{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:32:43Z","timestamp":1743003163558,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":37,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811952081"},{"type":"electronic","value":"9789811952098"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-5209-8_24","type":"book-chapter","created":{"date-parts":[[2022,8,9]],"date-time":"2022-08-09T23:03:17Z","timestamp":1660086197000},"page":"351-375","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Audit Scheme of University Scientific Research Funds Based on Consortium Blockchain"],"prefix":"10.1007","author":[{"given":"Pengfan","family":"Yue","sequence":"first","affiliation":[]},{"given":"Heng","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,10]]},"reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201987","author":"RC Merkle","year":"1988","unstructured":"Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369\u2013378. Springer, Heidelberg (1988). https:\/\/doi.org\/10.1007\/3-540-48184-2_32"},{"issue":"05","key":"24_CR2","first-page":"969","volume":"41","author":"Q Shao","year":"2018","unstructured":"Shao, Q., Jin, C., Zhang, Z., Qian, W., Zhou, A.: Blockchain: architecture and research progress. Chin. J. Comput. 41(05), 969\u2013988 (2018)","journal-title":"Chin. J. Comput."},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"B\u00fcnz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 315\u2013334 (2018)","DOI":"10.1109\/SP.2018.00020"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-04444-1_22","volume-title":"Computer Security \u2013 ESORICS 2009","author":"Q Wang","year":"2009","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355\u2013370. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04444-1_22"},{"issue":"06","key":"24_CR5","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1049\/cje.2021.08.011","volume":"30","author":"K Fan","year":"2021","unstructured":"Fan, K., Li, F., Yu, H., Yang, Z.: A blockchain-based flexible data auditing scheme for the cloud service. Chin. J. Electron. 30(06), 1159\u20131166 (2021)","journal-title":"Chin. J. Electron."},{"issue":"06","key":"24_CR6","first-page":"1799","volume":"37","author":"J Zhou","year":"2020","unstructured":"Zhou, J., Jin, Y., He, H., Li, P.: Research on cloud data audit scheme based on blockchain. Appl. Res. Comput. 37(06), 1799\u20131803 (2020)","journal-title":"Appl. Res. Comput."},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Lu, N., Zhang, Y., Shi, W., Kumari, S., Choo, K.R.: A secure and scalable data integrity auditing scheme based on hyperledger fabric. Comput. Secur. 92(C), 101741.1\u2013101741.16 (2020)","DOI":"10.1016\/j.cose.2020.101741"},{"issue":"05","key":"24_CR8","first-page":"504","volume":"56","author":"Y Li","year":"2016","unstructured":"Li, Y., Yao, G., Lei, L., Zhang, X., Yang, K.: LBT-based on cloud data integrity verification scheme. J. Tsinghua Univ. (Sci. Technol.) 56(05), 504\u2013510 (2016)","journal-title":"J. Tsinghua Univ. (Sci. Technol.)"},{"issue":"01","key":"24_CR9","first-page":"164","volume":"39","author":"F Liu","year":"2021","unstructured":"Liu, F., Zhao, J.: Cloud storage data integrity verification scheme based on blockchain. J. Appl. Sci. 39(01), 164\u2013173 (2021)","journal-title":"J. Appl. Sci."},{"issue":"5","key":"24_CR10","first-page":"74","volume":"18","author":"J Weng","year":"2019","unstructured":"Weng, J., Weng, J., Zhang, J., Li, M., Zhang, Y., Luo, W.: DeepChain: auditable and privacy-preserving deep learning with blockchain-based incentive. IEEE Trans. Dependable Secure Comput. 18(5), 74\u201385 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Putz, B., Menges, F., Pernul, G.: A secure and auditable logging infrastructure based on a permissioned blockchain. Comput. Secur. 87(C), 101602.1\u2013101602.10 (2019)","DOI":"10.1016\/j.cose.2019.101602"},{"issue":"01","key":"24_CR12","first-page":"29","volume":"39","author":"X Zhao","year":"2021","unstructured":"Zhao, X., Li, Y.: Auditable and traceable blockchain anonymous transaction scheme. J. Appl. Sci. 39(01), 29\u201341 (2021)","journal-title":"J. Appl. Sci."},{"issue":"10","key":"24_CR13","first-page":"2232","volume":"57","author":"Y Jiang","year":"2020","unstructured":"Jiang, Y., Li, Y., Zhu, Y.: ACT: auditable confidential transaction scheme. J. Comput. Res. Dev. 57(10), 2232\u20132240 (2020)","journal-title":"J. Comput. Res. Dev."},{"key":"24_CR14","first-page":"e4395","volume":"31","author":"L Huang","year":"2019","unstructured":"Huang, L., Zhang, G., Yu, S., Fu, A., Yearwood, J.: SeShare: secure cloud data sharing based on blockchain and public auditing. Concurr. Comput. Pract. Exp. 31, e4395 (2019)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"24_CR15","unstructured":"Li, W., Wang, Y., Chen, L., Lai, X., Zhang, X., Xin, J.: Fully auditable privacy-preserving cryptocurrency against malicious auditors. Cryptology ePrint Archive, Report 925 (2019)"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Deng, C., et al.: A survey on range proof and its applications on blockchain. In: 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), China, pp. 1\u20138 (2019)","DOI":"10.1109\/CyberC.2019.00011"},{"key":"24_CR17","unstructured":"Narula, N., Vasquez, W., Virza, M.: ZkLedger: privacy-preserving auditing for distributed ledgers. In: Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation (NSDI 2018), pp. 65\u201380. USENIX Association, USA (2018)"},{"issue":"09","key":"24_CR18","first-page":"2620","volume":"30","author":"H Tan","year":"2019","unstructured":"Tan, H., et al.: Archival data protection and sharing method based on blockchain. J. Softw. 30(09), 2620\u20132635 (2019)","journal-title":"J. Softw."},{"key":"24_CR19","doi-asserted-by":"publisher","first-page":"181733","DOI":"10.1109\/ACCESS.2020.3028189","volume":"8","author":"W Li","year":"2020","unstructured":"Li, W., Guo, H., Nejad, M., Shen, C.-C.: Privacy-preserving traffic management: a blockchain and zero-knowledge proof inspired approach. IEEE Access 8, 181733\u2013181743 (2020)","journal-title":"IEEE Access"},{"issue":"5","key":"24_CR20","first-page":"170","volume":"2","author":"L Hang","year":"2020","unstructured":"Hang, L., Ullah, I., Kim, D.H.: A secure fish farm platform based on blockchain for agriculture data integrity. Comput. Electron. Agric. 2(5), 170\u2013175 (2020)","journal-title":"Comput. Electron. Agric."},{"issue":"03","key":"24_CR21","first-page":"594","volume":"47","author":"L Zhang","year":"2021","unstructured":"Zhang, L., Liu, Z., Xie, G., Xue, X.: Secure data sharing model based on smart contract with integrated credit evaluation. Acta Automatica Sinica 47(03), 594\u2013608 (2021)","journal-title":"Acta Automatica Sinica"},{"issue":"5","key":"24_CR22","first-page":"46","volume":"1","author":"M Mrinalni Vaknishadh","year":"2012","unstructured":"Mrinalni Vaknishadh, M.: Enabling public auditability and data dynamics for storage security in cloud computing. Int. J. Innov. Res. Dev. 1(5), 46\u201357 (2012)","journal-title":"Int. J. Innov. Res. Dev."},{"issue":"6","key":"24_CR23","doi-asserted-by":"publisher","first-page":"24","DOI":"10.2196\/18938","volume":"22","author":"T Hirano","year":"2020","unstructured":"Hirano, T., et al.: Data validation and verification using blockchain in a clinical trial for breast cancer: regulatory sandbox. J. Med. Internet Res. 22(6), 24\u201329 (2020)","journal-title":"J. Med. Internet Res."},{"issue":"10","key":"24_CR24","doi-asserted-by":"publisher","first-page":"3515","DOI":"10.3390\/s21103515","volume":"21","author":"S Sim","year":"2021","unstructured":"Sim, S., Jeong, Y.: Multi-blockchain-based IoT data processing techniques to ensure the integrity of IoT data in AIoT edge computing environments. Sensors 21(10), 3515 (2021)","journal-title":"Sensors"},{"key":"24_CR25","unstructured":"Ding, Y., Xiang, H., Luo, D., Zou, X., Liang, H.: Scheme for electronic certificate storage by combining Fabric technology. J. Xidian Univ. 47(05), 113\u2013121+158 (2020)"},{"key":"24_CR26","doi-asserted-by":"publisher","first-page":"115304","DOI":"10.1109\/ACCESS.2019.2935895","volume":"7","author":"S Gao","year":"2019","unstructured":"Gao, S., Zheng, D., Guo, R., Jing, C., Hu, C.: An anti-quantum e-voting protocol in blockchain with audit function. IEEE Access 7, 115304\u2013115316 (2019)","journal-title":"IEEE Access"},{"issue":"20","key":"24_CR27","doi-asserted-by":"publisher","first-page":"5735","DOI":"10.3390\/s20205735","volume":"20","author":"X Yin","year":"2020","unstructured":"Yin, X., He, J., Guo, Y., Han, D., Li, K., Castiglione, A.: An efficient two-factor authentication scheme based on the Merkle tree. Sensors 20(20), 5735 (2020)","journal-title":"Sensors"},{"issue":"04","key":"24_CR28","first-page":"1","volume":"1","author":"X Zhou","year":"2022","unstructured":"Zhou, X., Liu, Y.: Supervisable transaction privacy-preservation scheme for air travel consumption. Appl. Res. Comput. 1(04), 1\u20137 (2022)","journal-title":"Appl. Res. Comput."},{"issue":"5","key":"24_CR29","first-page":"25","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. Publ. IEEE Comput. Soc. 22(5), 25\u201331 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst. Publ. IEEE Comput. Soc."},{"issue":"04","key":"24_CR30","first-page":"999","volume":"41","author":"B Li","year":"2021","unstructured":"Li, B., Zhang, W., Wang, J., Zhao, W., Wang, H.: Sealed-bid auction scheme based on blockchain. J. Comput. Appl. 41(04), 999\u20131004 (2021)","journal-title":"J. Comput. Appl."},{"issue":"6","key":"24_CR31","doi-asserted-by":"publisher","first-page":"102382","DOI":"10.1016\/j.ipm.2020.102382","volume":"57","author":"J Li","year":"2020","unstructured":"Li, J., Wu, J., Jiang, G., Srikanthan, T.: Blockchain-based public auditing for big data in cloud storage. Inf. Process. Manage. 57(6), 102382 (2020)","journal-title":"Inf. Process. Manage."},{"issue":"1","key":"24_CR32","doi-asserted-by":"publisher","first-page":"A15","DOI":"10.2308\/ciia-52356","volume":"13","author":"MD Sheldon","year":"2019","unstructured":"Sheldon, M.D.: A primer for information technology general control considerations on a private and permissioned blockchain audit. Curr. Issues Audit. 13(1), A15\u2013A29 (2019)","journal-title":"Curr. Issues Audit."},{"issue":"6","key":"24_CR33","first-page":"15","volume":"12","author":"Q Wang","year":"2018","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling efficient verification of dynamic data possession and batch updating in cloud storage. KSII Trans. Internet Inf. Syst. 12(6), 15\u201323 (2018)","journal-title":"KSII Trans. Internet Inf. Syst."},{"issue":"03","key":"24_CR34","first-page":"745","volume":"41","author":"H Gao","year":"2021","unstructured":"Gao, H., Li, L., Lin, H., Li, J., Deng, D., Li, S.: Research and application progress of blockchain in area of data integrity protection. J. Comput. Appl. 41(03), 745\u2013755 (2021)","journal-title":"J. Comput. Appl."},{"key":"24_CR35","first-page":"246","volume":"8","author":"X Yang","year":"2020","unstructured":"Yang, X., Pei, X., Wang, M., Li, T., Wang, C.: Multi-replica and multi-cloud data public audit scheme based on blockchain. IEEE Access 8, 246\u2013261 (2020)","journal-title":"IEEE Access"},{"key":"24_CR36","doi-asserted-by":"publisher","first-page":"73","DOI":"10.7717\/peerj-cs.407","volume":"7","author":"TH Pranto","year":"2021","unstructured":"Pranto, T.H., Noman, A.A., Mahmud, A., Haque, A.B.: Blockchain and smart contract for IoT enabled smart agriculture. PeerJ. Comput. Sci. 7, 73\u201382 (2021)","journal-title":"PeerJ. Comput. Sci."},{"key":"24_CR37","doi-asserted-by":"crossref","unstructured":"Farooq, M.S., Khan, M., Abid, A.: A framework to make charity collection transparent and auditable using blockchain technology. Comput. Electr. Eng. 83(C), 137\u2013143 (2020)","DOI":"10.1016\/j.compeleceng.2020.106588"}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-5209-8_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T17:19:16Z","timestamp":1710350356000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-5209-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811952081","9789811952098"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-5209-8_24","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chengdu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpcsee2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"261","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}