{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T04:21:21Z","timestamp":1728102081256},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100005046","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62325209","62272496"],"id":[{"id":"10.13039\/501100005046","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Yunnan Key Laboratory of Blockchain Application Technology","award":["202105AG070005"]},{"name":"Project of Science and Technology Major Project of Yunnan Province","award":["202303AC100001"]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities, Sun Yat-sen University","doi-asserted-by":"publisher","award":["23lgbj019"],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2024A1515012360"],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3398535","type":"journal-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T17:31:45Z","timestamp":1715189505000},"page":"9012-9025","source":"Crossref","is-referenced-by-count":0,"title":["Fair and Privacy-Preserved Data Trading Protocol by Exploiting Blockchain"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"http:\/\/orcid.org\/0009-0001-3531-1576","authenticated-orcid":false,"given":"Parhat","family":"Abla","sequence":"first","affiliation":[{"name":"School of Software, South China Normal University, Foshan, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5348-442X","authenticated-orcid":false,"given":"Taotao","family":"Li","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":false,"given":"Debiao","family":"He","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7035-6446","authenticated-orcid":false,"given":"Huawei","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]},{"given":"Songsen","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Software, South China Normal University, Foshan, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8561-5092","authenticated-orcid":false,"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Informatics, University of Oslo, Oslo, Norway"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3372136"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2844341"},{"issue":"10","key":"ref3","first-page":"60","article-title":"Big data: The management revolution","volume":"90","author":"McAfee","year":"2012","journal-title":"Harvard Bus. Rev."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2021.125834"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/232335.232338"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502669"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266426"},{"key":"ref8","first-page":"25","article-title":"Probabilistic non-repudiation without trusted third party","volume-title":"Proc. 2nd Conf. Secur. Commun. Netw.","volume":"99","author":"Markowitch"},{"key":"ref9","first-page":"1","article-title":"A new approach to enforcing non-repudiation of receipt","author":"Mitsianis","year":"2001","journal-title":"Manuscript"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2928256"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796857"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162759"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxab050"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.11.028"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243857"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484558"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2016.15"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70578-1_6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2823705"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2897133"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2021.3105099"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-018-9781-0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-023-00530-7"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS54860.2022.00030"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"volume-title":"Falcon: Fast-fourier Lattice-Based Compact Signatures Over NTRU","year":"2018","author":"Fouque","key":"ref30"},{"volume-title":"Hawk: A Signature Scheme Inspired by the Lattice Isomorphism Problem","year":"2023","author":"Bos","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_31"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2018.00032"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.197"},{"volume-title":"Sha-3 Standard: Permutation-Based Hash and Extendable-Output Functions","year":"2015","author":"Dworkin","key":"ref35"},{"volume-title":"Ethereum Sepolia Testnet","year":"2023","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1201\/9780429466335"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559364"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/10319981\/10522763.pdf?arnumber=10522763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T17:34:48Z","timestamp":1728063288000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10522763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3398535","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2024]]}}}