{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T20:09:49Z","timestamp":1770754189381,"version":"3.50.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030578046","type":"print"},{"value":"9783030578053","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_5","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"45-53","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Building an Ethereum-Based Decentralized Vehicle Rental System"],"prefix":"10.1007","author":[{"given":"N\u00e9stor","family":"Garc\u00eda-Moreno","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0859-5876","authenticated-orcid":false,"given":"Pino","family":"Caballero-Gil","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6910-6538","authenticated-orcid":false,"given":"C\u00e1ndido","family":"Caballero-Gil","sequence":"additional","affiliation":[]},{"given":"Jezabel","family":"Molina-Gil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Szabo, N.: Formalizing and securing relationships on public networks. First Monday 2(9) (1997). \nhttps:\/\/doi.org\/10.5210\/fm.v2i9.548","DOI":"10.5210\/fm.v2i9.548"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Dannen, C.: Introducing Ethereum and Solidity, vol. 1. Apress, Berkeley (2017)","DOI":"10.1007\/978-1-4842-2535-6_1"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Vujicic, D., Jagodic, D., Randic, S.: Blockchain technology, bitcoin, and Ethereum: a brief overview. In: 2018 17th International Symposium Infoteh-Jahorina, pp. 1\u20136 (2018)","DOI":"10.1109\/INFOTEH.2018.8345547"},{"key":"5_CR4","unstructured":"Lesavre, L., Varin, P., Mell, P., Davidson, M., Shook, J.: A taxonomic approach to understanding emerging blockchain identity management systems (2019). arXiv preprint \narXiv:1908.00929"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Bogner, A., Chanson, M., Meeuw, A.: A decentralised sharing app running a smart contract on the Ethereum blockchain. In: Proceedings of the 6th International Conference on the Internet of Things, pp. 177\u2013178 (2016)","DOI":"10.1145\/2991561.2998465"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Huh, S., Cho, S., Kim, S.: Managing IoT devices using blockchain platform. In: 2017 19th International Conference on Advanced Communication Technology, pp. 464\u2013467 (2017)","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"5_CR7","unstructured":"Niya, S. R., Sch\u00fcpfer, F., Bocek, T., Stiller, B.: A peer-to-peer purchase and rental smart contract-based application. IT\u2013Inf. Technol. 59, 9 (2017)"},{"key":"5_CR8","first-page":"10","volume":"6","author":"P Ren","year":"2019","unstructured":"Ren, P., Xu, J., Wang, Y., Ma, X.: Research and implementation of car rental alliance based on blockchain and internet of vehicles. J. Appl. Sci. 6, 10 (2019)","journal-title":"J. Appl. Sci."},{"key":"5_CR9","unstructured":"Truffle. \nhttps:\/\/www.trufflesuite.com\/\n\n. Accessed 28 Jan 2020"},{"key":"5_CR10","unstructured":"Web3. \nhttps:\/\/github.com\/ethereum\/web3.js\/\n\n. Accessed 28 Jan 2020"},{"key":"5_CR11","unstructured":"Solidity. \nhttps:\/\/solidity-es.readthedocs.io\/es\/latest\/\/\n\n. Accessed 28 Jan 2020"},{"key":"5_CR12","unstructured":"Ganache. \nhttps:\/\/www.trufflesuite.com\/ganache\n\n. Accessed 28 Jan 2020"},{"key":"5_CR13","unstructured":"Embark. \nhttps:\/\/framework.embarklabs.io\/\n\n. Accessed 28 Jan 2020"},{"key":"5_CR14","unstructured":"Serpent. \nhttps:\/\/github.com\/ethereum\/serpent\n\n. Accessed 28 Jan 2020"},{"key":"5_CR15","unstructured":"Metamask. \nhttps:\/\/metamask.io\/\n\n. Accessed 28 Jan 2020"},{"key":"5_CR16","unstructured":"HireGo. \nhttps:\/\/www.hirego.io\/\n\n. Accessed 28 Jan 2020"},{"key":"5_CR17","unstructured":"Darenta. \nhttps:\/\/www.darenta.ru\/en\/\n\n. Accessed 28 Jan 2020"},{"key":"5_CR18","unstructured":"Helbiz. \nhttps:\/\/helbiz.com\/\n\n. Accessed 28 Jan 2020"}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T11:08:25Z","timestamp":1599476905000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_5","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}