{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T17:17:03Z","timestamp":1763572623340,"version":"3.40.3"},"publisher-location":"Cham","reference-count":52,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030940287"},{"type":"electronic","value":"9783030940294"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-94029-4_11","type":"book-chapter","created":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T03:02:48Z","timestamp":1641870168000},"page":"145-163","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Privacy-Preserving Logistics Information System with Traceability"],"prefix":"10.1007","author":[{"given":"Quanru","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jinguang","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jiguo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Liquan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Song","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,11]]},"reference":[{"key":"11_CR1","unstructured":"Amazon. https:\/\/www.amazon.cn"},{"key":"11_CR2","unstructured":"Taobao. https:\/\/www.taobao.com"},{"key":"11_CR3","unstructured":"Angelo, D.C., Vincenzo, I.: JPBC: Java pairing based cryptography. In: ISCC 2011, pp. 850\u2013855. IEEE (2011)"},{"issue":"4","key":"11_CR4","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1093\/comjnl\/bxu037","volume":"58","author":"MR Asaar","year":"2015","unstructured":"Asaar, M.R., Salmasizadeh, M., Susil, W.: An identity-based multi-proxy multi-signature scheme without bilinear pairings and its variants. Comput. J. 58(4), 1021\u20131039 (2015)","journal-title":"Comput. J."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Bagherzandi, A., Cheon, J.H., Jarecki, S.: Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. In: CCS 2008, pp. 449\u2013458. ACM (2008)","DOI":"10.1145\/1455770.1455827"},{"issue":"1","key":"11_CR6","first-page":"71","volume":"15","author":"EJ Bardi","year":"1994","unstructured":"Bardi, E.J., Raghunathan, T.S., Bagchi, P.K.: Logistics information systems: the strategic role of top management. J. Bus. Logist. 15(1), 71\u201385 (1994)","journal-title":"J. Bus. Logist."},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: CCS 2006, pp. 390\u2013399. ACM (2006)","DOI":"10.1145\/1180405.1180453"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-36288-6_3","volume-title":"Public Key Cryptography \u2014 PKC 2003","author":"A Boldyreva","year":"2003","unstructured":"Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 31\u201346. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36288-6_3"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/978-3-030-03329-3_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2018","author":"D Boneh","year":"2018","unstructured":"Boneh, D., Drijvers, M., Neven, G.: Compact multi-signatures for smaller blockchains. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11273, pp. 435\u2013464. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03329-3_15"},{"issue":"10","key":"11_CR10","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030\u20131044 (1985)","journal-title":"Commun. ACM"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/3-540-47721-7_10","volume-title":"Advances in Cryptology \u2014 CRYPTO 1986","author":"D Chaum","year":"1987","unstructured":"Chaum, D., Evertse, J.-H.: A secure and privacy-protecting protocol for transmitting personal information between organizations. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 118\u2013167. Springer, Heidelberg (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_10"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/BFb0032362","volume-title":"Cryptography: Policy and Algorithms","author":"L Chen","year":"1996","unstructured":"Chen, L.: Access with pseudonyms. In: Dawson, E., Goli\u0107, J. (eds.) CPA 1995. LNCS, vol. 1029, pp. 232\u2013243. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/BFb0032362"},{"key":"11_CR13","unstructured":"Chen, Q., Han, J., Li, J., Chen, L., Li, S.: A privacy-preserving logistics information system with traceability (2021). https:\/\/arxiv.org\/abs\/2109.05216"},{"key":"11_CR14","unstructured":"Chrisos, M.: Pseudonymization Techniques: How to Protect Your Data (2019). https:\/\/www.techfunnel.com\/information-technology\/pseudonymization-techniques-how-to-protect-your-data\/"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Christin, N., Yanagihara, S.S., Kamataki, K.: Dissecting one click frauds. In: CCS 2010, pp. 15\u201326. ACM (2010)","DOI":"10.1145\/1866307.1866310"},{"issue":"10","key":"11_CR16","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1108\/09600030010351264","volume":"30","author":"DJ Closs","year":"2000","unstructured":"Closs, D.J., Xu, K.: Logistics information technology practice in manufacturing and merchandising firms - an international benchmarking study versus world class logistics firms. Int. J. Phys. Distrib. Logist. Manag. 30(10), 869\u2013886 (2000)","journal-title":"Int. J. Phys. Distrib. Logist. Manag."},{"issue":"1","key":"11_CR17","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/TASE.2016.2600527","volume":"15","author":"N Correll","year":"2018","unstructured":"Correll, N., et al.: Analysis and observations from the first Amazon picking challenge. IEEE Trans. Autom. Sci. Eng. 15(1), 172\u2013188 (2018)","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"issue":"1","key":"11_CR18","first-page":"1","volume":"2018","author":"Q Gao","year":"2018","unstructured":"Gao, Q., Zhang, J., Ma, J., Yang, C., Guo, J., Miao, Y.: LIP-PA: a logistics information privacy protection scheme with position and attribute-based access control on mobile devices. Wirel. Commun. Mob. Comput. 2018(1), 1\u201314 (2018)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"1","key":"11_CR19","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1137\/0406010","volume":"6","author":"DM Gordon","year":"1993","unstructured":"Gordon, D.M.: Discrete logarithms in GF(P) using the number field sieve. SIAM J. Discrete Math. 6(1), 124\u2013138 (1993)","journal-title":"SIAM J. Discrete Math."},{"issue":"1","key":"11_CR20","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1613\/jair.3945","volume":"47","author":"T Grinshpoun","year":"2013","unstructured":"Grinshpoun, T., Grubshtein, A., Zivan, R., Netzer, A., Meisels, A.: Asymmetric distributed constraint optimization problems. J. Artif. Intell. Res. 47(1), 613\u2013647 (2013)","journal-title":"J. Artif. Intell. Res."},{"issue":"1","key":"11_CR21","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1109\/TIFS.2019.2919926","volume":"15","author":"J Han","year":"2020","unstructured":"Han, J., Chen, L., Schneider, S., Treharne, H., Wesemeyer, S., Wilson, N.: Anonymous single sign-on with proxy re-verification. IEEE Trans. Inf. Forensics Secur. 15(1), 223\u2013236 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/978-3-540-89255-7_19","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"G Hanaoka","year":"2008","unstructured":"Hanaoka, G., Kurosawa, K.: Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 308\u2013325. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-89255-7_19"},{"key":"11_CR23","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-0-387-34873-5_11","volume-title":"Information Security\u2014the Next Decade","author":"P Horster","year":"1995","unstructured":"Horster, P., Michels, M., Petersen, H.: Meta-multisignature schemes based on the discrete logarithm problem. In: Information Security\u2014the Next Decade. IAICT, pp. 128\u2013142. Springer, Boston (1995). https:\/\/doi.org\/10.1007\/978-0-387-34873-5_11"},{"issue":"1","key":"11_CR24","first-page":"1","volume":"71","author":"K Itakura","year":"1983","unstructured":"Itakura, K., Nakamura, K.: A public-key cryptosystem suitable for digital multisignatures. NEC Res. Dev. 71(1), 1\u20138 (1983)","journal-title":"NEC Res. Dev."},{"issue":"8","key":"11_CR25","doi-asserted-by":"publisher","first-page":"2627","DOI":"10.1109\/TITS.2017.2764095","volume":"19","author":"J Kang","year":"2018","unstructured":"Kang, J., Yu, R., Huang, X., Zhang, Y.: Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans. Intell. Transp. Syst. 19(8), 2627\u20132637 (2018)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"11_CR26","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.dss.2004.01.006","volume":"40","author":"DJ Kim","year":"2005","unstructured":"Kim, D.J., Song, Y.I., Braynov, S.B., Rao, H.R.: A multidimensional trust formation model in B-to-C e-commerce: a conceptual framework and content analyses of academia\/practitioner perspectives. Decis. Support Syst. 40(2), 143\u2013165 (2005)","journal-title":"Decis. Support Syst."},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Korth, B., Schwede, C., Zajac, M.: Simulation-ready digital twin for realtime management of logistics systems. In: IEEE Big Data 2018, pp. 4194\u20134201. IEEE (2018)","DOI":"10.1109\/BigData.2018.8622160"},{"issue":"4","key":"11_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5325\/transportationj.44.4.0001","volume":"44","author":"K Lai","year":"2005","unstructured":"Lai, K., Ngai, E., Cheng, T.: Information technology adoption in Hong Kong\u2019s logistics industry. Transp. J. 44(4), 1\u20139 (2005)","journal-title":"Transp. J."},{"issue":"11","key":"11_CR29","doi-asserted-by":"publisher","first-page":"3051","DOI":"10.1109\/TC.2015.2401032","volume":"64","author":"F Liu","year":"2015","unstructured":"Liu, F., Shu, P., Lui, J.C.S.: $$AppATP$$: an energy conserving adaptive mobile-cloud transmission protocol. IEEE Trans. Comput. 64(11), 3051\u20133063 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Liu, S., Wang, J.: A security-enhanced express delivery system based on NFC. In: ICSICT 2016, pp. 1534\u20131536. IEEE (2016)","DOI":"10.1109\/ICSICT.2016.7998793"},{"key":"11_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-540-24676-3_5","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"A Lysyanskaya","year":"2004","unstructured":"Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential aggregate signatures from trapdoor permutations. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 74\u201390. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_5"},{"key":"11_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/3-540-46513-8_14","volume-title":"Selected Areas in Cryptography","author":"A Lysyanskaya","year":"2000","unstructured":"Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H., Adams, C. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184\u2013199. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-46513-8_14"},{"key":"11_CR33","unstructured":"L\u00e9aut\u00e9, T., Faltings, B.: Coordinating logistics operations with privacy guarantees. In: IJCAI 2011, pp. 2482\u20132487. Morgan Kaufmann (2011)"},{"issue":"1","key":"11_CR34","doi-asserted-by":"publisher","first-page":"33","DOI":"10.5937\/vojtehg1001033A","volume":"58","author":"A Marko","year":"2010","unstructured":"Marko, A., Marjan, M., Vlada, S.: Logistics information system. Vojnotehnicki glasnik 58(1), 33\u201361 (2010)","journal-title":"Vojnotehnicki glasnik"},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"Micali, S., Ohta, K., Reyzin, L.: Accountable-subgroup multisignatures: extended abstract. In: CCS 2001, pp. 245\u2013254. ACM (2001)","DOI":"10.1145\/501983.502017"},{"key":"11_CR36","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: S&P 2009, pp. 173\u2013187. IEEE (2009)","DOI":"10.1109\/SP.2009.22"},{"issue":"3","key":"11_CR37","doi-asserted-by":"publisher","first-page":"1803","DOI":"10.1109\/TIT.2010.2091434","volume":"57","author":"G Neven","year":"2011","unstructured":"Neven, G.: Efficient sequential aggregate signed data. IEEE Trans. Inf. Theory 57(3), 1803\u20131815 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"11_CR38","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.ijpe.2007.05.018","volume":"113","author":"E Ngai","year":"2008","unstructured":"Ngai, E., Lai, K.H., Cheng, T.: Logistics information systems: the Hong Kong experience. Int. J. Prod. Econ. 113(1), 223\u2013234 (2008)","journal-title":"Int. J. Prod. Econ."},{"key":"11_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-57332-1_11","volume-title":"Advances in Cryptology \u2014 ASIACRYPT \u201991","author":"K Ohta","year":"1993","unstructured":"Ohta, K., Okamoto, T.: A digital multisignature scheme based on the Fiat-Shamir scheme. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds.) ASIACRYPT 1991. LNCS, vol. 739, pp. 139\u2013148. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/3-540-57332-1_11"},{"key":"11_CR40","unstructured":"Ohta, K., Okamoto, T.: Multisignature schemes secure against active insider attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E82-A(1), 21\u201331 (1999)"},{"issue":"4","key":"11_CR41","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1145\/48012.48246","volume":"6","author":"T Okamoto","year":"1988","unstructured":"Okamoto, T.: A digital multisignature scheme using bijective public-key cryptosystems. ACM Trans. Comput. Syst. 6(4), 432\u2013441 (1988)","journal-title":"ACM Trans. Comput. Syst."},{"key":"11_CR42","doi-asserted-by":"crossref","unstructured":"Qi, H., Chenjie, D., Yingbiao, Y., Lei, L.: A new express management system based on encrypted QR code. In: ICICTA 2015, pp. 53\u201356. IEEE (2015)","DOI":"10.1109\/ICICTA.2015.22"},{"key":"11_CR43","doi-asserted-by":"crossref","unstructured":"Qian, J., Li, X., Zhang, C., Chen, L.: De-anonymizing social networks and inferring private attributes using knowledge graphs. In: INFOCOM 2016, pp. 1\u20139. IEEE (2016)","DOI":"10.1109\/INFOCOM.2016.7524578"},{"key":"11_CR44","doi-asserted-by":"crossref","unstructured":"Qu, Z., He, P., Hou, L.: Studies on internet real-name system and network action surveillance system. In: EDT 2010, pp. 469\u2013472. IEEE (2010)","DOI":"10.1109\/EDT.2010.5496530"},{"issue":"1","key":"11_CR45","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSEC.2019.2953324","volume":"18","author":"W Stallings","year":"2020","unstructured":"Stallings, W.: Handling of personal information and deidentified, aggregated, and pseudonymized information under the California consumer privacy act. IEEE Secur. Priv. 18(1), 61\u201364 (2020)","journal-title":"IEEE Secur. Priv."},{"issue":"4","key":"11_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compag.2014.08.015","volume":"109","author":"L Tarjan","year":"2014","unstructured":"Tarjan, L., Senk, I., Tegeltija, S., Stankovski, S., Ostojic, G.: A readability analysis for QR code application in a traceability system. Comput. Electron. Agric. 109(4), 1\u201311 (2014)","journal-title":"Comput. Electron. Agric."},{"issue":"3\u20134","key":"11_CR47","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s12243-012-0315-x","volume":"68","author":"N Tiwari","year":"2013","unstructured":"Tiwari, N., Padhye, S., He, D.: Efficient ID-based multiproxy multisignature without bilinear maps in ROM. Ann. Telecommun. 68(3\u20134), 231\u2013237 (2013). https:\/\/doi.org\/10.1007\/s12243-012-0315-x","journal-title":"Ann. Telecommun."},{"issue":"2","key":"11_CR48","first-page":"555","volume":"31","author":"Q Wei","year":"2014","unstructured":"Wei, Q., Li, X.: Express information protection application based on K-anonymity. Appl. Res. Comput. 31(2), 555\u2013567 (2014)","journal-title":"Appl. Res. Comput."},{"issue":"7","key":"11_CR49","first-page":"58","volume":"40","author":"Q Wei","year":"2014","unstructured":"Wei, Q., Wang, C., Li, X.: Express information privacy protection application based on RSA. Appl. Electron. Tech. 40(7), 58\u201360 (2014)","journal-title":"Appl. Electron. Tech."},{"key":"11_CR50","doi-asserted-by":"crossref","unstructured":"Xu, F.J., Tan, C.J., Tong, F.C.: Auto-ID enabled tracking and tracing data sharing over dynamic B2B and B2G relationships. In: RFID-TA 2011, pp. 394\u2013401. IEEE (2011)","DOI":"10.1109\/RFID-TA.2011.6068668"},{"issue":"2","key":"11_CR51","doi-asserted-by":"publisher","first-page":"38","DOI":"10.4018\/IJAPUC.2016040103","volume":"8","author":"L Ye","year":"2016","unstructured":"Ye, L., Wang, Y., Chen, J.: Research on the intelligent warehouse management system based on near field communication (NFC) technology. Int. J. Adv. Pervasive Ubiquit. Comput. 8(2), 38\u201355 (2016)","journal-title":"Int. J. Adv. Pervasive Ubiquit. Comput."},{"key":"11_CR52","doi-asserted-by":"crossref","unstructured":"Yong, L., Jing, P., Ma, B., Bo, Y.: The analysis of logistic bottleneck of Taobao.com in C2C model and its countermeasures. In: ICEE 2010, pp. 5537\u20135539. IEEE (2010)","DOI":"10.1109\/ICEE.2010.1386"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-94029-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T01:06:18Z","timestamp":1726448778000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-94029-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030940287","9783030940294"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-94029-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"11 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/css2021.compute.dtu.dk\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}