{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T19:08:02Z","timestamp":1748372882641},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.23919\/icact.2019.8701987","type":"proceedings-article","created":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T22:58:41Z","timestamp":1556837921000},"page":"147-152","source":"Crossref","is-referenced-by-count":14,"title":["Ethereum-based Emergency Service for Smart Home System: Smart Contract Implementation"],"prefix":"10.23919","author":[{"given":"Yu Nandar","family":"Aung","sequence":"first","affiliation":[]},{"given":"Thitinan","family":"Tantidham","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194115"},{"article-title":"Connect Job Smart Contract Security Audit","year":"2017","author":"seleznev","key":"ref38"},{"year":"0","key":"ref33","article-title":"How to transfer between two remote servers"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813692"},{"key":"ref31","first-page":"211","article-title":"Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing. InParallel Distributed and Grid Computing (PDGC)","author":"somani","year":"2010","journal-title":"2010 1st International Conference on"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/356789.356793"},{"year":"0","key":"ref37","article-title":"Remix"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2313"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00224-3_19"},{"article-title":"Web-based multi-party computation with application to anonymous aggregate compensation analytics","year":"2015","author":"lapets","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref40","article-title":"Empirical vulnerability analysis of automated smart contracts security testing on blockchains","author":"parizi","year":"2018","journal-title":"Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2017.33"},{"key":"ref12","first-page":"330","article-title":"Policy considerations for the blockchain technology public and private applications","author":"gabison","year":"2016","journal-title":"SMU Science and Technology Law Review"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref14","first-page":"425","article-title":"CHAPTER 15 Enigma: Decentralized Computation Platform with Guaranteed Privacy in New Solutions for Cybersecurity","author":"shrobe","year":"2018","journal-title":"MITP"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2017.8190886"},{"key":"ref17","article-title":"Emergency Service for Smart Home System Using Ethereum Blockchain: System and Architecture","author":"yunandar","year":"2019","journal-title":"Proceedings of the 3 rd International Workshop on Smart Edge Computing and Networking (SmartEdge)"},{"key":"ref18","first-page":"1","article-title":"Review of Ethereum: Smart Home Case Study","author":"yunandar","year":"2017","journal-title":"Proc International Conference on Information Technology"},{"article-title":"An Introduction to LLL for Ethereum Smart Contract Development","year":"2017","author":"daniel","key":"ref19"},{"journal-title":"Authentication Authorization and Accounting with Ethereum Blockchain","year":"2017","author":"thakur","key":"ref28"},{"journal-title":"EU general data protection regulation (GDPR) an implementation and compliance guide","year":"2017","key":"ref4"},{"year":"0","key":"ref27","article-title":"IPFS is the Distributed Web"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s18030817"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2016.7778635"},{"key":"ref29","first-page":"369","article-title":"A digital signature based on a conventional encryption function","author":"merkle","year":"1987","journal-title":"Theory and Application of Cryptographic Techniques"},{"key":"ref5","first-page":"63","article-title":"Global Privacy Governance: A comparison of regulatory models in the US and Europe, and the emergence of accountability as a global norm","author":"maxwell","year":"2014","journal-title":"Cahier de prospective"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2535-6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0163477"},{"article-title":"Security Risks in the Age of Smart Homes","year":"2016","author":"fernandes","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISEASP.2017.7976993"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS-SWS.2018.8525684"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4842-2535-6","article-title":"Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginner","author":"dannen","year":"2017"},{"article-title":"Creating a private blockcahin with IoT Devices","year":"2017","author":"said","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2535-6_6"},{"key":"ref24","article-title":"Your first meteor application","author":"turnbull","year":"2014","journal-title":"Amazon Kindle"},{"article-title":"Installation Instructions for Ubuntu","year":"0","author":"lange","key":"ref23"},{"key":"ref26","first-page":"2587","article-title":"Hybrid Encryption Model of Symmetric and Asymmetric Cryptography with AES and Elgamal Encryption Algorithms","author":"jincharadze","year":"2018","journal-title":"Scientific & practical cyber security journal"},{"year":"0","key":"ref25","article-title":"Web3.js &#x2013; Ethereum Javascript API"}],"event":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","start":{"date-parts":[[2019,2,17]]},"location":"PyeongChang Kwangwoon_Do, Korea (South)","end":{"date-parts":[[2019,2,20]]}},"container-title":["2019 21st International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8694794\/8701885\/08701987.pdf?arnumber=8701987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:29:18Z","timestamp":1607560158000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8701987\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":40,"URL":"https:\/\/doi.org\/10.23919\/icact.2019.8701987","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}