{"id":"https://openalex.org/W2983843057","doi":"https://doi.org/10.1145/3362744.3363346","title":"EngraveChain","display_name":"EngraveChain","publication_year":2019,"publication_date":"2019-10-31","ids":{"openalex":"https://openalex.org/W2983843057","doi":"https://doi.org/10.1145/3362744.3363346","mag":"2983843057"},"language":"en","primary_location":{"id":"doi:10.1145/3362744.3363346","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3362744.3363346","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090046099","display_name":"Louis Shekhtman","orcid":"https://orcid.org/0000-0001-5273-8363"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Louis Shekhtman","raw_affiliation_strings":["Nokia Bell Labs, Kfar Saba, Israel"],"affiliations":[{"raw_affiliation_string":"Nokia Bell Labs, Kfar Saba, Israel","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023674259","display_name":"Erez Waisbard","orcid":"https://orcid.org/0000-0001-5634-5436"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Erez Waisbard","raw_affiliation_strings":["Nokia Bell Labs, Kfar Saba, Israel"],"affiliations":[{"raw_affiliation_string":"Nokia Bell Labs, Kfar Saba, Israel","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5090046099"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.7131,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.92219523,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"8","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7777413129806519},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7722977995872498},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6220035552978516},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5808831453323364},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.5384706258773804},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4749981164932251},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42123302817344666},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38003742694854736}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7777413129806519},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7722977995872498},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6220035552978516},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5808831453323364},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.5384706258773804},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4749981164932251},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42123302817344666},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38003742694854736},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3362744.3363346","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3362744.3363346","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1556212265","https://openalex.org/W1987593503","https://openalex.org/W1993586921","https://openalex.org/W2045688835","https://openalex.org/W2096433989","https://openalex.org/W2126087831","https://openalex.org/W2520906649","https://openalex.org/W2544710688","https://openalex.org/W2561429595","https://openalex.org/W2795807997","https://openalex.org/W3108602244","https://openalex.org/W4232836212","https://openalex.org/W4248175462","https://openalex.org/W6678832241"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W4386732777","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4304136894","https://openalex.org/W2989851257","https://openalex.org/W2799059781"],"abstract_inverted_index":{"A":[0],"reliable":[1],"log":[2,25,63,94],"system":[3,21,64,110],"is":[4,22],"a":[5,15,20,31,35,41,61,69,92],"prerequisite":[6],"for":[7,119],"security":[8,99],"applications.":[9],"One":[10],"of":[11,68,103],"the":[12,24,66,73,82,98,116],"first":[13],"actions":[14],"hacker":[16],"takes":[17],"upon":[18],"penetrating":[19],"altering":[23],"files.":[26],"Maintaining":[27],"redundant":[28],"copies":[29],"in":[30,34,53],"distributed":[32,78],"manner":[33],"Byzantine":[36],"setting":[37],"has":[38,46],"always":[39],"been":[40],"challenging":[42],"task,":[43],"however":[44],"it":[45],"recently":[47],"become":[48],"simpler":[49],"given":[50],"recent":[51],"advances":[52],"blockchain":[54,83],"technologies.":[55],"In":[56],"this":[57],"work,":[58],"we":[59,107],"present":[60],"tamper-resistant":[62],"through":[65],"use":[67,121],"blockchain.":[70],"We":[71,96],"leverage":[72],"immutable":[74],"write":[75],"action":[76],"and":[77,84,100,114],"storage":[79],"provided":[80],"by":[81],"add":[85],"an":[86],"additional":[87],"encryption":[88],"layer":[89],"to":[90],"develop":[91],"secure":[93],"system.":[95],"assess":[97],"privacy":[101],"aspects":[102],"our":[104,109],"solution.":[105],"Finally,":[106],"implement":[108],"over":[111],"Hyperledger":[112],"Fabric":[113],"demonstrate":[115],"system's":[117],"value":[118],"several":[120],"cases.":[122]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2019-11-22T00:00:00"}
