{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:34:34Z","timestamp":1725986074317},"reference-count":53,"publisher":"Informa UK Limited","issue":"4","license":[{"start":{"date-parts":[[2021,6,25]],"date-time":"2021-06-25T00:00:00Z","timestamp":1624579200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information and Telecommunication"],"published-print":{"date-parts":[[2021,10,2]]},"DOI":"10.1080\/24751839.2021.1941574","type":"journal-article","created":{"date-parts":[[2021,6,25]],"date-time":"2021-06-25T15:36:37Z","timestamp":1624635397000},"page":"440-459","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":4,"title":["Sharing secured data on peer-to-peer applications using attribute-based encryption"],"prefix":"10.1080","volume":"5","author":[{"given":"Nhan Tam","family":"Dang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, International University\u2013Vietnam National University of HCMC, Ho Chi Minh City, Vietnam"}]},{"given":"Ha Manh","family":"Tran","sequence":"additional","affiliation":[{"name":"Department of Information Technology, HCMC University of Foreign Languages\u2013Information Technology, Ho Chi Minh City, Vietnam"}]},{"given":"Sinh Van","family":"Nguyen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, International University\u2013Vietnam National University of HCMC, Ho Chi Minh City, Vietnam"}]},{"given":"Marcin","family":"Maleszka","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Wroclaw University of Science and Technology, Wroclaw, Poland"}]},{"given":"Hai-Duong","family":"Le","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, International University\u2013Vietnam National University of HCMC, Ho Chi Minh City, Vietnam"}]}],"member":"301","published-online":{"date-parts":[[2021,6,25]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1109\/WorldS4.2018.8611593"},{"key":"CIT0002","doi-asserted-by":"crossref","unstructured":"Aggarwal D., Brennen G. K., Lee T., Santha M. & Tomamichel M. (2017). Quantum attacks on Bitcoin, and how to protect against them. arXiv preprint arXiv:1710.10377.","DOI":"10.5195\/ledger.2018.127"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_17"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"key":"CIT0005","doi-asserted-by":"crossref","unstructured":"Alharby M. & van Moorsel A. (2020). Blocksim: An extensible simulation tool for blockchain systems. arXiv preprint arXiv:2004.13438.","DOI":"10.3389\/fbloc.2020.00028"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2017.9301"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054122"},{"key":"CIT0009","unstructured":"Buterin V. (2014). Ethereum white paper: A next generation smart contract & decentralized application platform. First version 53."},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"CIT0011","unstructured":"Cohen B. (2003). Incentives build robustness in BitTorrent. In Proc. Workshop on Economics of Peer-to-Peer Systems (Vol. 6, pp. 68\u201372). https:\/\/www.bittorrent.org\/bittorrentecon.pdf"},{"key":"CIT0012","unstructured":"Craigslist Company (1995). Retrieved August 2020 from https:\/\/www.craigslist.org\/"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-015-0313-x"},{"key":"CIT0014","unstructured":"eBay Company (1995). Retrieved August 2020 from https:\/\/www.ebay.org\/"},{"key":"CIT0015","volume-title":"Centralized role-based access control for storage servers","author":"Flank J. H.","year":"2011"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.5220\/0006962102230227"},{"key":"CIT0017","first-page":"309","volume":"2006","author":"Goyal V. K.","year":"2006","journal-title":"IACR Cryptology ePrint Archive"},{"key":"CIT0018","unstructured":"Greenfeld K. T. & Taro K. (2000). Meet the napster. Time Magazine, p. 2."},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2977646"},{"issue":"3","key":"CIT0020","first-page":"665","volume":"10","author":"Han J.","year":"2014","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2378788"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00151"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-4370-2_2"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.17781\/P002462"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1109\/MP.2004.1289996"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.4018\/IJEGR.2018010103"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.2801546"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533094"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89754-5_33"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516683"},{"key":"CIT0031","unstructured":"Nakamoto S. (2008). Bitcoin: A peer-to-peer electronic cash system. Bitcoin. https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2405905"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2959044"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1109\/ICASTECH.2014.7068067"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyaa025"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98557-2_21"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2014.6888687"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2017.8384164"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_19"},{"key":"CIT0041","doi-asserted-by":"crossref","unstructured":"Sahai A. & Waters B. (2004). Fuzzy identity based encryption. IACR Cryptology Eprint Archive.","DOI":"10.1007\/11426639_27"},{"key":"CIT0042","volume-title":"Storing encrypted objects","author":"Shankar U.","year":"2013"},{"key":"CIT0043","unstructured":"Specter M. A., Koppel J. & Weitzner D. (2020). The ballot is busted before the blockchain: A security analysis of voatz, the first internet voting application used in us federal elections. In 29th USENIX Security Symposium (USENIX Security 20) (pp. 1535\u20131553). USENIX."},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2011.560923"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2011.560923"},{"issue":"6","key":"CIT0046","first-page":"444","volume":"16","author":"Wang Y.","year":"2014","journal-title":"International Journal of Network Security"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0994-6"},{"key":"CIT0048","unstructured":"Wu Y. (2017). An e-voting system based on blockchain and ring signature [Master]. University of Birmingham]."},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-018-00699-y"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99136-8_20"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755720"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-9019-8"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.17265\/2159-5313\/2016.09.003"}],"container-title":["Journal of Information and Telecommunication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/24751839.2021.1941574","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T13:51:23Z","timestamp":1637070683000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2021.1941574"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,25]]},"references-count":53,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,10,2]]}},"alternative-id":["10.1080\/24751839.2021.1941574"],"URL":"https:\/\/doi.org\/10.1080\/24751839.2021.1941574","relation":{},"ISSN":["2475-1839","2475-1847"],"issn-type":[{"value":"2475-1839","type":"print"},{"value":"2475-1847","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,25]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-04-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}