{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:28:27Z","timestamp":1777703307826,"version":"3.51.4"},"reference-count":20,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2018,2,27]]},"DOI":"10.3233\/jifs-169392","type":"journal-article","created":{"date-parts":[[2018,2,27]],"date-time":"2018-02-27T12:33:42Z","timestamp":1519734822000},"page":"985-993","source":"Crossref","is-referenced-by-count":3,"title":["The application of block chain technology in spot exchange"],"prefix":"10.1177","volume":"34","author":[{"given":"Ming Zheng","family":"Liu","sequence":"first","affiliation":[{"name":"School of Management, Shanghai University, Shanghai, China"}]},{"given":"Zongfeng","family":"Zou","sequence":"additional","affiliation":[{"name":"School of Management, Shanghai University, Shanghai, China"}]}],"member":"179","reference":[{"issue":"18","key":"10.3233\/JIFS-169392_ref1","doi-asserted-by":"crossref","first-page":"6239","DOI":"10.1002\/sec.1769","article-title":"Enhanced stego block chaining (ESBC) for low bandwidth channels","volume":"9","author":"Khan","year":"2016","journal-title":"Security and Communication Networks"},{"issue":"2","key":"10.3233\/JIFS-169392_ref2","first-page":"297","article-title":"An efficient image encryption method based on improved cipher block chaining in cloud computing as a security service","volume":"10","author":"Jeyabalu","year":"2016","journal-title":"Australian Journal of Basic & Applied Sciences"},{"issue":"5","key":"10.3233\/JIFS-169392_ref3","doi-asserted-by":"crossref","first-page":"317","DOI":"10.7840\/kics.2014.39B.5.317","article-title":"Safety comparison analysis against known\/chosen plaintext attack of RBF (random block feedback) mode to other block cipher modes of operation","volume":"39","author":"Kim","year":"2014","journal-title":"The Journal of Korean Institute of Communications and Information Sciences"},{"issue":"2","key":"10.3233\/JIFS-169392_ref4","first-page":"297","article-title":"An efficient image encryption method based on improved cipher block chaining in cloud computing as a security service","volume":"10","author":"Jeyabalu","year":"2016","journal-title":"Australian Journal of Basic & Applied Sciences"},{"issue":"10","key":"10.3233\/JIFS-169392_ref5","doi-asserted-by":"crossref","first-page":"1186","DOI":"10.1002\/sec.1410","article-title":"PFX: An essence of authencryption for block-cipher security","volume":"9","author":"Hwang","year":"2016","journal-title":"Security & Communication Networks"},{"key":"10.3233\/JIFS-169392_ref6","first-page":"1","article-title":"Bitcoin block withholding attack: Analysis and mitigation","volume":"99","author":"Bag","year":"2016","journal-title":"IEEE Transactions on Information Forensics & Security"},{"issue":"1","key":"10.3233\/JIFS-169392_ref7","doi-asserted-by":"crossref","first-page":"59","DOI":"10.2168\/LMCS-10(1:5)2014","article-title":"Unification modulo a 2-sorted equational theory for cipher-decipher block chaining","volume":"10","author":"Anantharaman","year":"2014","journal-title":"Logical Methods in Computer Science"},{"key":"10.3233\/JIFS-169392_ref8","doi-asserted-by":"crossref","unstructured":"Yi K. , Kim K.M. and Yong J.C. , A car black box video data integrity assurance scheme using cyclic data block chaining, 41(11) (2014), 982\u2013991.","DOI":"10.5626\/JOK.2014.41.11.982"},{"issue":"11","key":"10.3233\/JIFS-169392_ref9","first-page":"1","article-title":"Statistical characterization of decryption errors in block ciphered systems","volume":"63","author":"Wang","year":"2015","journal-title":"IEEE Transactions on Communications"},{"key":"10.3233\/JIFS-169392_ref10","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.peva.2016.07.001","article-title":"Bitcoin blockchaindynamics: The selfish-mine strategy in the presence of propagation delay","volume":"104","author":"G\u00f6bel","year":"2016","journal-title":"Performance Evaluation"},{"issue":"3","key":"10.3233\/JIFS-169392_ref11","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/2695533.2695545","article-title":"Proof of activity: Extending bitcoin\u2019s proof of work via proof of stake [Extended Abstract] y","volume":"42","author":"Bentov","year":"2014","journal-title":"Acm Sigmetrics Performance Evaluation Review"},{"issue":"11","key":"10.3233\/JIFS-169392_ref12","first-page":"1","article-title":"Statistical characterization of decryption errors in block ciphered systems","volume":"63","author":"Wang","year":"2015","journal-title":"IEEE Transactions on Communications"},{"issue":"3","key":"10.3233\/JIFS-169392_ref13","first-page":"539","article-title":"A review on symmetric key encryption techniques in cryptography","volume":"3","author":"Saranya","year":"2014","journal-title":"International Journal of Science, Engineering and Technology Research"},{"key":"10.3233\/JIFS-169392_ref14","first-page":"63","article-title":"Research on block chain based on innovative management mode","volume":"122","author":"Qian","year":"2016","journal-title":"dpi-proceedings.com"},{"issue":"10","key":"10.3233\/JIFS-169392_ref15","doi-asserted-by":"crossref","first-page":"2770","DOI":"10.1002\/cpe.3189","article-title":"X86-Android performance improvement for x86 smart mobile devices","volume":"28","author":"Choi","year":"2016","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"2","key":"10.3233\/JIFS-169392_ref16","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1002\/sec.733","article-title":"Critical analysis of counter mode with cipher block chain message authentication mode protocol\u2014CCMP","volume":"7","author":"Ahmed","year":"2014","journal-title":"Security & Communication Networks"},{"key":"10.3233\/JIFS-169392_ref17","first-page":"50","article-title":"Security in wireless sensor networks using cryptographic techniques","volume":"3","author":"Panda","year":"2014","journal-title":"AJER"},{"key":"10.3233\/JIFS-169392_ref18","first-page":"281","article-title":"The bitcoin backbone protocol: Analysis and applications","volume":"9057","author":"Garay","year":"2015","journal-title":"Springer Berlin Heidelberg"},{"issue":"12","key":"10.3233\/JIFS-169392_ref19","first-page":"2175","article-title":"Powell, bitcoin: Economics, technology, and governance","volume":"37","author":"Marvin","year":"2015","journal-title":"cfapubs.org"},{"key":"10.3233\/JIFS-169392_ref20","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.simpat.2015.05.008","article-title":"On optimization of simulation execution on Amazon EC2 spot market","volume":"58","author":"Kami\u0144ski","year":"2015","journal-title":"Simulation Modelling Practice & Theory"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-169392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:38:21Z","timestamp":1777455501000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-169392"}},"subtitle":[],"editor":[{"given":"Mahalingam","family":"Sundhararajan","sequence":"additional","affiliation":[]},{"given":"Xiao-Zhi","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Hamed","family":"Vahdat Nejad","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,2,27]]},"references-count":20,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/jifs-169392","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,27]]}}}