamic Searchable Encryption via Blind Storage.","DOI":"10.1109\/SP.2014.47"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2822294"},{"key":"e_1_3_2_1_34_1","unstructured":"Emil Stefanov Charalampos Papamanthou and Elaine Shi. 2013. Practical Dynamic Searchable Encryption with Small Leakage. Cryptology ePrint Archive Paper 2013\/832. https:\/\/eprint.iacr.org\/2013\/832 https:\/\/eprint.iacr.org\/2013\/832.  Emil Stefanov Charalampos Papamanthou and Elaine Shi. 2013. Practical Dynamic Searchable Encryption with Small Leakage. Cryptology ePrint Archive Paper 2013\/832. https:\/\/eprint.iacr.org\/2013\/832 https:\/\/eprint.iacr.org\/2013\/832."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24162"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243782"},{"key":"e_1_3_2_1_37_1","volume-title":"FSSE: Forward Secure Searchable Encryption with Keyed-Block Chains. Information Sciences: an International Journal 500, C (Oct.","author":"Wei Yu","year":"2019","unstructured":"Yu Wei , Siyi Lv , Xiaojie Guo , Zheli Liu , Yanyu Huang , and Bo Li . 2019 . FSSE: Forward Secure Searchable Encryption with Keyed-Block Chains. Information Sciences: an International Journal 500, C (Oct. 2019), 113\u2013126. https:\/\/doi.org\/10.1016\/j.ins.2019.05.059 10.1016\/j.ins.2019.05.059 Yu Wei, Siyi Lv, Xiaojie Guo, Zheli Liu, Yanyu Huang, and Bo Li. 2019. FSSE: Forward Secure Searchable Encryption with Keyed-Block Chains. Information Sciences: an International Journal 500, C (Oct. 2019), 113\u2013126. https:\/\/doi.org\/10.1016\/j.ins.2019.05.059"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.215"},{"key":"e_1_3_2_1_39_1","first-page":"3","article-title":"Efficient Traceable Authorization Search System for Secure Cloud Storage","volume":"8","author":"Yang Yang","year":"2020","unstructured":"Yang Yang , Ximeng Liu , Xianghan Zheng , Chunming Rong , and Wenzhong Guo . 2020 . Efficient Traceable Authorization Search System for Secure Cloud Storage . IEEE Transactions on Cloud Computing 8 , 3 (July 2020), 819\u2013832. https:\/\/doi.org\/10.1109\/TCC.2018.2820714 10.1109\/TCC.2018.2820714 Yang Yang, Ximeng Liu, Xianghan Zheng, Chunming Rong, and Wenzhong Guo. 2020. Efficient Traceable Authorization Search System for Secure Cloud Storage. IEEE Transactions on Cloud Computing 8, 3 (July 2020), 819\u2013832. https:\/\/doi.org\/10.1109\/TCC.2018.2820714","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2940945"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.007"},{"key":"e_1_3_2_1_42_1","volume-title":"A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security. Security and Communication Networks 2020 (Oct","author":"Zhang Xi","year":"2020","unstructured":"Xi Zhang , Ye Su , and Jing Qin . 2020. A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security. Security and Communication Networks 2020 (Oct . 2020 ), e8893016. https:\/\/doi.org\/10.1155\/2020\/8893016 10.1155\/2020 Xi Zhang, Ye Su, and Jing Qin. 2020. A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security. Security and Communication Networks 2020 (Oct. 2020), e8893016. https:\/\/doi.org\/10.1155\/2020\/8893016"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 25th USENIX Conference on Security Symposium(SEC\u201916)","author":"Zhang Yupeng","year":"2016","unstructured":"Yupeng Zhang , Jonathan Katz , and Charalampos Papamanthou . 2016 . All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption . In Proceedings of the 25th USENIX Conference on Security Symposium(SEC\u201916) . USENIX Association, USA, 707\u2013720. Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2016. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption. In Proceedings of the 25th USENIX Conference on Security Symposium(SEC\u201916). USENIX Association, USA, 707\u2013720."},{"key":"e_1_3_2_1_44_1","volume-title":"Computer Security(Lecture Notes in Computer Science)","author":"Zuo Cong","unstructured":"Cong Zuo , Shi-Feng Sun , Joseph\u00a0 K. Liu , Jun Shao , and Josef Pieprzyk . 2018. Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward and Backward) Security . In Computer Security(Lecture Notes in Computer Science) , Javier Lopez, Jianying Zhou, and Miguel Soriano (Eds.). Springer International Publishing , Cham , 228\u2013246. https:\/\/doi.org\/10.1007\/978-3-319-98989-1_12 10.1007\/978-3-319-98989-1_12 Cong Zuo, Shi-Feng Sun, Joseph\u00a0K. Liu, Jun Shao, and Josef Pieprzyk. 2018. Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward and Backward) Security. In Computer Security(Lecture Notes in Computer Science), Javier Lopez, Jianying Zhou, and Miguel Soriano (Eds.). Springer International Publishing, Cham, 228\u2013246. https:\/\/doi.org\/10.1007\/978-3-319-98989-1_12"},{"key":"e_1_3_2_1_45_1","volume-title":"Computer Security \u2013 ESORICS 2019(Lecture Notes in Computer Science), Kazue Sako, Steve Schneider, and Peter Y.\u00a0A","author":"Zuo Cong","unstructured":"Cong Zuo , Shi-Feng Sun , Joseph\u00a0 K. Liu , Jun Shao , and Josef Pieprzyk . 2019. Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy . In Computer Security \u2013 ESORICS 2019(Lecture Notes in Computer Science), Kazue Sako, Steve Schneider, and Peter Y.\u00a0A . Ryan (Eds.). Springer International Publishing , Cham , 283\u2013303. https:\/\/doi.org\/10.1007\/978-3-030-29962-0_14 10.1007\/978-3-030-29962-0_14 Cong Zuo, Shi-Feng Sun, Joseph\u00a0K. Liu, Jun Shao, and Josef Pieprzyk. 2019. Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy. In Computer Security \u2013 ESORICS 2019(Lecture Notes in Computer Science), Kazue Sako, Steve Schneider, and Peter Y.\u00a0A. Ryan (Eds.). Springer International Publishing, Cham, 283\u2013303. https:\/\/doi.org\/10.1007\/978-3-030-29962-0_14"}],"event":{"name":"ASIA CCS '23: ACM Asia Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594605","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3594556.3594605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:07Z","timestamp":1750183747000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594605"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":45,"alternative-id":["10.1145\/3594556.3594605","10.1145\/3594556"],"URL":"https:\/\/doi.org\/10.1145\/3594556.3594605","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}