{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T12:37:35Z","timestamp":1758631055645},"publisher-location":"Singapore","reference-count":66,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811533792"},{"type":"electronic","value":"9789811533808"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-3380-8_40","type":"book-chapter","created":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T00:04:40Z","timestamp":1583193880000},"page":"456-466","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Rise and Rise of Blockchain: A Patent Statistics Approach to Identify the Underlying Technologies"],"prefix":"10.1007","author":[{"given":"Priyanka C.","family":"Bhatt","sequence":"first","affiliation":[]},{"given":"Vimal","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Tzu-Chuen","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Rico Lee-Ting","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Kuei Kuei","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,3]]},"reference":[{"key":"40_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jbusvent.2018.09.007","volume":"34","author":"C Fisch","year":"2019","unstructured":"Fisch, C.: Initial coin offerings (ICOs) to finance new ventures: an exploratory study. J. Bus. Ventur. 34, 1\u201322 (2019)","journal-title":"J. Bus. Ventur."},{"key":"40_CR2","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.procs.2018.01.019","volume":"123","author":"D Efanov","year":"2018","unstructured":"Efanov, D., Roschin, P.: The All-pervasiveness of the blockchain technology. Procedia Comput. Sci. 123, 116\u2013121 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"40_CR3","first-page":"173","volume":"5","author":"W Nowi\u0144ski","year":"2017","unstructured":"Nowi\u0144ski, W., Kozma, M.: How can blockchain technology disrupt the existing business models? Entrep. Bus. Econ. Rev. 5, 173\u2013188 (2017)","journal-title":"Entrep. Bus. Econ. Rev."},{"key":"40_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97289-3","volume-title":"Knowledge Management and Acquisition for Intelligent Systems","year":"2018","unstructured":"Yang, W., Garg, S., Raza, A., Herbert, D., Kang, B.: Knowledge management and acquisition for intelligent systems. In: 15th Pacific Rim Knowledge Acquisition Workshop, pp. 201\u2013210. Springer, Cuvu (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-319-97289-3"},{"key":"40_CR5","unstructured":"Luthra, E.S.: What the Emergence of Blockchain 5.0 Means for Business Managers and Entrepreneurs (2019). \nhttps:\/\/www.forbes.com\/sites\/forbestechcouncil\/2019\/11\/14\/what-the-emergence-of-blockchain-5-0-means-for-business-managers-and-entrepreneurs\/#1ab69b135d47"},{"key":"40_CR6","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52764-2","volume-title":"Enterprise Applications, Markets and Services in the Finance Industry","year":"2017","unstructured":"Zavolokina, L., Dolata, M., Schwabe, G.: Enterprise applications, markets and services in the finance industry. In: Feuerriegel, S., Neumann, D. (eds.) 8th International Workshop, FinanceCom 2016. pp. 75\u201388. Springer, Frankfurt (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-52764-2"},{"key":"40_CR7","first-page":"115","volume":"2018","author":"M Zambetti","year":"2018","unstructured":"Zambetti, M., Sala, R., Russo, D., Pezzotta, G., Pinto, R.: A patent review on machine learning techniques and applications: depicting main players, relations and technology landscapes. Proc. Summer Sch. Fr. Turco. 2018, 115\u2013128 (2018)","journal-title":"Proc. Summer Sch. Fr. Turco."},{"key":"40_CR8","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1016\/j.techfore.2018.01.036","volume":"146","author":"MS Mariani","year":"2019","unstructured":"Mariani, M.S., Medo, M., Lafond, F.: Early identification of important patents: design and validation of citation network metrics. Technol. Forecast. Soc. Change. 146, 644\u2013654 (2019)","journal-title":"Technol. Forecast. Soc. Change."},{"key":"40_CR9","first-page":"15","volume":"10","author":"D Choi","year":"2018","unstructured":"Choi, D., Song, B.: Exploring technological trends in logistics: topic modeling-based patent analysis. Sustainability 10, 15\u201317 (2018)","journal-title":"Sustainability"},{"key":"40_CR10","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.techfore.2016.01.025","volume":"105","author":"DH Kim","year":"2016","unstructured":"Kim, D.H., Lee, B.K., Sohn, S.Y.: Quantifying Technology-Industry Spillover Effects Based on Patent Citation Network Analysis of Unmanned Aerial Vehicle (UAV). Technol. Forecast. Soc. Change. 105, 140\u2013157 (2016)","journal-title":"Technol. Forecast. Soc. Change."},{"key":"40_CR11","unstructured":"Huang, Y., Zhu, F., Guo, Y., Porter, A.L., Zhang, Y., Zhu, D.: Exploring technology evolution pathways to facilitate technology management: a study of dye-sensitized solar cells (DSSCs). In: PICMET 2016 - Portland International Conference on Management of Engineering and Technology: Technology Management For Social Innovation, Proceedings. pp. 764\u2013776. Portland (2017)"},{"key":"40_CR12","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/S0166-4972(00)00040-7","volume":"21","author":"BP Abraham","year":"2001","unstructured":"Abraham, B.P., Moitra, S.D.: Innovation Assessment through Patent Analysis. Technovation 21, 245\u2013252 (2001)","journal-title":"Technovation"},{"key":"40_CR13","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)"},{"key":"40_CR14","first-page":"28","volume":"5","author":"AV Krylov","year":"2018","unstructured":"Krylov, A.V., Gritsai, I.P.: Blockchain and cryptocurrency. Sci. Educ. Today 5, 28\u201330 (2018)","journal-title":"Sci. Educ. Today"},{"key":"40_CR15","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-1-4842-2604-9_3","volume-title":"Blockchain Basics","author":"Daniel Drescher","year":"2017","unstructured":"Drescher, D.: Blockchain Basics: A Non-technical Introduction in 25 Steps (2017)"},{"key":"40_CR16","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1186\/s40854-016-0040-y","volume":"2","author":"J Sun","year":"2016","unstructured":"Sun, J., Yan, J., Zhang, K.Z.K.: Blockchain-based Sharing Services: what blockchain technology can contribute to smart cities. Financ. Innov. 2, 26 (2016)","journal-title":"Financ. Innov."},{"key":"40_CR17","volume-title":"Blockchains Unchained: Blockcahin Technology and its Use in the Public Sector","author":"J Berryhill","year":"2018","unstructured":"Berryhill, J., Bourgery, T., Hanson, A.: Blockchains Unchained: Blockcahin Technology and its Use in the Public Sector. OECD Working Papers on Public Governance, Paris (2018)"},{"key":"40_CR18","first-page":"185","volume":"50","author":"RW Rust II","year":"2019","unstructured":"Rust II, R.W.: Banking on blockchains: a transformative technology reshaping latin american and caribbean economies. Univ. Miami Inter-American Law Rev. 50, 185\u2013211 (2019)","journal-title":"Univ. Miami Inter-American Law Rev."},{"key":"40_CR19","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/3-540-39799-X_18","volume-title":"Advances in Cryptology \u2014 CRYPTO 1985 Proceedings","author":"TE Moore","year":"1986","unstructured":"Moore, T.E., Tavares, S.E.: A layered approach to the design of private key cryptosystems. In: Williams, H.C. (ed.) Advances in Cryptology \u2014 CRYPTO 1985 Proceedings, pp. 227\u2013245. Springer, Heidelberg (1986). \nhttps:\/\/doi.org\/10.1007\/3-540-39799-X_18"},{"key":"40_CR20","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/3-540-38424-3_31","volume-title":"Advances in Cryptology-CRYPT0 1990","author":"JL McInnes","year":"1991","unstructured":"McInnes, J.L., Pinkas, B.: On the Impossibility of Private Key Cryptography with Weakly Random Keys. In: Menezes, A.J., Vanstone, S.A. (eds.) Advances in Cryptology-CRYPT0 1990, pp. 421\u2013435. Springer, Heidelberg (1991). \nhttps:\/\/doi.org\/10.1007\/3-540-38424-3_31"},{"key":"40_CR21","unstructured":"Beller, M.J., Chang, L., Yacobi, Y.: Security for personal communications services: public-key vs. private key approaches. In: 1992 Proceedings on the Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 26\u201331. IEEE (1992)"},{"key":"40_CR22","first-page":"29","volume":"29","author":"JA Adam","year":"1992","unstructured":"Adam, J.A.: Data security-cryptography\u2009=\u2009privacy? IEEE Spectr. 29, 29\u201335 (1992)","journal-title":"IEEE Spectr."},{"key":"40_CR23","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MIC.2003.1200305","volume":"7","author":"DA Menasc\u00e9","year":"2003","unstructured":"Menasc\u00e9, D.A.: Security performance. IEEE Internet Comput. 7, 84\u201387 (2003)","journal-title":"IEEE Internet Comput."},{"key":"40_CR24","first-page":"56","volume":"37","author":"AA Lorencs","year":"2003","unstructured":"Lorencs, A.A.: A problem of digital signature implementation based on the El gamal scheme. Autom. Control Comput. Sci. 37, 56\u201361 (2003)","journal-title":"Autom. Control Comput. Sci."},{"key":"40_CR25","doi-asserted-by":"crossref","unstructured":"Skevington, P.J.: From security to trust - creating confidence to trade electronically. In: IEE Colloquium on eCommerce - Trading But Not As We Know It (Ref. No. 1998\/460). pp. 6\/1-6\/6. IEE, London, UK (1998)","DOI":"10.1049\/ic:19980782"},{"key":"40_CR26","unstructured":"Khalifa, O.O., Islam, M.D.R., Khan, S., Shebani, M.S.: Communications cryptography. In: Ghodgaonkar, D.K., Esa, M., Lin, A., Awang, Z., Habash, R.W. (eds.) 2004 RF and Microwave Conference, RFM 2004. pp. 220\u2013223. Selangor (2004)"},{"key":"40_CR27","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1080\/019722499128411","volume":"15","author":"LJ Camp","year":"1999","unstructured":"Camp, L.J.: Web security and privacy: an american perspective. Inf. Soc. 15, 249\u2013256 (1999)","journal-title":"Inf. Soc."},{"key":"40_CR28","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/S0169-2607(02)00060-3","volume":"71","author":"I Vlachos","year":"2003","unstructured":"Vlachos, I., Kalivas, D., Panou-Diamandi, O.: An electronic post market surveillance system for medical devices. Comput. Meth. Programs Biomed. 71, 129\u2013140 (2003)","journal-title":"Comput. Meth. Programs Biomed."},{"key":"40_CR29","doi-asserted-by":"crossref","unstructured":"Nguyen, T.N.T., Shum, P., Chua, E.H.: Secure end-to-end mobile payment system. In: 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems. IEEE, Guangzhou (2005)","DOI":"10.1109\/MTAS.2005.207231"},{"key":"40_CR30","doi-asserted-by":"crossref","unstructured":"Bansal, A.: Mobile e-health for developing countries. In: HEALTHCOM 2006 8th International Conference on e-Health Networking, Applications and Services, pp. 224\u2013227. IEEE, New Delhi (2006)","DOI":"10.1109\/HEALTH.2006.246456"},{"key":"40_CR31","doi-asserted-by":"crossref","unstructured":"Boyen, X., Shacham, H., Shen, E., Waters, B.: Forward-secure Signatures with untrusted update. In: CCS 2006: 13th ACM Conference on Computer and Communications Security. pp. 191\u2013200. Alexandria, VA (2006)","DOI":"10.1145\/1180405.1180430"},{"key":"40_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-540-31815-6_15","volume-title":"Information Security Applications","author":"SSM Chow","year":"2005","unstructured":"Chow, S.S.M.: Verifiable pairing and its applications. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 170\u2013187. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/978-3-540-31815-6_15"},{"key":"40_CR33","first-page":"50","volume":"6","author":"JR Good","year":"1983","unstructured":"Good, J.R.: Experience with a large distributed banking system. Database Eng. 6, 50\u201356 (1983)","journal-title":"Database Eng."},{"key":"40_CR34","unstructured":"Duffy, M., Haren, P., Schenck, J.: A distributed object framework for financial applications. In: 2nd International Enterprise Distributed Object Computing Workshop, EDOC 1998. pp. 148\u2013154 (1998)"},{"key":"40_CR35","unstructured":"Back, A.: Hashcash - A Denial of Service Counter-Measure (2002). \nhttp:\/\/www.hashcash.org\/papers\/Hashcash.Pdf"},{"key":"40_CR36","doi-asserted-by":"crossref","unstructured":"Singh, S., Singh, N.: Blockchain: future of financial and cyber security. In: 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016, pp. 463\u2013467. Institute of Electrical and Electronics Engineers Inc. (2016)","DOI":"10.1109\/IC3I.2016.7918009"},{"key":"40_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-030-21548-4_15","volume-title":"Information Security and Privacy","author":"S Tang","year":"2019","unstructured":"Tang, S., Chow, S.S.M., Liu, Z., Liu, J.K.: Fast-to-finalize nakamoto-like consensus. In: Jang-Jaccard, J., Guo, F. (eds.) ACISP 2019. LNCS, vol. 11547, pp. 271\u2013288. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-21548-4_15"},{"key":"40_CR38","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1080\/13504851.2018.1540841","volume":"26","author":"YC Lo","year":"2019","unstructured":"Lo, Y.C., Medda, F.: Bitcoin mining: converting computing power into cash flow. Appl. Econ. Lett. 26, 1171\u20131176 (2019)","journal-title":"Appl. Econ. Lett."},{"key":"40_CR39","doi-asserted-by":"crossref","unstructured":"Gramoli, V.: From blockchain consensus back to byzantine consensus. Futur. Gener. Comput. Syst. (2017)","DOI":"10.1016\/j.future.2017.09.023"},{"key":"40_CR40","doi-asserted-by":"publisher","first-page":"27324","DOI":"10.1109\/ACCESS.2018.2821705","volume":"6","author":"Y He","year":"2018","unstructured":"He, Y., Li, H., Cheng, X., Liu, Y., Yang, C., Sun, L.: A blockchain based truthful incentive mechanism for distributed P2P applications. IEEE Access 6, 27324\u201327335 (2018)","journal-title":"IEEE Access"},{"key":"40_CR41","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s11192-014-1265-z","volume":"100","author":"MH-C Ho","year":"2014","unstructured":"Ho, M.H.-C., Lin, V.H., Liu, J.S.: Exploring knowledge diffusion among nations: a study of core technologies in fuel cells. Scientometrics 100, 149\u2013171 (2014)","journal-title":"Scientometrics"},{"key":"40_CR42","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1002\/smj.160","volume":"22","author":"L Rosenkopf","year":"2001","unstructured":"Rosenkopf, L., Nerkar, A.: Beyond local search: boundary-spanning, exploration, and impact in the optical disk industry. Strateg. Manage. J. 22, 287\u2013306 (2001)","journal-title":"Strateg. Manage. J."},{"key":"40_CR43","doi-asserted-by":"crossref","unstructured":"Kumar, V., Chen, H.C., Lin, C.Y., Lai, K.K., Chang, Y.H.: Technological evolution of thin-film solar cells through main path analysis. In: ACM International Conference Proceeding Series. pp. 160\u2013164 (2018)","DOI":"10.1145\/3268808.3268829"},{"key":"40_CR44","doi-asserted-by":"crossref","unstructured":"Lin, C.Y., Su, F.P., Lai, K.K., Shih, H.C., Liu, C.C.: Research and development portfolio for the payment fintech company: the perspectives of patent statistics. In: ACM International Conference Proceeding Series. pp. 98\u2013102 (2018)","DOI":"10.1145\/3268808.3268823"},{"key":"40_CR45","doi-asserted-by":"publisher","first-page":"e0170895","DOI":"10.1371\/journal.pone.0170895","volume":"12","author":"H Park","year":"2017","unstructured":"Park, H., Magee, C.L.: Tracing technological development trajectories: a genetic knowledge persistence-based main path approach. PLoS ONE 12, e0170895 (2017)","journal-title":"PLoS ONE"},{"key":"40_CR46","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1142\/S0219525907000945","volume":"10","author":"B Verspagen","year":"2007","unstructured":"Verspagen, B.: Mapping technological trajectories as patent citation networks: a study on the history of fuel cell research. Adv. Complex Syst. 10, 93\u2013115 (2007)","journal-title":"Adv. Complex Syst."},{"key":"40_CR47","doi-asserted-by":"crossref","unstructured":"Su, F.P., Lai, K.K., Yang, W.G., Sharma, R.R.K.: A heuristic procedure to identify most valuable chain of patents in a given technology. In: PICMET: Portland International Center for Management of Engineering and Technology, Proceedings, pp. 1959\u20131965 (2009)","DOI":"10.1109\/PICMET.2009.5261933"},{"key":"40_CR48","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.techfore.2008.03.014","volume":"76","author":"SB Chang","year":"2009","unstructured":"Chang, S.B., Lai, K.K., Chang, S.M.: Exploring technology diffusion and classification of business methods: using the patent citation network. Technol. Forecast. Soc. Change 76, 107\u2013117 (2009)","journal-title":"Technol. Forecast. Soc. Change"},{"key":"40_CR49","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s11192-012-0796-4","volume":"95","author":"P \u00c9rdi","year":"2013","unstructured":"\u00c9rdi, P., et al.: Prediction of emerging technologies based on analysis of the US patent citation network. Scientometrics 95, 225\u2013242 (2013)","journal-title":"Scientometrics"},{"key":"40_CR50","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.respol.2014.06.006","volume":"44","author":"A Breitzman","year":"2015","unstructured":"Breitzman, A., Thomas, P.: The emerging clusters model: a tool for identifying emerging technologies across multiple patent systems. Res. Policy 44, 195\u2013205 (2015)","journal-title":"Res. Policy"},{"key":"40_CR51","doi-asserted-by":"crossref","unstructured":"Kak, E., Orji, R., Pry, J., Sofranko, K., Lomotey, R., Deters, R.: Privacy improvement architecture for IoT. In: 2018 IEEE International Congress on Internet of Things (ICIOT), pp. 148\u2013155. IEEE (2018)","DOI":"10.1109\/ICIOT.2018.00028"},{"key":"40_CR52","unstructured":"Arutyunov, R.: The next generation of cybersecurity in oil and gas. Pipeline Gas J., 245 (2018)"},{"key":"40_CR53","doi-asserted-by":"crossref","unstructured":"Rawat, D.B., Parwez, M.S., Alshammari, A.: Edge computing enabled resilient wireless network virtualization for internet of things. In: Proceedings - 2017 IEEE 3rd International Conference on Collaboration and Internet Computing, CIC 2017, pp. 155\u2013162. Institute of Electrical and Electronics Engineers Inc. (2017)","DOI":"10.1109\/CIC.2017.00030"},{"key":"40_CR54","doi-asserted-by":"crossref","unstructured":"Agbo, B., Qin, Y., Hill, R.: Research directions on big IoT data processing using distributed ledger technology: a position paper. In: Chang, V., Ramachandran, M., Walters, R., Mu\u00f1oz, V.M., Wills, G. (eds.) 4th International Conference on Internet of Things, Big Data and Security, IoTBDS 2019, pp. 385\u2013391 (2019)","DOI":"10.5220\/0007751203850391"},{"key":"40_CR55","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/978-981-13-8300-7_2","volume-title":"Emerging Technologies in Computer Engineering: Microservices in Big Data Analytics","author":"M Shyamala Devi","year":"2019","unstructured":"Shyamala Devi, M., Suguna, R., Joshi, A.S., Bagate, R.A.: Design of IoT blockchain based smart agriculture for enlightening safety and security. In: Somani, A.K., Ramakrishna, S., Chaudhary, A, Choudhary, C., Agarwal, B. (eds.) ICETCE 2019. CCIS, vol. 985, pp. 7\u201319. Springer, Singapore (2019). \nhttps:\/\/doi.org\/10.1007\/978-981-13-8300-7_2"},{"key":"40_CR56","doi-asserted-by":"crossref","unstructured":"Tosh, D.K., Shetty, S., Liang, X., Kamhoua, C.A., Kwiat, K.A., Njilla, L.: Security implications of blockchain cloud with analysis of block withholding attack. In: 2017 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pp. 458\u2013467. IEEE (2017)","DOI":"10.1109\/CCGRID.2017.111"},{"key":"40_CR57","doi-asserted-by":"crossref","unstructured":"Singh, J., Michels, J.D.: Blockchain as a service (BaaS): providers and trust. In: 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 67\u201374. IEEE (2018)","DOI":"10.1109\/EuroSPW.2018.00015"},{"key":"40_CR58","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1007\/978-3-030-24296-1_41","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2019","author":"Denis Kirillov","year":"2019","unstructured":"Kirillov, D., Iakushkin, O., Korkhov, V., Petrunin, V.: Evaluation of tools for analyzing smart contracts in distributed ledger technologies. In: 19th International Conference on Computational Science and its Applications, ICCSA 2019, pp. 522\u2013536 (2019)"},{"key":"40_CR59","first-page":"170","volume":"255","author":"D Mendes","year":"2018","unstructured":"Mendes, D., Rodrigues, I.P., Fonseca, C., Lopes, M.J., Garc\u00eda-Alonso, J.M., Berrocal, J.: Anonymized distributed PHR using blockchain for openness and non-repudiation guarantee. Stud. Health Technol. Inform. 255, 170\u2013174 (2018)","journal-title":"Stud. Health Technol. Inform."},{"key":"40_CR60","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-030-02744-5_3","volume-title":"Network and System Security","author":"P Ince","year":"2018","unstructured":"Ince, P., Liu, J.K., Zhang, P.: Adding confidential transactions to cryptocurrency IOTA with bulletproofs. In: Au, M.H., Yiu, S.M., Li, J., Luo, X., Wang, C., Castiglione, A., Kluczniak, K. (eds.) NSS 2018. LNCS, vol. 11058, pp. 32\u201345. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-030-02744-5_3"},{"key":"40_CR61","doi-asserted-by":"publisher","first-page":"34","DOI":"10.3390\/jrfm11030034","volume":"11","author":"AD Grody","year":"2018","unstructured":"Grody, A.D.: Rebuilding financial industry infrastructure. J. Risk Manage. Financ. Inst. 11, 34\u201346 (2018)","journal-title":"J. Risk Manage. Financ. Inst."},{"key":"40_CR62","doi-asserted-by":"crossref","unstructured":"Batubara, F.R., Ubacht, J., Janssen, M.: Challenges of blockchain technology adoption for e-Government: a systematic literature review. In: C.C., H. and A., Z. (eds.) 19th Annual International Conference on Digital Government Research: Governance in the Data Age, DG.O 2018 (2018)","DOI":"10.1145\/3209281.3209317"},{"key":"40_CR63","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-3-319-68637-0_28","volume-title":"Provable Security","author":"DA Wijaya","year":"2017","unstructured":"Wijaya, D.A., Liu, J.K., Suwarsono, D.A., Zhang, P.: A new blockchain-based value-added tax system. In: Okamoto, T., Yu, Y., Au, M.H., Li, Y. (eds.) ProvSec 2017. LNCS, vol. 10592, pp. 471\u2013486. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-68637-0_28"},{"key":"40_CR64","unstructured":"Carson, B., Romanelli, G., Walsh, P., Zhumaev, A.: Blockchain Beyond the Hype: What is the Strategic Business Value? McKinsey Co. (2018)"},{"key":"40_CR65","unstructured":"Heutger, M.: Blockchain in Logistics: Perspectives on the Upcoming Impact of Blockchain Technology. Dtsch. Post DHL Gr. Accent. pp. 1\u201328 (2018)"},{"key":"40_CR66","doi-asserted-by":"crossref","unstructured":"Benhamouda, F., Halevi, S., Halevi, T.: Supporting private data on hyperledger fabric with secure multiparty computation. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), pp. 357\u2013363. IEEE (2018)","DOI":"10.1109\/IC2E.2018.00069"}],"container-title":["Communications in Computer and Information Science","Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-3380-8_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T00:08:48Z","timestamp":1583194128000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-3380-8_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811533792","9789811533808"],"references-count":66,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-3380-8_40","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"3 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Phuket","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 March 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 March 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}