{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T14:13:20Z","timestamp":1772892800569,"version":"3.50.1"},"reference-count":187,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"vor","delay-in-days":144,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061965","type":"journal-article","created":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T04:01:21Z","timestamp":1746676881000},"page":"3975-4029","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":2,"title":["MediGuard: A Survey on Security Attacks in Blockchain-IoT Ecosystems for e-Healthcare Applications"],"prefix":"10.32604","volume":"83","author":[{"given":"Shrabani","family":"Sutradhar","sequence":"first","affiliation":[]},{"given":"Rajesh","family":"Bose","sequence":"additional","affiliation":[]},{"given":"Sudipta","family":"Majumder","sequence":"additional","affiliation":[]},{"given":"Arfat Ahmad","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Sandip","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Fasee","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Deepak","family":"Prashar","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"285","author":"Gupta","year":"2022","journal-title":"Research anthology on cross-disciplinary designs and applications of automation"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"e5","DOI":"10.4108\/eetel.v8i1.3015","article-title":"Design of UML diagrams for WEBMED-healthcare service system services","volume":"8","author":"Suriya","year":"2023","journal-title":"EAI Endorsed Trans E Learn"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1111\/j.1467-8616.2013.00929.x","article-title":"Healthcare service: new ways to serve","volume":"24","author":"Peters","year":"2013","journal-title":"Bus Strategy Rev"},{"key":"ref4","series-title":"2013 6th International Conference on Emerging Trends in Engineering and Technology","first-page":"126","article-title":"A review on healthcare service quality dimensions","author":"Akhade","year":"2013 Dec 16\u201318"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"143","DOI":"10.36106\/paripex\/6210147","article-title":"Healthcare service quality-a review of literature","author":"Monika","year":"2022","journal-title":"Paripex Indian J Res"},{"key":"ref6","first-page":"SPJNIS10107","article-title":"Dynamic cloud computing platform in E-healthcare system","volume":"9","author":"Mahesh","year":"2023","journal-title":"Int J Innovat Res Inform Secur"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"2314","DOI":"10.3390\/electronics11152314","article-title":"IoMT-based platform for e-health monitoring based on the blockchain","volume":"11","author":"Ktari","year":"2022","journal-title":"Electronics"},{"key":"ref8","series-title":"International Conference on Computer Application and Information Security (ICCAIS 2022)","first-page":"55","article-title":"Privacy protection method for blockchain transaction data based on homomorphic encryption and zero-knowledge proof","author":"Liu","year":"2022 Dec 23\u201324"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"7172","DOI":"10.3390\/s23167172","article-title":"Privacy-preserving blockchain technologies","volume":"23","author":"Valadares","year":"2023","journal-title":"Sensors"},{"key":"ref10","series-title":"2023 IEEE International Conference on Smart Information Systems and Technologies (SIST)","first-page":"567","article-title":"Exploring the privacy concerns in permissionless blockchain networks and potential solutions","author":"Bayan","year":"2023 May 4\u20136"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"100419","DOI":"10.1016\/j.dajour.2024.100419","article-title":"A blockchain privacy-conserving framework for secure medical data transmission in the Internet of medical things","volume":"10","author":"Sutradhar","year":"2024","journal-title":"Decis Anal J"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"2034","DOI":"10.3390\/electronics10162034","article-title":"Security, privacy, and reliability in digital healthcare systems using blockchain","volume":"10","author":"Ali","year":"2021","journal-title":"Electronics"},{"key":"ref13","series-title":"ICONS 2014: Proceedings of the Ninth International Conference on Systems","article-title":"Sensitive information protection on mobile devices using general access structures","author":"Tomasz","year":"2014"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"28712","DOI":"10.1109\/ACCESS.2019.2901858","article-title":"A survey on long-range attacks for proof of stake protocols","volume":"7","author":"Deirmentzoglou","year":"2019","journal-title":"IEEE Access"},{"key":"ref15","series-title":"IEEE INFOCOM, 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","first-page":"574","article-title":"Sperax: an approach to defeat long range attacks in blockchains","author":"Wang","year":"2020 Jul 6\u20139"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"6408","DOI":"10.3390\/s21196408","article-title":"Blockchain technologies: probability of double-spend attack on a proof-of-stake consensus","volume":"21","author":"Karpinski","year":"2021","journal-title":"Sensors"},{"key":"ref17","series-title":"Proceedings of the 2021 International Conference on Management of Data","first-page":"2813","article-title":"Permissioned blockchains: properties, techniques and applications","author":"Amiri","year":"2021"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TEM.2020.3003565","article-title":"Permissionless and permissioned, technology-focused and business needs-driven: understanding the hybrid opportunity in blockchain through a case study of insolar","volume":"69","author":"Kim","year":"2022","journal-title":"IEEE Trans Eng Manag"},{"key":"ref19","article-title":"Permissioned vs permissionless blockchain platforms: tradeoffs in trust and performance","author":"Bakos","year":"2021","journal-title":"NYU Stern School of Business working paper"},{"key":"ref20","series-title":"2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)","first-page":"1","article-title":"Detecting and identifying storage issues using blockchain technology","author":"Arigela","year":"2022 Jan 28\u201329"},{"key":"ref21","article-title":"Solutions to the endless addition of transaction volume in blockchain","volume":"13","author":"Cao","year":"2022","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref22","series-title":"2022 International Conference on Service Science (ICSS)","first-page":"33","article-title":"Ring-overlap: a storage scaling mechanism for consortium blockchain","author":"Liu","year":"2022 May 13\u201315"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3432208","article-title":"Handling missing sensors in topology-aware IoT applications with gated graph neural network","volume":"4","author":"Liu","year":"2020","journal-title":"Proc ACM Interact Mob Wearable Ubiquitous Technol"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"350","DOI":"10.3390\/bios11100350","article-title":"Mitigating of data packet loss in Bluetooth Low Energy-based wearable healthcare ecosystem","volume":"11","author":"Tipparaju","year":"2021","journal-title":"Biosensors"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1007\/s11227-023-05518-3","article-title":"Dynamic weight-based connectivity recovery in wireless sensor and actor networks","volume":"80","author":"Chiang","year":"2024","journal-title":"J Supercomput"},{"key":"ref26","series-title":"2019 IEEE\/ACM 27th International Conference on Program Comprehension (ICPC)","first-page":"105","article-title":"Enabling clone detection for Ethereum via smart contract birthmarks","author":"Liu","year":"2019"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"4617","DOI":"10.1007\/s10664-020-09852-5","article-title":"Code cloning in smart contracts: a case study on verified contracts from the ethereum blockchain platform","volume":"25","author":"Kondo","year":"2020","journal-title":"Empir Softw Eng"},{"key":"ref28","series-title":"2022 3rd International Conference on Smart Electronics and Communication (ICOSEC)","first-page":"768","article-title":"Systematic review of security authentication based on block chain","author":"Yuvaraj","year":"2022 Oct 20\u201322"},{"key":"ref29","series-title":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","first-page":"1","article-title":"Federated blockchain based highly-available healthcare system to protect the privacy and security of users","author":"Kumar","year":"2024 Jun 24\u201328"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"12","DOI":"10.59298\/ROJPHM\/2024\/421217","article-title":"Blockchain in healthcare: ensuring data security and integrity","volume":"4","author":"Richard","year":"2024","journal-title":"Res Output J Public Health Med"},{"key":"ref31","series-title":"2018 IEEE Symposium on Computers and Communications (ISCC)","first-page":"556","article-title":"An authentication scheme using identity-based encryption & blockchain","author":"Zhou","year":"2018 Jun 25\u201328"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"1663","DOI":"10.3390\/sym12101663","article-title":"Blockchain platforms and access control classification for IoT systems","volume":"12","author":"Abdi","year":"2020","journal-title":"Symmetry"},{"key":"ref33","first-page":"239","article-title":"Comprehensive survey and research directions on blockchain IoT access control","volume":"12","author":"Hussain","year":"2021","journal-title":"Int J Adv Comput Sci Applicat"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"2531","DOI":"10.3390\/healthcare10122531","article-title":"Information security behavior in health information systems: a review of research trends and antecedent factors","volume":"10","author":"Sari","year":"2022","journal-title":"Healthcare"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"4547","DOI":"10.1007\/s12652-018-1138-z","article-title":"Trust based access control model for securing electronic healthcare system","volume":"10","author":"Singh","year":"2019","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"23","DOI":"10.4018\/IJISP.2018070106","article-title":"Misuse of \u2018Break-the-Glass\u2019 policies in hospitals: detecting unauthorized access to sensitive patient health data","volume":"12","author":"Stark","year":"2018","journal-title":"Int J Inf Secur Priv"},{"key":"ref37","article-title":"Addressing scalability issues in blockchain: a use case from healthcare","author":"Sadath","year":"2022","journal-title":"Res Sq"},{"key":"ref38","series-title":"2022 IEEE Global Conference on Computing, Power and Communication Technologies (GlobConPT)","first-page":"1","article-title":"Scalability in blockchain\u2212hyperledger fabric and hierarchical model","author":"Lipsa","year":"2022"},{"key":"ref39","series-title":"IC3-2021: Proceedings of the 2021 Thirteenth International Conference on Contemporary Computing","first-page":"394","article-title":"Study on blockchain scalability solutions","author":"Tyagi","year":"2021"},{"key":"ref40","series-title":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","first-page":"2231","article-title":"A machine learning based scalable blockchain architecture for a secure Healthcare system","author":"Salim","year":"2022 Oct 19\u201321"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"181","DOI":"10.52783\/cana.v32.1938","article-title":"Design of an efficient QOS aware trust-based security model with bioinspired sidechai0s for healthcare deployments","volume":"32","author":"Patil","year":"2024","journal-title":"Cana"},{"key":"ref42","series-title":"2024 IEEE International Conference on Blockchain (Blockchain)","first-page":"464","article-title":"Comparative analysis of permissioned blockchains: cosmos, hyperledger fabric, quorum, and XRPL","author":"Correia","year":"2024 Aug 19\u201322"},{"key":"ref43","unstructured":"Lin JY, Zhu LG, Chen WM, Wang WC, Gan C, Han S. On-device training under 256 KB memory. arXiv:2206.15472. 2022."},{"key":"ref44","series-title":"2022 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","first-page":"83","article-title":"FLOMD: fast and low overhead memory deduplication for edge nodes","author":"Shen","year":"2022"},{"key":"ref45","series-title":"ICC, 2020-2020 IEEE International Conference on Communications (ICC)","first-page":"1","article-title":"LIMITS: lightweight machine learning for IoT systems with resource limitations","author":"Sliwa","year":"2020 Jun 7\u201311"},{"key":"ref46","doi-asserted-by":"crossref","unstructured":"Yu J. Fault independence in blockchain. arXiv:2306.05690. 2023.","DOI":"10.1109\/DSN-S58398.2023.00035"},{"key":"ref47","first-page":"75","article-title":"The governance of blockchain dispute resolution. Social science research network","volume":"25","author":"Allen","year":"2020","journal-title":"Harvard Negot Law Rev"},{"key":"ref48","series-title":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","article-title":"SoK: blockchain governance","author":"Kiayias","year":"2023"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"651","DOI":"10.3390\/s23020651","article-title":"A machine learning approach for the NLP-based analysis of cyber threats and vulnerabilities of the healthcare ecosystem","volume":"23","author":"Silvestri","year":"2023","journal-title":"Sensors"},{"key":"ref50","series-title":"Proceedings of the International Conference on Cybersecurity and Cybercrime","first-page":"49","article-title":"Healthcare cybersecurity vulnerabilities","author":"Drake","year":"2022"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1109\/JIOT.2018.2863180","article-title":"Is fragmentation a threat to the success of the Internet of Things?","volume":"6","author":"Aly","year":"2019","journal-title":"IEEE Internet Things J"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3568954","article-title":"On the user behavior leakage from recommender system exposure","volume":"41","author":"Xin","year":"2023","journal-title":"ACM Trans Inf Syst"},{"key":"ref53","unstructured":"Lianglu P, Shaanan C, Toby M, Van-Thuan P. Detecting excessive data exposures in web server responses with metamorphic fuzzing. arXiv:2301.09258. 2023."},{"key":"ref54","article-title":"The effects of data leakage on neuroimaging predictive models","author":"Rosenblatt","year":"2023","journal-title":"bioRxiv"},{"key":"ref55","series-title":"2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT)","first-page":"482","article-title":"Ultra-low power microcontroller architectures for the Internet of Things (IoT) devices","author":"Sultan","year":"2023 Jan 23-25"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"61","DOI":"10.3390\/jlpea12040061","article-title":"Hardware solutions for low-power smart edge computing","volume":"12","author":"Martin Wisniewski","year":"2022","journal-title":"J Low Power Electron Appl"},{"key":"ref57","first-page":"421","article-title":"Low-power approximate arithmetic circuits for IoT devices","volume":"15","author":"Thakur","year":"2022","journal-title":"Recent Adv Electr Electron Eng Former Recent Pat Electr Electron Eng"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"100493","DOI":"10.1016\/j.iot.2021.100493","article-title":"A secure anonymous D2D mutual authentication and key agreement protocol for IoT","volume":"18","author":"Hajian","year":"2022","journal-title":"Internet Things"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"2857","DOI":"10.1007\/s11276-022-02999-7","article-title":"Analysis on functionalities and security features of Internet of Things related protocols","volume":"28","author":"Rizzardi","year":"2022","journal-title":"Wirel Netw"},{"key":"ref60","series-title":"2021 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD)","first-page":"1","article-title":"Security considerations in the internet of things protocol stack","author":"Nair","year":"2021"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"41","DOI":"10.3390\/sci5040041","article-title":"Privacy and security of blockchain in healthcare: applications, challenges, and future perspectives","volume":"5","author":"Taherdoost","year":"2023","journal-title":"Sci"},{"key":"ref62","series-title":"2022 International Conference on Computer Communication and Informatics (ICCCI)","first-page":"1","article-title":"Secured framework for privacy preserving healthcare based on blockchain","author":"Raghav","year":"2022 Jan 25\u201327"},{"key":"ref63","series-title":"International Conference on Innovative Computing and Communications","first-page":"143","article-title":"Security framework for enhancing security and privacy in healthcare data using blockchain technology","author":"Sivasangari","year":"2021"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"110658","DOI":"10.1016\/j.knosys.2023.110658","article-title":"Federated learning for secure IoMT-applications in smart healthcare systems: a comprehensive review","volume":"274","author":"Rani","year":"2023","journal-title":"Knowl Based Syst"},{"key":"ref65","series-title":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","first-page":"1","article-title":"Privacy pinnacle: improvising healthcare data security through federated learning and blockchain framework","author":"Amreen","year":"2024 Jun 24\u201328"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"14418","DOI":"10.1109\/JIOT.2023.3263598","article-title":"Blockchain meets federated learning in healthcare: a systematic review with challenges and opportunities","volume":"10","author":"Myrzashova","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s00779-021-01583-8","article-title":"Blockchain-assisted secured data management framework for health information analysis based on Internet of Medical Things","volume":"28","author":"Abbas","year":"2024","journal-title":"Pers Ubiquitous Comput"},{"key":"ref68","series-title":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","first-page":"1","article-title":"A user authentication and access control scheme for IoT-based healthcare using blockchain","author":"Geetha","year":"2021 Jul 6\u20138"},{"key":"ref69","series-title":"2018 4th International Conference on Wireless and Telematics (ICWT)","first-page":"1","article-title":"Blockchain based secure data handover scheme in non-orthogonal multiple access","author":"Islam","year":"2018 Jul 12\u201313"},{"key":"ref70","series-title":"IEEE\/WIC\/ACM International Conference on Web Intelligence","first-page":"423","article-title":"Blockchain based access control systems: state of the art and challenges","author":"Rouhani","year":"2019"},{"key":"ref71","first-page":"1","article-title":"Multimedia wireless sensor network platform Data encryption algorithm based on blockchain technology","author":"Uma Maheswari","year":"2024","journal-title":"Proceedings of the 2nd International Conference on Networking and Communications (ICNWC 2024)"},{"key":"ref72","unstructured":"[cited 2021 Jul 5]. Available from: https:\/\/healthitsecurity.com\/news\/the-10-biggest-healthcare-data-breaches-of-2020-so-far."},{"key":"ref73","series-title":"2023 IEEE\/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW)","first-page":"39","article-title":"A blockchain-based security management framework for cyber-physical systems","author":"Das","year":"2023 May 1\u20134"},{"key":"ref74","series-title":"2020 International Conference in Mathematics, Computer Engineering and Computer Science (ICMCECS)","first-page":"1","article-title":"A new framework for detecting insider attacks in cloud-based E-health care system","author":"Okikiola","year":"2020 Mar 18\u201321"},{"key":"ref75","doi-asserted-by":"crossref","unstructured":"Ekparinya P, Gramoli V, Jourjon G. The attack of the clones against proof-of-authority. 2019. doi:10.48550\/arXiv.1902.10244.","DOI":"10.14722\/ndss.2020.24082"},{"key":"ref76","doi-asserted-by":"crossref","first-page":"108272","DOI":"10.1016\/j.measurement.2020.108272","article-title":"An intelligent based healthcare security monitoring schemes for detection of node replication attack in wireless sensor networks","volume":"167","author":"Anitha","year":"2021","journal-title":"Measurement"},{"key":"ref77","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1109\/TII.2021.3072929","article-title":"DAP: efficient detection against probabilistic cloning attacks in anonymous RFID systems","volume":"18","author":"Chen","year":"2022","journal-title":"IEEE Trans Ind Inform"},{"key":"ref78","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1109\/TIFS.2020.3023785","article-title":"Nowhere to hide: efficiently identifying probabilistic cloning attacks in large-scale RFID systems","volume":"16","author":"Ai","year":"2020","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"1255","DOI":"10.1109\/TII.2015.2482921","article-title":"Deterministic detection of cloning attacks for anonymous RFID systems","volume":"11","author":"Bu","year":"2015","journal-title":"IEEE Trans Ind Inform"},{"key":"ref80","series-title":"2016 International Conference on Computer Communication and Informatics (ICCCI)","first-page":"1","article-title":"Node compromise detection based on NodeTrust in wireless sensor networks","author":"Thaile","year":"2016 Jan 7\u20139"},{"key":"ref81","series-title":"2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007)","first-page":"219","article-title":"Distributed software-based attestation for node compromise detection in sensor networks","author":"Yang","year":"2007 Oct 10\u201312"},{"key":"ref82","series-title":"5th International Symposium on Foundations and Applications of Blockchain 2022 (FAB 2022)","first-page":"2:1","article-title":"Some insights on open problems in blockchains: explorative tracks for tezos (Invited Talk)","volume":"101","author":"Conchon"},{"key":"ref83","series-title":"2022 IEEE Information Theory Workshop (ITW)","first-page":"744","article-title":"Breaking blockchain\u2019s communication barrier with coded computation","author":"Wang","year":"2022 Nov 1\u20139"},{"key":"ref84","series-title":"2022 International Conference on Computational Science and Computational Intelligence (CSCI)","first-page":"1719","article-title":"Current cybersecurity challenges of applying blockchain in healthcare","author":"A.L.Hamad","year":"2022 Dec 14\u201316"},{"key":"ref85","series-title":"2019 IEEE 13th International Conference on Anti-Counterfeiting, Security, and Identification (ASID)","first-page":"6","article-title":"A blockchain-based communication non-repudiation system for conversational service","author":"Li","year":"2019 Oct 25\u201327"},{"key":"ref86","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.cose.2012.11.009","article-title":"A taxonomy and survey of attacks on digital signatures","volume":"34","author":"Hernandez-Ardieta","year":"2013","journal-title":"Comput Secur"},{"key":"ref87","doi-asserted-by":"crossref","first-page":"11048","DOI":"10.1016\/j.eswa.2011.02.149","article-title":"Adaptation of agent-based non-repudiation protocol to mobile digital right management (DRM)","volume":"38","author":"Ou","year":"2011","journal-title":"Expert Syst Appl"},{"key":"ref88","doi-asserted-by":"crossref","first-page":"77","DOI":"10.54851\/v4i1y202209","article-title":"A note on blockchain authentication methods for mobile devices in healthcare","volume":"4","author":"Grosu","year":"2022","journal-title":"Rom Cyber Secur J"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"9089","DOI":"10.3390\/s22239089","article-title":"A survey of authentication in Internet of Things-enabled healthcare systems","volume":"22","author":"Khan","year":"2022","journal-title":"Sensors"},{"key":"ref90","series-title":"2022 International Conference on Image Processing, Computer Vision and Machine Learning (ICICML)","first-page":"1","article-title":"Mobile device fingerprinting recognition using insensitive information","author":"Wei","year":"2022 Oct 28\u201330"},{"key":"ref91","series-title":"2023 Optical Fiber Communications Conference and Exhibition (OFC)","first-page":"1","article-title":"Man-in-the-middle attacks through re-shaping I-Q optical constellations","author":"Ruiz","year":"2023 Mar 5\u20139"},{"key":"ref92","series-title":"2024 Conference of Young Researchers in Electrical and Electronic Engineering (ElCon)","first-page":"264","article-title":"Development of a secure messenger based on the ECMQV algorithm, immune to man-in-the-middle attacks","author":"Osipova","year":"2024 Jan 29\u201331"},{"key":"ref93","doi-asserted-by":"crossref","first-page":"118401","DOI":"10.1016\/j.eswa.2022.118401","article-title":"Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks: a state of the art review","volume":"210","author":"Thankappan","year":"2022","journal-title":"Expert Syst Appl"},{"key":"ref94","doi-asserted-by":"crossref","first-page":"e4729","DOI":"10.1002\/ett.4729","article-title":"Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology","volume":"34","author":"Ilyas","year":"2023","journal-title":"Trans Emerging Tel Tech"},{"key":"ref95","volume":"660","author":"Alam","year":"2023","journal-title":"Advances in distributed computing and machine learning. lecture notes in networks and systems"},{"key":"ref96","doi-asserted-by":"crossref","DOI":"10.31449\/inf.v46i7.4033","article-title":"Detect and mitigate blockchain-based DDoS attacks using machine learning and smart contracts","volume":"46","author":"Aljanabi","year":"2022","journal-title":"Informatica"},{"key":"ref97","doi-asserted-by":"crossref","first-page":"6806","DOI":"10.3390\/s22186806","article-title":"DDoS attack prevention for Internet of thing devices using ethereum blockchain technology","volume":"22","author":"Ibrahim","year":"2022","journal-title":"Sensors"},{"key":"ref98","first-page":"193","article-title":"Lost in data: recognizing type of time series sensor data using signal pattern classification","volume":"40","author":"\u010culi\u0107 Gambiro\u017ea","year":"2023","journal-title":"Int J Data Sci Anal"},{"key":"ref99","author":"Luizzo","year":"2022","journal-title":"Healthcare security:solutions for management, operations, and administration"},{"key":"ref100","doi-asserted-by":"crossref","first-page":"100176","DOI":"10.1016\/j.bcra.2023.100176","article-title":"Blockchain privacy and regulatory compliance: towards a practical equilibrium","volume":"5","author":"Buterin","year":"2024","journal-title":"Blockchain Res Appl"},{"key":"ref101","series-title":"Proceedings of the 16th International Conference on Availability, Reliability and Security","first-page":"1","article-title":"The landscape of cybersecurity vulnerabilities and challenges in healthcare: security standards and paradigm shift recommendations","author":"Kioskli","year":"2021"},{"key":"ref102","doi-asserted-by":"crossref","first-page":"6183","DOI":"10.3390\/s23136183","article-title":"Modelling of the energy depletion process and battery depletion attacks for battery-powered Internet of Things (IoT) devices","volume":"23","author":"Kuaban","year":"2023","journal-title":"Sensors"},{"key":"ref103","series-title":"2022 International Conference on Future Trends in Smart Communities (ICFTSC)","first-page":"93","article-title":"Extended lifetime of IoT applications using energy saving schemes","author":"Khalid","year":"2022"},{"key":"ref104","series-title":"2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP)","first-page":"1","article-title":"Design and analysis of power optimization in Internet of Things using RFID based energy harvesting mechanism","author":"Dhivya","year":"2022 Dec 23\u201324"},{"key":"ref105","series-title":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","first-page":"1","article-title":"Hardware and software method to reduce power consumption in battery operated IoT devices","author":"Sudharshan","year":"2022 Jan 10\u201311"},{"key":"ref106","doi-asserted-by":"crossref","first-page":"779","DOI":"10.54097\/hset.v39i.6644","article-title":"Mitigate long-lasting ethical issues in the healthcare industry with blockchain-based solutions","volume":"39","author":"Li","year":"2023","journal-title":"Highlights Sci Eng Technol"},{"key":"ref107","doi-asserted-by":"crossref","first-page":"100264","DOI":"10.1016\/j.iot.2020.100264","article-title":"A survey of IoT protocols and their security issues through the lens of a generic IoT stack","volume":"16","author":"Tournier","year":"2021","journal-title":"Internet Things"},{"key":"ref108","doi-asserted-by":"crossref","first-page":"16519","DOI":"10.3390\/su152316519","article-title":"Security risk assessment framework for the healthcare Industry 5.0","volume":"15","author":"Baz","year":"2023","journal-title":"Sustainability"},{"key":"ref109","series-title":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","first-page":"1","article-title":"An IoT-blockchain architecture based on hyperledger framework for healthcare monitoring application","author":"Attia","year":"2019 Jun 24\u201326"},{"key":"ref110","doi-asserted-by":"crossref","first-page":"86403","DOI":"10.1109\/ACCESS.2024.3415663","article-title":"Protecting your online Persona: a preferential selective encryption approach for enhanced privacy in tweets, images, memes, and metadata","volume":"12","author":"Shetty","year":"2024","journal-title":"IEEE Access"},{"key":"ref111","unstructured":"HIPPA. [cited 2021 Jul 5]. Available from: https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/laws-regulations\/index.html."},{"key":"ref112","unstructured":"GDPR. [cited 2021 Jul 5]. Available from: https:\/\/gdpr-info.eu\/."},{"key":"ref113","doi-asserted-by":"crossref","first-page":"3723","DOI":"10.1109\/COMST.2019.2914094","article-title":"Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices\u2014a review","volume":"21","author":"Yaqoob","year":"2019","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref114","doi-asserted-by":"crossref","first-page":"1893","DOI":"10.3390\/electronics11121893","article-title":"Towards secure and intelligent Internet of health things: a survey of enabling technologies and applications","volume":"11","author":"Zaman","year":"2022","journal-title":"Electronics"},{"key":"ref115","series-title":"Engineering Proceedings","first-page":"50","article-title":"Cyber security in a 5G-based smart healthcare network: a base station case study","volume":"55","author":"Lee"},{"key":"ref116","doi-asserted-by":"crossref","first-page":"768","DOI":"10.3390\/electronics8070768","article-title":"A survey on Internet of Things and cloud computing for healthcare","volume":"8","author":"Dang","year":"2019","journal-title":"Electronics"},{"key":"ref117","doi-asserted-by":"crossref","first-page":"2628","DOI":"10.3390\/s19112628","article-title":"Study of out-of-hospital access to HIS system: a security perspective","volume":"19","author":"Chen","year":"2019","journal-title":"Sensors"},{"key":"ref118","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/s00607-024-01352-4","article-title":"Trends, prospects, challenges, and security in the healthcare Internet of Things","volume":"107","author":"Ali","year":"2024","journal-title":"Computing"},{"key":"ref119","first-page":"9","article-title":"Blockchain technology in healthcare services. Master of cyber law and information security, national law institute university, Bhopal (M.P), India","volume":"3","author":"Mukati","year":"2023","journal-title":"Int J Comput Netw Commun (IJCNC)"},{"key":"ref120","series-title":"2023 International Conference on Inventive Computation Technologies (ICICT)","first-page":"1159","article-title":"Significance of blockchain technology in the healthcare sector","author":"Galaba"},{"key":"ref121","volume":"615","author":"Kumar","year":"2023","journal-title":"Information and communication technology for competitive strategies (ICTCS 2022). Lecture notes in networks and systems"},{"key":"ref122","first-page":"31","author":"Swati","year":"2023","journal-title":"Blockchain technology in e-healthcare management"},{"key":"ref123","series-title":"2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)","first-page":"1272","article-title":"Application of blockchain technology in the healthcare system","author":"Kamble","year":"2023 Mar 23\u201325"},{"key":"ref124","first-page":"185","author":"Gupta","year":"2023","journal-title":"Innovations in healthcare informatics: from interoperability to data analysis"},{"key":"ref125","doi-asserted-by":"crossref","first-page":"2998","DOI":"10.1109\/TEM.2022.3212007","article-title":"Blockchain technology for embracing Healthcare 4.0","volume":"70","author":"Abbate","year":"2023","journal-title":"IEEE Trans Eng Manag"},{"key":"ref126","first-page":"475","author":"Singhal","year":"2025","journal-title":"Harnessing AI, blockchain, and cloud computing for enhanced e-government services"},{"key":"ref127","first-page":"177","author":"Shi","year":"2023","journal-title":"Revolutionizing healthcare through artificial intelligence and internet of things applications"},{"key":"ref128","series-title":"2023 IEEE 17th International Symposium on Applied Computational Intelligence and Informatics (SACI)","first-page":"171","article-title":"Blockchain technology in healthcare industry: benefits and issues","author":"Qose","year":"2023 May 23\u201326"},{"key":"ref129","series-title":"2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC)","first-page":"1","article-title":"Application of blockchain technology in healthcare: a systematic review","author":"Chauhan","year":"2022 May 9\u201311"},{"key":"ref130","doi-asserted-by":"crossref","first-page":"257","DOI":"10.17762\/ijcnis.v14i3.5621","article-title":"Blockchain technologies in healthcare system for real time applications using IoT and deep learning techniques","volume":"14","author":"Bernardo Tello","year":"2022","journal-title":"Int J Commun Netw Inf Secur"},{"key":"ref131","doi-asserted-by":"crossref","DOI":"10.38106\/LMRJ.2023.5.2-08","article-title":"Blockchain in healthcare: unlocking the potential of blockchain for secure and efficient applications for medical data management-a presentation of basic concepts","volume":"5","author":"Shaikh","year":"2023","journal-title":"Liaquat Med Res J"},{"key":"ref132","doi-asserted-by":"crossref","first-page":"141","DOI":"10.37547\/tajet\/Volume07Issue03-14","article-title":"Optimizing revenue cycle management in healthcare: AI and IT solutions for business process automation","volume":"7","author":"mamun","year":"2025","journal-title":"Am J Eng Technol"},{"key":"ref133","doi-asserted-by":"crossref","first-page":"518","DOI":"10.30574\/wjarr.2024.24.1.3085","article-title":"Telehealth innovations for cardiovascular disease management","volume":"24","author":"Faderin","year":"2024","journal-title":"World J Adv Res Rev"},{"key":"ref134","article-title":"Multiple disease prediction using different machine learning algorithms comparatively","volume":"7","author":"Bhawke","year":"2023","journal-title":"Int J Sci Res Eng Manag"},{"key":"ref135","doi-asserted-by":"crossref","first-page":"103633","DOI":"10.1016\/j.jnca.2023.103633","article-title":"Blockchain for healthcare systems: architecture, security challenges, trends and future directions","volume":"215","author":"Andrew","year":"2023","journal-title":"J Netw Comput Appl"},{"key":"ref136","doi-asserted-by":"crossref","first-page":"1436","DOI":"10.3390\/s20051436","article-title":"A memory-efficient transmission scheme for multi-homed Internet-of-things (IoT) devices","volume":"20","author":"Hwang","year":"2020","journal-title":"Sensors"},{"key":"ref137","series-title":"2021 IEEE 32nd International Conference on Application-Specific Systems, Architectures and Processors (ASAP)","first-page":"187","article-title":"Memory-aware efficient deep learning mechanism for IoT devices","author":"Banerjee"},{"key":"ref138","series-title":"2024 Second International Conference on Inventive Computing and Informatics (ICICI)","first-page":"330","article-title":"Smart system for elderly care based on portable sensor positioning and video surveillance","author":"He","year":"2024 Jun 11\u201312"},{"key":"ref139","doi-asserted-by":"crossref","first-page":"38","DOI":"10.4103\/picr.picr_219_22","article-title":"The role of remote data capture, wearables, and digital biomarkers in decentralized clinical trials","volume":"15","author":"Chodankar","year":"2024","journal-title":"Perspect Clin Res"},{"key":"ref140","volume":"114","author":"Gourisaria","year":"2022","journal-title":"Data science in societal applications. Studies in big data"},{"key":"ref141","first-page":"5","article-title":"The impact of wearable technology on health monitoring","volume":"3","author":"Rukundo","year":"2024","journal-title":"Res Invent J Public Health Pharm"},{"key":"ref142","series-title":"2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","first-page":"3523","article-title":"Real-time data management in ubiquitous wearable networks","author":"Hilal","year":"2017 Oct 5\u20138"},{"key":"ref143","doi-asserted-by":"crossref","first-page":"3596","DOI":"10.3390\/electronics13183596","article-title":"A wireless ad hoc network communication platform and data transmission strategies for multi-bus instruments","volume":"13","author":"Qian","year":"2024","journal-title":"Electronics"},{"key":"ref144","first-page":"169","article-title":"Security assessment for key management in mobile ad hoc networks","volume":"8","author":"Abouhogail","year":"2014","journal-title":"Int J Secur Appl"},{"key":"ref145","unstructured":"Shin J, Cho Y, Kim YJ. Wearable apparatus, management server, management system having the same, and method for controlling thereof. U.S. Patent 10,764,733[P]; 2020 Sep 1. Available from: https:\/\/patents.google.com\/patent\/WO2016105135A1\/en."},{"key":"ref146","series-title":"2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS)","first-page":"971","article-title":"Blockchain enabled biometric security in intemet-of-medical-things (IoMT) devices","author":"Sharma","year":"2022 Nov 24\u201326"},{"key":"ref147","series-title":"2024 IEEE International Conference on Big Data (BigData)","first-page":"4789","article-title":"CBCMS: a compliance management system for cross-border data transfer","author":"Zhuang","year":"2024 Dec 15\u201318"},{"key":"ref148","doi-asserted-by":"crossref","first-page":"5629","DOI":"10.1109\/ACCESS.2023.3236505","article-title":"Blockchain for healthcare management systems: a survey on interoperability and security","volume":"11","author":"Villarreal","year":"2023","journal-title":"IEEE Access"},{"key":"ref149","first-page":"204","article-title":"Patient-centric interoperability and cybersecurity for cross-border healthcare","volume":"305","author":"Latorre","year":"2023","journal-title":"Stud Health Technol Inform"},{"key":"ref150","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1257\/pandp.20231029","article-title":"A solomonic solution to blockchain front-running","volume":"113","author":"Gans","year":"2023","journal-title":"AEA Pap Proc"},{"key":"ref151","first-page":"113","author":"Sarkar","year":"2021","journal-title":"Blockchain technology: applications and challenges"},{"key":"ref152","first-page":"357","author":"Kumar","year":"2023","journal-title":"Proceedings of the Evolution in Computational Intelligence"},{"key":"ref153","series-title":"2023 IEEE International Conference on Control, Electronics and Computer Technology (ICCECT)","first-page":"986","article-title":"Defense against sybil attack in blockchain based on improved consensus algorithm","author":"Wang","year":"2023 Apr 28\u201330"},{"key":"ref154","doi-asserted-by":"crossref","first-page":"34","DOI":"10.3390\/a16010034","article-title":"Sybil in the haystack: a comprehensive review of blockchain consensus mechanisms in search of strong sybil attack resistance","volume":"16","author":"Platt","year":"2023","journal-title":"Algorithms"},{"key":"ref155","series-title":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","first-page":"128","article-title":"A truth-inducing sybil resistant decentralized blockchain oracle","author":"Cai","year":"2020 Sep 28\u201330"},{"key":"ref156","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.jcss.2023.02.004","article-title":"Bankrupting Sybil despite churn","volume":"135","author":"Gupta","year":"2023","journal-title":"J Comput Syst Sci"},{"key":"ref157","first-page":"416","author":"Huang","year":"2019","journal-title":"Advances in computer science and information technology"},{"key":"ref158","doi-asserted-by":"crossref","first-page":"1536","DOI":"10.1109\/TPDS.2023.3253604","article-title":"Incentive mechanism design for joint resource allocation in blockchain-based federated learning","volume":"34","author":"Wang","year":"2023","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref159","series-title":"2023 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)","first-page":"881","article-title":"A review on double spending problem in blockchain","author":"Kumar","year":"2023 Apr 28\u201330"},{"key":"ref160","first-page":"455","author":"Zulfiqorov","year":"2022","journal-title":"Advances in information and communication"},{"key":"ref161","series-title":"2021 26th International Computer Conference, Computer Society of Iran (CSICC)","first-page":"1","article-title":"Analysis of incentive mechanism in repchain","author":"Hemati","year":"2021 Mar 3\u20134"},{"key":"ref162","doi-asserted-by":"crossref","first-page":"1451813","DOI":"10.1155\/2022\/1451813","article-title":"Eclipse attack detection for blockchain network layer based on deep feature extraction","volume":"2022","author":"Dai","year":"2022","journal-title":"Wirel Commun Mob Comput"},{"key":"ref163","doi-asserted-by":"crossref","first-page":"1659","DOI":"10.1109\/TNSM.2021.3069502","article-title":"Decentralized and lightweight approach to detect eclipse attacks on proof of work blockchains","volume":"18","author":"Alangot","year":"2021","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref164","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1109\/TCC.2021.3110965","article-title":"Cloud mining pool aided blockchain-enabled Internet of Things: an evolutionary game approach","volume":"11","author":"Mai","year":"2023","journal-title":"IEEE Trans Cloud Comput"},{"key":"ref165","series-title":"2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS)","first-page":"609","article-title":"ABC: an auction-based blockchain consensus-incentive mechanism","author":"Ai","year":"2020 Dec 2\u20134"},{"key":"ref166","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1561\/1900000075","article-title":"Consensus in data management: from distributed commit to blockchain","volume":"12","author":"Nawab","year":"2023","journal-title":"FNT Databases"},{"key":"ref167","series-title":"Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence","first-page":"158","article-title":"Election with bribe-effect uncertainty: a dichotomy result","author":"Chen","year":"2019 Aug 10\u201316"},{"key":"ref168","doi-asserted-by":"crossref","first-page":"1191","DOI":"10.1093\/rfs\/hhaa040","article-title":"Decentralized mining in centralized pools","volume":"34","author":"Cong","year":"2021","journal-title":"Rev Financ Stud"},{"key":"ref169","doi-asserted-by":"crossref","first-page":"9158","DOI":"10.1109\/JIOT.2020.3003700","article-title":"Decentralized caching framework toward edge network based on blockchain","volume":"7","author":"Liu","year":"2020","journal-title":"IEEE Internet Things J"},{"key":"ref170","series-title":"2019 IEEE 16th India Council International Conference (INDICON)","first-page":"1","article-title":"A multistage RSSI-based scheme for node compromise detection in IoT networks","author":"Saxena","year":"2019 Dec 13\u201315"},{"key":"ref171","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.37871\/jbres1993","article-title":"A unified framework for secure healthcare data sharing: integrating federated learning, blockchain, and quantum cryptography","volume":"5","author":"Ruvunangiza","year":"2024","journal-title":"J Biomed Res Environ Sci"},{"key":"ref172","series-title":"2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC)","first-page":"777","article-title":"Blockchain approaches for healthcare: a review and outlook","author":"Shaikh","year":"2024 Aug 7\u20139"},{"key":"ref173","series-title":"2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA)","first-page":"710","article-title":"EHR: patient electronic health records using blockchain security framework","author":"Jain"},{"key":"ref174","series-title":"2022 IEEE 28th International Conference on Parallel and Distributed Systems (ICPADS)","first-page":"266","article-title":"Blockchain data transaction with leakage tracing based on digital fingerprint","author":"Wang","year":"2023 Jan 10\u201312"},{"key":"ref175","doi-asserted-by":"crossref","first-page":"285","DOI":"10.3390\/fi13110285","article-title":"Distributed hybrid double-spending attack prevention mechanism for proof-of-work and proof-of-stake blockchain consensuses","volume":"13","author":"Akbar","year":"2021","journal-title":"Future Internet"},{"key":"ref176","series-title":"2019 Twelfth International Conference on Contemporary Computing (IC3)","first-page":"1","article-title":"Tampering detection of distributed databases using blockchain technology","author":"Rani","year":"2019 Aug 8\u201310"},{"key":"ref177","doi-asserted-by":"crossref","first-page":"8477","DOI":"10.3390\/app10238477","article-title":"Profitable double-spending attacks","volume":"10","author":"Jang","year":"2020","journal-title":"Appl Sci"},{"key":"ref178","series-title":"Proceedings of the 2022 4th International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA)","first-page":"608","article-title":"Digitalization and integration cloud solutions for healthcare information systems","author":"Gorvunova"},{"key":"ref179","first-page":"116","author":"Natraj","year":"2023","journal-title":"Proceedings of the Handbook of research on machine learning-enabled IoT for smart applications across industries"},{"key":"ref180","doi-asserted-by":"crossref","first-page":"4178","DOI":"10.1109\/ACCESS.2023.3349187","article-title":"Blockchain-IoT healthcare applications and trends: a review","volume":"12","author":"Al-Nbhany","year":"2024","journal-title":"IEEE Access"},{"key":"ref181","series-title":"2021 IEEE International Conference on Digital Health (ICDH)","first-page":"299","article-title":"Towards blockchain-based secure data management for remote patient monitoring","author":"Hossain Faruk","year":"2021 Sep 5\u201310"},{"key":"ref182","doi-asserted-by":"crossref","first-page":"4828","DOI":"10.3390\/s20174828","article-title":"Security in IoMT communications: a survey","volume":"20","author":"Koutras","year":"2020","journal-title":"Sensors"},{"key":"ref183","doi-asserted-by":"crossref","first-page":"13","DOI":"10.53022\/oarjst.2024.10.2.0044","article-title":"Evaluating the impact of blockchain technology in healthcare data management: A review of security, privacy, and patient outcomes","volume":"10","author":"Adeghe","year":"2024","journal-title":"Open Access Res J Sci Technol"},{"key":"ref184","doi-asserted-by":"crossref","first-page":"15900","DOI":"10.3390\/su142315900","article-title":"Replay-attack detection and prevention mechanism in industry 4.0 landscape for secure SECS\/GEM communications","volume":"14","author":"Al-Shareeda","year":"2022","journal-title":"Sustainability"},{"key":"ref185","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/978-3-030-32213-7_14","author":"Surridge","year":"2019","journal-title":"New trends in model and data engineering"},{"key":"ref186","doi-asserted-by":"crossref","first-page":"2454","DOI":"10.3390\/electronics12112454","article-title":"A blockchain-based incentive mechanism for sharing cyber threat intelligence","volume":"12","author":"Ma","year":"2023","journal-title":"Electronics"},{"key":"ref187","first-page":"1","article-title":"Testing and substantiation of zero trust devices with blockchain procedures for secured data transfer approach","volume":"14","author":"Selvarajan","year":"2024","journal-title":"Hum Centric Comput Inf Sci"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_61965\/TSP_CMC_61965.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:29:02Z","timestamp":1763342942000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/61004"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":187,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061965","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-12-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-07","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}