{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T09:19:52Z","timestamp":1758705592301,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031354144"},{"type":"electronic","value":"9783031354151"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35415-1_1","type":"book-chapter","created":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T06:03:15Z","timestamp":1695794595000},"page":"3-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Blood and\u00a0Blood Products Management System Based on\u00a0Blockchain, and\u00a0NFT Technologies"],"prefix":"10.1007","author":[{"given":"Hong Khanh","family":"Vo","sequence":"first","affiliation":[]},{"given":"Bao Q.","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Hieu M.","family":"Doan","sequence":"additional","affiliation":[]},{"given":"Kiet T.","family":"Le","sequence":"additional","affiliation":[]},{"given":"Nguyen D. P.","family":"Trong","sequence":"additional","affiliation":[]},{"given":"Hieu V.","family":"Le","sequence":"additional","affiliation":[]},{"given":"Loc V. C.","family":"Phu","sequence":"additional","affiliation":[]},{"given":"Duy N. T.","family":"Quoc","sequence":"additional","affiliation":[]},{"given":"Nguyen H.","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Anh N.","family":"The","sequence":"additional","affiliation":[]},{"given":"Huynh H.","family":"Nghia","sequence":"additional","affiliation":[]},{"given":"Phuc N.","family":"Trong","sequence":"additional","affiliation":[]},{"given":"Khoa T.","family":"Dang","sequence":"additional","affiliation":[]},{"given":"Khiem H.","family":"Gia","sequence":"additional","affiliation":[]},{"given":"Bang L.","family":"Khanh","sequence":"additional","affiliation":[]},{"given":"Ngan N. T.","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Luong Hoang","family":"Huong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,28]]},"reference":[{"issue":"2","key":"1_CR1","first-page":"83","volume":"19","author":"EJ Baek","year":"2008","unstructured":"Baek, E.J., Kim, H.O., Kim, S., Park, Q.E., Oh, D.J.: The trends for nationwide blood collection and the supply of blood in Korea during 2002\u20132006. Korean J. Blood Transfus. 19(2), 83\u201390 (2008)","journal-title":"Korean J. Blood Transfus."},{"key":"1_CR2","series-title":"Contributions to Management Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-030-29739-8_4","volume-title":"Digital Business Strategies in Blockchain Ecosystems","author":"M \u00c7a\u011fl\u0131yangil","year":"2020","unstructured":"\u00c7a\u011fl\u0131yangil, M., Erdem, S., \u00d6zda\u011fo\u011flu, G.: A blockchain based framework for blood distribution. In: Hacioglu, U. (ed.) Digital Business Strategies in Blockchain Ecosystems. CMS, pp. 63\u201382. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-29739-8_4"},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"190S","DOI":"10.1111\/j.1537-2995.2007.01384.x","volume":"47","author":"J Chapman","year":"2007","unstructured":"Chapman, J.: Unlocking the essentials of effective blood inventory management. Transfusion 47, 190S-196S (2007)","journal-title":"Transfusion"},{"issue":"9","key":"1_CR4","doi-asserted-by":"publisher","first-page":"1889","DOI":"10.1111\/j.1537-2995.2011.03545.x","volume":"52","author":"D Chmielewski","year":"2012","unstructured":"Chmielewski, D., Bove, L.L., Lei, J., Neville, B., Nagpal, A.: A new perspective on the incentive-blood donation relationship: partnership, congruency, and affirmation of competence. Transfusion 52(9), 1889\u20131900 (2012)","journal-title":"Transfusion"},{"issue":"1","key":"1_CR5","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1080\/00223980.1947.9917316","volume":"23","author":"E Cooper","year":"1947","unstructured":"Cooper, E., Jahoda, M.: The evasion of propaganda: how prejudiced people respond to anti-prejudice propaganda. J. Psychol. 23(1), 15\u201325 (1947)","journal-title":"J. Psychol."},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Duong-Trung, N., et al.: Multi-sessions mechanism for decentralized cash on delivery system. Int. J. Adv. Comput. Sci. Appl 10(9) (2019)","DOI":"10.14569\/IJACSA.2019.0100973"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Duong-Trung, N., Son, H.X., Le, H.T., Phan, T.T.: Smart care: integrating blockchain technology into the design of patient-centered healthcare systems. In: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, pp. 105\u2013109 (2020)","DOI":"10.1145\/3377644.3377667"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Duong-Trung, N., Son, H.X., Le, H.T., Phan, T.T.: On components of a patient-centered healthcare system using smart contract. In: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, pp. 31\u201335 (2020)","DOI":"10.1145\/3377644.3377668"},{"key":"1_CR9","unstructured":"Emmanuel, J.C.: The blood cold chain. WHO report (2017)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Ha, X.S., Le, H.T., Metoui, N., Duong-Trung, N.: DeM-CoD: novel access-control-based cash on delivery mechanism for decentralized marketplace. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 71\u201378. IEEE (2020)","DOI":"10.1109\/TrustCom50675.2020.00023"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-030-68851-6_15","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"XS Ha","year":"2021","unstructured":"Ha, X.S., Le, T.H., Phan, T.T., Nguyen, H.H.D., Vo, H.K., Duong-Trung, N.: Scrutinizing trust and transparency in\u00a0cash on delivery systems. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds.) SpaCCS 2020. LNCS, vol. 12382, pp. 214\u2013227. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68851-6_15"},{"issue":"10","key":"1_CR12","first-page":"1067","volume":"9","author":"S Kim","year":"2018","unstructured":"Kim, S., Kim, D.: Design of an innovative blood cold chain management system using blockchain technologies. ICIC Express Lett. Part B: Appl. 9(10), 1067\u20131073 (2018)","journal-title":"ICIC Express Lett. Part B: Appl."},{"key":"1_CR13","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/978-3-030-63467-4_22","volume-title":"Computational Intelligence in Data Science","author":"S Lakshminarayanan","year":"2020","unstructured":"Lakshminarayanan, S., Kumar, P.N., Dhanya, N.M.: Implementation of blockchain-based blood donation framework. In: Chandrabose, A., Furbach, U., Ghosh, A., Kumar M., A. (eds.) ICCIDS 2020. IAICT, vol. 578, pp. 276\u2013290. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-63467-4_22"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Le, H.T., et al.: Introducing multi shippers mechanism for decentralized cash on delivery system. Int. J. Adv. Comput. Sci. Appl. 10(6) (2019)","DOI":"10.14569\/IJACSA.2019.0100676"},{"issue":"1","key":"1_CR15","doi-asserted-by":"publisher","first-page":"21","DOI":"10.3390\/network2010002","volume":"2","author":"HT Le","year":"2022","unstructured":"Le, H.T., et al.: Bloodchain: a blood donation network managed by blockchain technologies. Network 2(1), 21\u201335 (2022)","journal-title":"Network"},{"issue":"7","key":"1_CR16","doi-asserted-by":"publisher","first-page":"113","DOI":"10.3390\/computers11070113","volume":"11","author":"HT Le","year":"2022","unstructured":"Le, H.T., et al.: Medical-waste chain: a medical waste collection, classification and treatment management by blockchain technology. Computers 11(7), 113 (2022)","journal-title":"Computers"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1007\/978-3-030-96772-7_54","volume-title":"Parallel and Distributed Computing, Applications and Technologies","author":"HT Le","year":"2022","unstructured":"Le, H.T., et al.: Patient-chain: patient-centered healthcare system a\u00a0blockchain-based technology in\u00a0dealing with\u00a0emergencies. In: Shen, H., et al. (eds.) PDCAT 2021. LNCS, vol. 13148, pp. 576\u2013583. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-96772-7_54"},{"issue":"5","key":"1_CR18","first-page":"677","volume":"10","author":"NTT Le","year":"2019","unstructured":"Le, N.T.T., et al.: Assuring non-fraudulent transactions in cash on delivery by introducing double smart contracts. Int. J. Adv. Comput. Sci. Appl. 10(5), 677\u2013684 (2019)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Le Van, H., et al.: Blood management system based on blockchain approach: a research solution in Vietnam. IJACSA 13(8) (2022)","DOI":"10.14569\/IJACSA.2022.01308102"},{"key":"1_CR20","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/978-981-16-8062-5_21","volume-title":"Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications","author":"HH Luong","year":"2021","unstructured":"Luong, H.H., Huynh, T.K.N., Dao, A.T., Nguyen, H.T.: An approach for project management system based on blockchain. In: Dang, T.K., K\u00fcng, J., Chung, T.M., Takizawa, M. (eds.) FDSE 2021. CCIS, vol. 1500, pp. 310\u2013326. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-16-8062-5_21"},{"key":"1_CR21","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.950","volume":"8","author":"LTT Nguyen","year":"2022","unstructured":"Nguyen, L.T.T., et al.: BMDD: a novel approach for IoT platform (broker-less and microservice architecture, decentralized identity, and dynamic transmission messages). PeerJ Comput. Sci. 8, e950 (2022)","journal-title":"PeerJ Comput. Sci."},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Peltoniemi, T., Ihalainen, J.: Evaluating blockchain for the governance of the plasma derivatives supply chain: how distributed ledger technology can mitigate plasma supply chain risks. Blockchain in Healthcare Today (2019)","DOI":"10.30953\/bhty.v2.107"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-031-14391-5_14","volume-title":"Mobile Web and Intelligent Information Systems","author":"KL Quoc","year":"2022","unstructured":"Quoc, K.L., et al.: SSSB: an approach to insurance for cross-border exchange by using smart contracts. In: Awan, I., Younas, M., Poniszewska-Mara\u0144da, A. (eds.) MobiWIS 2022. LNCS, vol. 13475, pp. 179\u2013192. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-14391-5_14"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-030-87010-2_6","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2021","author":"NTT Quynh","year":"2021","unstructured":"Quynh, N.T.T., et al.: Toward a design of blood donation management by blockchain technologies. In: Gervasi, O., et al. (eds.) ICCSA 2021. LNCS, vol. 12956, pp. 78\u201390. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-87010-2_6"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Son, H.X., Chen, E.: Towards a fine-grained access control mechanism for privacy protection and policy conflict resolution. Int. J. Adv. Comput. Sci. Appl. 10(2) (2019)","DOI":"10.14569\/IJACSA.2019.0100265"},{"key":"1_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/978-3-319-72389-1_40","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"HX Son","year":"2017","unstructured":"Son, H.X., Dang, T.K., Massacci, F.: REW-SMT: a new approach for rewriting XACML request with dynamic big data security policies. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 501\u2013515. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72389-1_40"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Son, H.X., Hoang, N.M.: A novel attribute-based access control system for fine-grained privacy protection. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 76\u201380 (2019)","DOI":"10.1145\/3309074.3309091"},{"key":"1_CR28","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-030-20005-3_8","volume-title":"International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019)","author":"HX Son","year":"2020","unstructured":"Son, H.X., Nguyen, M.H., Vo, H.K., Nguyen, T.P.: Toward an privacy protection based on access control model in hybrid cloud for healthcare systems. In: Mart\u00ednez \u00c1lvarez, F., Troncoso Lora, A., S\u00e1ez Mu\u00f1oz, J.A., Quinti\u00e1n, H., Corchado, E. (eds.) CISIS\/ICEUTE -2019. AISC, vol. 951, pp. 77\u201386. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-20005-3_8"},{"key":"1_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-030-67550-9_4","volume-title":"Mobile, Secure, and Programmable Networking","author":"HX Son","year":"2021","unstructured":"Son, H.X., Le, T.H., Quynh, N.T.T., Huy, H.N.D., Duong-Trung, N., Luong, H.H.: Toward a blockchain-based technology in dealing with emergencies in patient-centered healthcare systems. In: Bouzefrane, S., Laurent, M., Boumerdassi, S., Renault, E. (eds.) MSPN 2020. LNCS, vol. 12605, pp. 44\u201356. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-67550-9_4"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Thanh, L.N.T., et al.: IoHT-MBA: an internet of healthcare things (IoHT) platform based on microservice and brokerless architecture. Int. J. Adv. Comput. Sci. Appl. 12(7) (2021)","DOI":"10.14569\/IJACSA.2021.0120768"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Thanh, L.N.T., et al.: SIP-MBA: a secure IoT platform with brokerless and micro-service architecture (2021)","DOI":"10.14569\/IJACSA.2021.0120767"},{"key":"1_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1007\/978-3-030-86653-2_47","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2021","author":"LNT Thanh","year":"2021","unstructured":"Thanh, L.N.T., et al.: Toward a security IoT platform with high rate transmission and low energy consumption. In: Gervasi, O., et al. (eds.) ICCSA 2021. LNCS, vol. 12949, pp. 647\u2013662. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86653-2_47"},{"key":"1_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-030-84340-3_22","volume-title":"Computer Information Systems and Industrial Management","author":"TTL Nguyen","year":"2021","unstructured":"Nguyen, T.T.L., et al.: Toward a unique IoT network via single sign-on protocol and message queue. In: Saeed, K., Dvorsk\u00fd, J. (eds.) CISIM 2021. LNCS, vol. 12883, pp. 270\u2013284. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-84340-3_22"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Thanh, L.N.T., et al.: UIP2SOP: a unique IoT network applying single sign-on and message queue protocol. IJACSA 12(6) (2021)","DOI":"10.14569\/IJACSA.2021.0120603"},{"key":"1_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-319-72389-1_44","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"QNT Thi","year":"2017","unstructured":"Thi, Q.N.T., Dang, T.K., Van, H.L., Son, H.X.: Using JSON to specify privacy preserving-enabled attribute-based access control policies. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 561\u2013570. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72389-1_44"},{"key":"1_CR36","doi-asserted-by":"publisher","first-page":"17465","DOI":"10.1109\/ACCESS.2017.2720760","volume":"5","author":"K Toyoda","year":"2017","unstructured":"Toyoda, K., et al.: A novel blockchain-based product ownership management system (POMS) for anti-counterfeits in the post supply chain. IEEE access 5, 17465\u201317477 (2017)","journal-title":"IEEE access"},{"key":"1_CR37","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-981-16-2183-3_42","volume-title":"International Conference on Artificial Intelligence for Smart Community","author":"TKN Huynh","year":"2022","unstructured":"Huynh, T.K.N., Dao, T.A., Van Pham, T.N., Nguyen, K.H.V., Tran, N.C., Luong, H.H.: VBlock\u2013blockchain-based traceability in medical products supply chain management: a case study in VietNam. In: Ibrahim, R., Porkumaran, K., Kannan, R., Mohd Nor, N., Prabakar, S. (eds.) International Conference on Artificial Intelligence for Smart Community. LNEE, vol. 758, pp. 429\u2013441. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-2183-3_42"},{"key":"1_CR38","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-981-19-7402-1_5","volume-title":"Inventive Computation and Information Technologies","author":"KTH Nguyen","year":"2023","unstructured":"Nguyen, K.T.H., et al.: Domain name system resolution system with hyperledger fabric blockchain. In: Smys, S., Kamel, K.A., Palanisamy, R. (eds.) Inventive Computation and Information Technologies. LNNS, vol. 563, pp. 59\u201372. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-19-7402-1_5"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Xuan, S.H., et al.: Rew-XAC: an approach to rewriting request for elastic ABAC enforcement with dynamic policies. In: 2016 International Conference on Advanced Computing and Applications (ACOMP), pp. 25\u201331. IEEE (2016)","DOI":"10.1109\/ACOMP.2016.014"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications. DASFAA 2023 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35415-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T13:02:41Z","timestamp":1698325361000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35415-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031354144","9783031354151"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35415-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"28 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.tjudb.cn\/dasfaa2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"652","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"125","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"66","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}