{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T03:19:06Z","timestamp":1771298346356,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.23919\/icitst.2017.8356363","type":"proceedings-article","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T19:01:01Z","timestamp":1525978861000},"page":"136-141","source":"Crossref","is-referenced-by-count":24,"title":["On blockchain-based authorization architecture for beyond-5G mobile services"],"prefix":"10.23919","author":[{"given":"Shinsaku","family":"Kiyomoto","sequence":"first","affiliation":[]},{"given":"Anirban","family":"Basu","sequence":"additional","affiliation":[]},{"given":"Mohammad Shahriar","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Sushmita","family":"Ruj","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BDCloud.2015.60"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref13","author":"lukianov","year":"2015","journal-title":"Compact confidential transactions for bit-coin"},{"key":"ref14","first-page":"218","article-title":"A certified digital signature","author":"merkle","year":"1989","journal-title":"Proceedings on Advances in Cryptology CRYPTO '89"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.102"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5220\/0005519503090315"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2013.102"},{"key":"ref19","author":"kraft","year":"2014","journal-title":"Namecoin"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SCNS.2016.7870552"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/OBD.2016.11"},{"key":"ref6","first-page":"153","article-title":"Making byzantine fault tolerant systems tolerate byzantine faults","author":"clement","year":"2009","journal-title":"NSDI'09 Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation"},{"key":"ref5","article-title":"ALGORAND: the efficient and democratic ledger","author":"chen","year":"2016","journal-title":"CoRR"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412073"},{"key":"ref7","year":"2014","journal-title":"Counterparty Foundation Community Counterparty"},{"key":"ref2","first-page":"159","author":"ateniese","year":"2005","journal-title":"Sanitizable Signatures"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref1","article-title":"Lelantos: A blockchain-based anonymous physical delivery system","author":"atawy","year":"2017","journal-title":"Cryptology ePrint Archive Report 2017\/465"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32115-8"},{"key":"ref22","author":"warren","year":"2012","journal-title":"Bitmessage A Peer-to-peer Message Authentication and Delivery System"},{"key":"ref21","first-page":"464","article-title":"Bitcoin and beyond: A technical survey on decentralized digital currencies","author":"tschorsch","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref24","author":"williams","year":"2015","journal-title":"How bitcoin's technology could make supply chains more transparent"},{"key":"ref23","author":"wilkinson","year":"2014","journal-title":"Metadisk A blockchain-based decentralized file storage application"},{"key":"ref25","author":"zyskind","year":"2015","journal-title":"Enigma Decentralized computation platform with guaranteed privacy"}],"event":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","location":"Cambridge","start":{"date-parts":[[2017,12,11]]},"end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8354335\/8356324\/08356363.pdf?arnumber=8356363","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,28]],"date-time":"2018-05-28T20:24:21Z","timestamp":1527539061000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8356363\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.23919\/icitst.2017.8356363","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}