{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T08:09:13Z","timestamp":1767168553309,"version":"build-2238731810"},"update-to":[{"DOI":"10.1155\/2020\/8828984","type":"corrigendum","label":"Corrigendum","source":"publisher","updated":{"date-parts":[[2021,7,17]],"date-time":"2021-07-17T00:00:00Z","timestamp":1626480000000}}],"reference-count":1,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,7,17]],"date-time":"2021-07-17T00:00:00Z","timestamp":1626480000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["hindawi.com"],"crossmark-restriction":true},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,7,17]]},"DOI":"10.1155\/2021\/9814372","type":"journal-article","created":{"date-parts":[[2021,7,17]],"date-time":"2021-07-17T16:50:07Z","timestamp":1626540607000},"page":"1-1","update-policy":"https:\/\/doi.org\/10.1155\/corrections_policy","source":"Crossref","is-referenced-by-count":0,"title":["Corrigendum to \u201cBNRDT: When Data Transmission Meets Blockchain\u201d"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6352-5806","authenticated-orcid":true,"given":"Hongjian","family":"Jin","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu 610065, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8705-2617","authenticated-orcid":true,"given":"Xingshu","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu 610065, China"},{"name":"Cyber Science Research Institute, Sichuan University, Chengdu 610065, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4091-5569","authenticated-orcid":true,"given":"Xiao","family":"Lan","sequence":"additional","affiliation":[{"name":"Cyber Science Research Institute, Sichuan University, Chengdu 610065, China"}]},{"given":"Hui","family":"Guo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2832-2450","authenticated-orcid":true,"given":"Hongxia","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu 610065, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9337-5164","authenticated-orcid":true,"given":"Qi","family":"Cao","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Sichuan University, Chengdu 610065, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8828984"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/9814372.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/9814372.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/9814372.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,4]],"date-time":"2024-01-04T10:07:40Z","timestamp":1704362860000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/9814372\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,17]]},"references-count":1,"alternative-id":["9814372","9814372"],"URL":"https:\/\/doi.org\/10.1155\/2021\/9814372","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,17]]}}}