{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:50:29Z","timestamp":1771613429255,"version":"3.50.1"},"reference-count":80,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100002338","name":"Ministry of Education Project of China","doi-asserted-by":"publisher","award":["NGII20180408"],"award-info":[{"award-number":["NGII20180408"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100016335","name":"Jilin Normal University Graduate Research and Innovation Project of China","doi-asserted-by":"publisher","award":["201951"],"award-info":[{"award-number":["201951"]}],"id":[{"id":"10.13039\/501100016335","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3112608","type":"journal-article","created":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T20:53:42Z","timestamp":1631566422000},"page":"128965-128987","source":"Crossref","is-referenced-by-count":22,"title":["Application of Hyperledger in the Hospital Information Systems: A Survey"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5652-3044","authenticated-orcid":false,"given":"Zeqi","family":"Leng","sequence":"first","affiliation":[{"name":"College of Computer Science, Jilin Normal University, Siping, China"}]},{"given":"Zhenjiang","family":"Tan","sequence":"additional","affiliation":[{"name":"College of Computer Science, Jilin Normal University, Siping, China"}]},{"given":"Kunhao","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Jilin Normal University, Siping, China"}]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02346-8"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1144-x"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.122"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00273"},{"key":"ref76","first-page":"25","article-title":"Review of techniques for gene sequencing, annotation and comparative genomics","volume":"1","author":"yahaya","year":"2012","journal-title":"J Appl Int"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.biophys.37.092707.153558"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01761-1"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2905055.2905337"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/251364"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.4258\/hir.2020.26.1.3"},{"key":"ref78","first-page":"817","article-title":"Pathology image-sharing on social media: Recommendations for protecting privacy while motivating education","volume":"18","author":"crane","year":"2016","journal-title":"J AMA"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1148\/rg.2017160130"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2017.05.012"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI46756.2018.00152"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ITT48889.2019.9075088"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2196\/13598"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2020.104197"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.015354"},{"key":"ref35","article-title":"Blockchain-based framework for secured storage, sharing, and querying of electronic healthcare records","volume":"2021","author":"kaur","year":"0","journal-title":"Concurrency Comput Pract Exper"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.23919\/ICOMBI48604.2020.9203442"},{"key":"ref60","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-020-78888-w","article-title":"Multimodal fusion with deep neural networks for leveraging CT imaging and electronic health record: A case-study in pulmonary embolism detection","volume":"10","author":"huang","year":"2020","journal-title":"Sci Rep"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1177\/1460458218769699"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-020-00341-z"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/EMPDP.2005.7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-36745-x"},{"key":"ref64","first-page":"1","article-title":"Know your enemy: Characteristics of cyber-attacks on medical imaging devices","author":"mahler","year":"2017","journal-title":"Proc Radiol Soc North Amer (RSNA)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/app10093330"},{"key":"ref65","article-title":"Dynamic adjustment of image compression for high resolution live medical image sharing","author":"hiriyannaiah","year":"2014"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/asi3010008"},{"key":"ref29","first-page":"1","article-title":"Inferring multimodal latent topics from electronic health records","volume":"11","author":"li","year":"2020","journal-title":"Nature Commun"},{"key":"ref67","first-page":"62","article-title":"Medical image sharing system using hyperledger fabric blockchain","author":"seo","year":"2020","journal-title":"Proc 22nd Int Conf Adv Commun Technol (ICACT)"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.9728\/dcs.2019.20.11.2177"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2018.8782417"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2018.05.004"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-5056(03)00131-X"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2020.2978628"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8050505"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2196\/10163"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9050852"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpharm.2021.120235"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/AQTR.2018.8402709"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23404-1_9"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN48656.2020.9016624"},{"key":"ref51","first-page":"95","article-title":"Secure healthcare data management and sharing platform based on hyperledger fabric","volume":"21","author":"choi","year":"2020","journal-title":"J Internet Comput Services"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/DEPCOS-RELCOMEX.2006.3"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2019.8763849"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.3390\/s20082195"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.3390\/s20123604"},{"key":"ref55","first-page":"2","article-title":"DMMS: A decentralized blockchain ledger for the management of medication histories","author":"li","year":"2019","journal-title":"Blockchain in Healthcare Today"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3377644.3377668"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917976"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICTA.2018.8541296"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102615"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968492"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12678-9_19"},{"key":"ref12","author":"wager","year":"2017","journal-title":"Health Care Information Systems A Practical Approach for Health Care Management"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0100588"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/nature.2017.23051"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-6736(00)05085-6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1038\/nm0410-366"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/nbt0707-707"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3309074.3309104"},{"key":"ref19","first-page":"1572","article-title":"Anti counterfeiting in pharmaceutical supply chain by establishing proof of ownership","author":"raj","year":"2019","journal-title":"Proc IEEE Region 10 Conf (TENCON)"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3049325"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2019.8858468"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.101050"},{"key":"ref6","author":"kennedy","year":"2016","journal-title":"Go in Action"},{"key":"ref5","first-page":"2","article-title":"Hyperledger: An industrial approach to blockchain","author":"aggarwal","year":"2020","journal-title":"Hyperledger"},{"key":"ref8","author":"blummer","year":"2018","journal-title":"An introduction to Hyperledger"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102538"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8040467"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3390\/s20226587"},{"key":"ref45","article-title":"Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications","volume":"56","author":"bhavin","year":"2021","journal-title":"J Inf Secur Appl"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00015"},{"key":"ref47","first-page":"450","article-title":"Preserving Patient&#x2019;s privacy using proxy re-encryption in permissioned blockchain","author":"meena","year":"2019","journal-title":"Proc 6th Int Conf Internet Things Syst Manage Secur (IOTSMS)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23813-1_5"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.102975"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-7345-3_39"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2018.00008"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09536653.pdf?arnumber=9536653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T20:43:11Z","timestamp":1662669791000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9536653\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":80,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3112608","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}