{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T00:13:20Z","timestamp":1715645600921},"reference-count":30,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"9","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2023,9,1]]},"DOI":"10.1587\/transinf.2022icp0003","type":"journal-article","created":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T23:08:34Z","timestamp":1693523314000},"page":"1354-1363","source":"Crossref","is-referenced-by-count":0,"title":["Preventing SNS Impersonation: A Blockchain-Based Approach"],"prefix":"10.1587","volume":"E106.D","author":[{"given":"Zhanwen","family":"CHEN","sequence":"first","affiliation":[{"name":"University of Tsukuba"}]},{"given":"Kazumasa","family":"OMOTE","sequence":"additional","affiliation":[{"name":"University of Tsukuba"},{"name":"National Institute of Information and Communications Technology"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] Z. Chen and K. Omote, \u201cBuilding a blockchain-based social network identification system,\u201d Advanced Information Networking and Applications, ed. L. Barolli, F. Hussain, and T. Enokido, Cham, vol.450, pp.468-479, Springer International Publishing, 2022. 10.1007\/978-3-030-99587-4_39","DOI":"10.1007\/978-3-030-99587-4_39"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] Z. Chen, J. Chen, and W. Meng, \u201cThreshold identity authentication signature: Impersonation prevention in social network services,\u201d Concurrency and Computation: Practice and Experience, p.e5787, vol.34, no.16, 2020. 10.1002\/cpe.5787","DOI":"10.1002\/cpe.5787"},{"key":"3","unstructured":"[3] S. Nakamoto, \u201cBitcoin: A peer-to-peer electronic cash system,\u201d Decentralized Business Review, p.21260, 2008."},{"key":"4","unstructured":"[4] G. Wood et al., \u201cEthereum: A secure decentralised generalised transaction ledger,\u201d Ethereum project yellow paper, vol.151, no.2014, pp.1-32, 2014."},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis, A.D. Caro, D. Enyeart, C. Ferris, G. Laventman, Y. Manevich, S. Muralidharan, C. Murthy, B. Nguyen, M. Sethi, G. Singh, K. Smith, A. Sorniotti, C. Stathakopoulou, M. Vukoli\u0107, S.W. Cocco, and J. Yellick, \u201cHyperledger fabric: a distributed operating system for permissioned blockchains,\u201d Proc. thirteenth EuroSys conference, pp.1-15, 2018. 10.1145\/3190508.3190538","DOI":"10.1145\/3190508.3190538"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] M. Wohrer and U. Zdun, \u201cSmart contracts: security patterns in the ethereum ecosystem and solidity,\u201d 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE), pp.2-8, IEEE, 2018. 10.1109\/iwbose.2018.8327565","DOI":"10.1109\/IWBOSE.2018.8327565"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] M. Tsikerdekis and S. Zeadally, \u201cDetecting and preventing online identity deception in social networking services,\u201d IEEE Internet Computing, vol.19, no.3, pp.41-49, 2015. 10.1109\/mic.2015.21","DOI":"10.1109\/MIC.2015.21"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] O. Goga, G. Venkatadri, and K.P. Gummadi, \u201cThe doppelg\u00e4nger bot attack: Exploring identity impersonation in online social networks,\u201d Proc. 2015 Internet Measurement Conference, pp.141-153, ACM, 2015. 10.1145\/2815675.2815699","DOI":"10.1145\/2815675.2815699"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] E.B. Nuakoh and M. Anwar, \u201cDetecting impersonation in social network sites (sns) using artificial immune systems (ais),\u201d SoutheastCon 2018, pp.1-3, IEEE, 2018. 10.1109\/secon.2018.8479274","DOI":"10.1109\/SECON.2018.8479274"},{"key":"10","unstructured":"[10] S. Garfinkel, PGP: pretty good privacy, \u201cO&apos;Reilly Media, Inc.,\u201d 1995."},{"key":"11","unstructured":"[11] E. Carrara and G. Hogben, \u201cReputation-based systems: A security analysis,\u201d Aug. 2021."},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] G. G\u00fcrsoy, C.M. Brannon, and M. Gerstein, \u201cUsing ethereum blockchain to store and query pharmacogenomics data via smart contracts,\u201d BMC medical genomics, vol.13, no.1, pp.1-11, 2020. 10.1186\/s12920-020-00732-x","DOI":"10.1186\/s12920-020-00732-x"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] S. Kirkman and R. Newman, \u201cA cloud data movement policy architecture based on smart contracts and the ethereum blockchain,\u201d 2018 IEEE International Conference on Cloud Engineering (IC2E), pp.371-377, IEEE, 2018. 10.1109\/ic2e.2018.00071","DOI":"10.1109\/IC2E.2018.00071"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] V.K.C. Ramesh, Storing iot data securely in a private ethereum blockchain, Ph.D. thesis, University of Nevada, Las Vegas, 2019.","DOI":"10.1109\/COMPSAC48688.2020.0-219"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] B. Wang, J. Sun, Y. He, D. Pang, and N. Lu, \u201cLarge-scale election based on blockchain,\u201d Procedia Computer Science, vol.129, pp.234-237, 2018. 10.1016\/j.procs.2018.03.063","DOI":"10.1016\/j.procs.2018.03.063"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] C. Patsonakis, K. Samari, A. Kiayiasy, and M. Roussopoulos, \u201cOn the practicality of a smart contract pki,\u201d 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON), pp.109-118, IEEE, 2019. 10.1109\/dappcon.2019.00022","DOI":"10.1109\/DAPPCON.2019.00022"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] B. B\u00fcnz, S. Agrawal, M. Zamani, and D. Boneh, \u201cZether: Towards privacy in a smart contract world,\u201d International Conference on Financial Cryptography and Data Security, vol.12059, pp.423-443, Springer, 2020. 10.1007\/978-3-030-51280-4_23","DOI":"10.1007\/978-3-030-51280-4_23"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] P. Robinson, \u201cUsing ethereum registration authorities to establish trust for ethereum private sidechains,\u201d The Journal of the British Blockchain Association, vol.1, no.2, pp.1-7, 2018. 10.31585\/jbba-1-2-(6)2018","DOI":"10.31585\/jbba-1-2-(6)2018"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] P. Kochovski, S. Gec, V. Stankovski, M. Bajec, and P.D. Drobintsev, \u201cTrust management in a blockchain based fog computing platform with trustless smart oracles,\u201d Future Generation Computer Systems, vol.101, pp.747-759, 2019. 10.1016\/j.future.2019.07.030","DOI":"10.1016\/j.future.2019.07.030"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] B.K. Mohanta, A. Sahoo, S. Patel, S.S. Panda, D. Jena, and D. Gountia, \u201cDecAuth: Decentralized authentication scheme for IoT device using ethereum blockchain,\u201d TENCON 2019-2019 IEEE Region 10 Conference (TENCON), pp.558-563, IEEE, 2019. 10.1109\/tencon.2019.8929720","DOI":"10.1109\/TENCON.2019.8929720"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] M.T. Hammi, B. Hammi, P. Bellot, and A. Serhrouchni, \u201cBubbles of trust: A decentralized blockchain-based authentication system for iot,\u201d Computers &amp; Security, vol.78, pp.126-142, 2018. 10.1016\/j.cose.2018.06.004","DOI":"10.1016\/j.cose.2018.06.004"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk, \u201cInternet X.509 public key infrastructure certificate and certificate revocation list (crl) profile.,\u201d RFC, vol.5280, pp.1-151, 2008. 10.17487\/rfc5280","DOI":"10.17487\/rfc5280"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] A. Yakubov, W.M. Shbair, A. Wallbom, D. Sanda, and R. State, \u201cA blockchain-based PKI management framework,\u201d The First IEEE\/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) colocated with IEEE\/IFIP NOMS 2018, pp.1-6, Tapei, Taiwan, 23-27 April 2018. 10.1109\/noms.2018.8406325","DOI":"10.1109\/NOMS.2018.8406325"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] A. Singla and E. Bertino, \u201cBlockchain-based PKI solutions for IoT,\u201d 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), pp.9-15, IEEE, 2018. 10.1109\/cic.2018.00-45","DOI":"10.1109\/CIC.2018.00-45"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] M. Al-Bassam, \u201cSCPKI: A smart contract-based PKI and identity system,\u201d Proc. ACM Workshop on Blockchain, Cryptocurrencies and Contracts, pp.35-40, 2017. 10.1145\/3055518.3055530","DOI":"10.1145\/3055518.3055530"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] A. Shamir, \u201cHow to share a secret,\u201d Communications of the ACM, vol.22, no.11, pp.612-613, 1979. 10.1145\/359168.359176","DOI":"10.1145\/359168.359176"},{"key":"27","doi-asserted-by":"publisher","unstructured":"[27] D. He, Z. Deng, Y. Zhang, S. Chan, Y. Cheng, and N. Guizani, \u201cSmart contract vulnerability analysis and security audit,\u201d IEEE Network, vol.34, no.5, pp.276-282, 2020. 10.1109\/mnet.001.1900656","DOI":"10.1109\/MNET.001.1900656"},{"key":"28","doi-asserted-by":"publisher","unstructured":"[28] G. Caldarelli, \u201cUnderstanding the blockchain oracle problem: A call for action,\u201d Information, vol.11, no.11, 2020. 10.3390\/info11110509","DOI":"10.3390\/info11110509"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] W. Chen, X. Guo, Z. Chen, Z. Zheng, Y. Lu, and Y. Li, \u201cHoneypot contract risk warning on ethereum smart contracts,\u201d 2020 IEEE International Conference on Joint Cloud Computing, pp.1-8, IEEE, 2020. 10.1109\/jcc49151.2020.00009","DOI":"10.1109\/JCC49151.2020.00009"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[30] C.-W. Chan, C.-C. Chang, and Z.-H. Wang, \u201cCheating resistance for secret sharing,\u201d 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, pp.840-846, 2009. 10.1109\/nswctc.2009.390","DOI":"10.1109\/NSWCTC.2009.390"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E106.D\/9\/E106.D_2022ICP0003\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T04:58:39Z","timestamp":1715576319000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E106.D\/9\/E106.D_2022ICP0003\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,1]]},"references-count":30,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2022icp0003","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,1]]},"article-number":"2022ICP0003"}}