{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:33:11Z","timestamp":1773513191378,"version":"3.50.1"},"reference-count":31,"publisher":"SAGE Publications","issue":"12","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1177\/1550147718815842","type":"journal-article","created":{"date-parts":[[2018,12,25]],"date-time":"2018-12-25T10:37:26Z","timestamp":1545734246000},"page":"155014771881584","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":28,"title":["Internet of Things security and privacy-preserving method through nodes differentiation, concrete cluster centers, multi-signature, and blockchain"],"prefix":"10.1177","volume":"14","author":[{"given":"Mei","family":"Yu","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, College of Intelligence and Computing, Tianjin University, Tianjin, China"},{"name":"Tianjin International Engineering Institute, Tianjin University, Tianjin, China"},{"name":"Tianjin Key Laboratory of Cognitive Computing and Application, School of Computer Science and Technology, Tianjin University, Tianjin China"},{"name":"Tianjin Key Laboratory of Advanced Networking, School of Computer Science and Technology, Tianjin University, Tianjin, China"}]},{"given":"Jie","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tianjin International Engineering Institute, Tianjin University, Tianjin, China"},{"name":"Tianjin Key Laboratory of Cognitive Computing and Application, School of Computer Science and Technology, Tianjin University, Tianjin China"},{"name":"Tianjin Key Laboratory of Advanced Networking, School of Computer Science and Technology, Tianjin University, Tianjin, China"}]},{"given":"Jianrong","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, College of Intelligence and Computing, Tianjin University, Tianjin, China"},{"name":"Tianjin International Engineering Institute, Tianjin University, Tianjin, China"},{"name":"Tianjin Key Laboratory of Cognitive Computing and Application, School of Computer Science and Technology, Tianjin University, Tianjin China"},{"name":"Tianjin Key Laboratory of Advanced Networking, School of Computer Science and Technology, Tianjin University, Tianjin, China"}]},{"given":"Jie","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, College of Intelligence and Computing, Tianjin University, Tianjin, China"},{"name":"Tianjin Key Laboratory of Cognitive Computing and Application, School of Computer Science and Technology, Tianjin University, Tianjin China"},{"name":"Tianjin Key Laboratory of Advanced Networking, School of Computer Science and Technology, Tianjin University, Tianjin, China"}]},{"given":"Tianyi","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, College of Intelligence and Computing, Tianjin University, Tianjin, China"},{"name":"Tianjin Key Laboratory of Cognitive Computing and Application, School of Computer Science and Technology, Tianjin University, Tianjin China"},{"name":"Tianjin Key Laboratory of Advanced Networking, School of Computer Science and Technology, Tianjin University, Tianjin, China"}]},{"given":"Rui","family":"Deng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, College of Intelligence and Computing, Tianjin University, Tianjin, China"},{"name":"Tianjin Key Laboratory of Cognitive Computing and Application, School of Computer Science and Technology, Tianjin University, Tianjin China"},{"name":"Tianjin Key Laboratory of Advanced Networking, School of Computer Science and Technology, Tianjin University, Tianjin, China"}]},{"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, College of Intelligence and Computing, Tianjin University, Tianjin, China"},{"name":"Tianjin Key Laboratory of Cognitive Computing and Application, School of Computer Science and Technology, Tianjin University, Tianjin China"},{"name":"Tianjin Key Laboratory of Advanced Networking, School of Computer Science and Technology, Tianjin University, Tianjin, China"}]},{"given":"Ruiguo","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, College of Intelligence and Computing, Tianjin University, Tianjin, China"},{"name":"Tianjin International Engineering Institute, Tianjin University, Tianjin, China"},{"name":"Tianjin Key Laboratory of Cognitive Computing and Application, School of Computer Science and Technology, Tianjin University, Tianjin China"},{"name":"Tianjin Key Laboratory of Advanced Networking, School of Computer Science and Technology, Tianjin University, Tianjin, China"}]}],"member":"179","published-online":{"date-parts":[[2018,12,25]]},"reference":[{"issue":"1","key":"bibr1-1550147718815842","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MCOM.2018.1700511","volume":"56","author":"Qiu T","year":"2018","journal-title":"IEEE Commun Mag"},{"issue":"5","key":"bibr2-1550147718815842","doi-asserted-by":"crossref","first-page":"2587","DOI":"10.1109\/TNET.2017.2722480","volume":"25","author":"Liu X","year":"2017","journal-title":"IEEE ACM T Network"},{"key":"bibr3-1550147718815842","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"issue":"12","key":"bibr4-1550147718815842","doi-asserted-by":"crossref","first-page":"1830007","DOI":"10.1142\/S0218126618300076","volume":"27","author":"Raja SP","year":"2018","journal-title":"J Circuit Syst Comp"},{"key":"bibr5-1550147718815842","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MNET.2018.1700349","volume":"32","author":"Liang Y","year":"2018","journal-title":"IEEE Netw Mag"},{"issue":"9","key":"bibr6-1550147718815842","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MCOM.2018.1701245","volume":"56","author":"Zheng X","year":"2018","journal-title":"IEEE Commun Mag"},{"key":"bibr7-1550147718815842","first-page":"1","volume":"71","author":"Itakura K","year":"1983","journal-title":"NEC Res Dev"},{"key":"bibr8-1550147718815842","first-page":"257","volume-title":"Proceedings of the 9th international conference on theory and practice of public-key cryptography","author":"Gentry C"},{"issue":"3","key":"bibr9-1550147718815842","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s12599-017-0467-3","volume":"59","author":"Nofer M","year":"2017","journal-title":"Bus Inf Syst Eng"},{"issue":"4","key":"bibr10-1550147718815842","first-page":"481","volume":"2","author":"Yuan Y","year":"2016","journal-title":"Acta Automatica Sinica"},{"key":"bibr11-1550147718815842","first-page":"180","volume-title":"Proceedings of IEEE security and privacy workshops. IEEE computer society","author":"Zyskind G"},{"key":"bibr12-1550147718815842","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2803740"},{"key":"bibr13-1550147718815842","first-page":"820","volume-title":"Proceedings of 13th international conference on wireless algorithms, systems, and applications, WASA 2018, (LNCS, vol. 10874)","author":"Yu M"},{"key":"bibr14-1550147718815842","first-page":"169","volume-title":"Foundations of secure computation","author":"Rivest RL","year":"1978"},{"key":"bibr15-1550147718815842","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"key":"bibr16-1550147718815842","first-page":"556","volume-title":"Proceedings of 2015 IEEE international conference on data science and data intensive systems","author":"Thatmann D"},{"key":"bibr17-1550147718815842","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.future.2014.10.010","volume":"49","author":"Yao X","year":"2015","journal-title":"Future Gener Comp Sy"},{"key":"bibr18-1550147718815842","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"issue":"1","key":"bibr19-1550147718815842","first-page":"24","volume":"1","author":"Machanavajjhala A","year":"2006","journal-title":"ACM T Knowl Discov D"},{"key":"bibr20-1550147718815842","first-page":"106","volume-title":"Proceeding s of the 23rd international conference on data engineering","author":"Li N"},{"key":"bibr21-1550147718815842","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717743696."},{"key":"bibr22-1550147718815842","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718756581."},{"key":"bibr23-1550147718815842","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2828463."},{"key":"bibr24-1550147718815842","doi-asserted-by":"crossref","first-page":"5943","DOI":"10.1002\/sec.1748","volume":"9","author":"Ouaddah A","year":"2016","journal-title":"Secur Commun Netw"},{"issue":"3","key":"bibr25-1550147718815842","doi-asserted-by":"crossref","first-page":"1152","DOI":"10.1007\/s11227-016-1870-0","volume":"73","author":"Lee B","year":"2017","journal-title":"J Supercomput"},{"key":"bibr26-1550147718815842","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/s10916-018-0995-5","volume":"42","author":"Zhang A","year":"2018","journal-title":"J Med Syst"},{"key":"bibr27-1550147718815842","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/s10916-018-0998-2","volume":"42","author":"Ji Y","year":"2018","journal-title":"J Med Syst"},{"issue":"5","key":"bibr28-1550147718815842","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1109\/TDSC.2016.2616861","volume":"15","author":"Aitzhan NZ","year":"2018","journal-title":"IEEE T Depend Secure"},{"key":"bibr30-1550147718815842","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2830307."},{"issue":"6","key":"bibr31-1550147718815842","doi-asserted-by":"crossref","first-page":"1868","DOI":"10.1109\/JIOT.2017.2679483","volume":"4","author":"Zheng X","year":"2017","journal-title":"IEEE Internet Things"},{"issue":"1","key":"bibr32-1550147718815842","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1109\/TNET.2016.2595571","volume":"25","author":"Liu X","year":"2017","journal-title":"IEEE ACM T Network"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718815842","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147718815842","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718815842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,25]],"date-time":"2018-12-25T10:37:38Z","timestamp":1545734258000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147718815842"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":31,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2018,12,25]]},"published-print":{"date-parts":[[2018,12]]}},"alternative-id":["10.1177\/1550147718815842"],"URL":"https:\/\/doi.org\/10.1177\/1550147718815842","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12]]}}}