{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:30:36Z","timestamp":1743100236847,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819980758"},{"type":"electronic","value":"9789819980765"}],"license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8076-5_19","type":"book-chapter","created":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T14:02:10Z","timestamp":1699884130000},"page":"264-279","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Double-Layer Blockchain-Based Decentralized Integrity Verification for\u00a0Multi-chain Cross-Chain Data"],"prefix":"10.1007","author":[{"given":"Weiwei","family":"Wei","sequence":"first","affiliation":[]},{"given":"Yuqian","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xina","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,14]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598\u2013609 (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"6209","DOI":"10.1109\/ACCESS.2019.2962274","volume":"8","author":"Q Ding","year":"2019","unstructured":"Ding, Q., Gao, S., Zhu, J., Yuan, C.: Permissioned blockchain-based double-layer framework for product traceability system. IEEE Access 8, 6209\u20136225 (2019)","journal-title":"IEEE Access"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-540-30580-4_28","volume-title":"Public Key Cryptography - PKC 2005","author":"Y Dodis","year":"2005","unstructured":"Dodis, Y., Yampolskiy, A.: A Verifiable Random Function with Short Proofs and Keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 416\u2013431. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-30580-4_28"},{"issue":"9","key":"19_CR4","doi-asserted-by":"publisher","first-page":"2042","DOI":"10.3390\/s19092042","volume":"19","author":"Y Jiang","year":"2019","unstructured":"Jiang, Y., Wang, C., Wang, Y., Gao, L.: A cross-chain solution to integrating multiple blockchains for iot data management. Sensors 19(9), 2042 (2019)","journal-title":"Sensors"},{"issue":"3","key":"19_CR5","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1109\/TCC.2016.2525998","volume":"6","author":"H Jin","year":"2016","unstructured":"Jin, H., Jiang, H., Zhou, K.: Dynamic and public auditing with fair arbitration for cloud data. IEEE Trans. Cloud Comput. 6(3), 680\u2013693 (2016)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Kan, L., Wei, Y., Muhammad, A.H., Siyuan, W., Gao, L.C., Kai, H.: A multiple blockchains architecture on inter-blockchain communication. In: 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 139\u2013145. IEEE (2018)","DOI":"10.1109\/QRS-C.2018.00037"},{"issue":"5","key":"19_CR7","doi-asserted-by":"publisher","first-page":"2966","DOI":"10.1109\/TNSE.2022.3178970","volume":"9","author":"J Kang","year":"2022","unstructured":"Kang, J., et al.: Communication-efficient and cross-chain empowered federated learning for artificial intelligence of things. IEEE Trans. Netw. Sci. Eng. 9(5), 2966\u20132977 (2022)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"4","key":"19_CR8","doi-asserted-by":"publisher","first-page":"2691","DOI":"10.1109\/TCC.2021.3059448","volume":"10","author":"B Li","year":"2021","unstructured":"Li, B., He, Q., Chen, F., Jin, H., Xiang, Y., Yang, Y.: Inspecting edge data integrity with aggregate signature in distributed edge computing environment. IEEE Trans. Cloud Comput. 10(4), 2691\u20132703 (2021)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Li, B., He, Q., Yuan, L., Chen, F., Lyu, L., Yang, Y.: EdgeWatch: collaborative investigation of data integrity at the edge based on blockchain. In: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 3208\u20133218 (2022)","DOI":"10.1145\/3534678.3539104"},{"issue":"11","key":"19_CR10","doi-asserted-by":"publisher","first-page":"2572","DOI":"10.1109\/TIFS.2016.2587242","volume":"11","author":"J Li","year":"2016","unstructured":"Li, J., Zhang, L., Liu, J.K., Qian, H., Dong, Z.: Privacy-preserving public auditing protocol for low-performance end devices in cloud. IEEE Trans. Inf. Forensics Secur. 11(11), 2572\u20132583 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"19_CR11","doi-asserted-by":"publisher","first-page":"1513","DOI":"10.1109\/TIFS.2015.2416688","volume":"10","author":"J Liu","year":"2015","unstructured":"Liu, J., Huang, K., Rong, H., Wang, H., Xian, M.: Privacy-preserving public auditing for regenerating-code-based cloud storage. IEEE Trans. Inf. Forensics Secur. 10(7), 1513\u20131528 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"19_CR12","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1090\/conm\/477\/09303","volume":"477","author":"A Menezes","year":"2009","unstructured":"Menezes, A.: An introduction to pairing-based cryptography. Recent Trends Crypt. 477, 47\u201365 (2009)","journal-title":"Recent Trends Crypt."},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Micali, S., Rabin, M., Vadhan, S.: Verifiable random functions. In: 40th annual Symposium on Foundations of Computer Science (cat. No. 99CB37039), pp. 120\u2013130. IEEE (1999)","DOI":"10.1109\/SFFCS.1999.814584"},{"key":"19_CR14","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev. 21260 (2008)"},{"key":"19_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102906","volume":"133","author":"L Qiao","year":"2022","unstructured":"Qiao, L., Li, Y., Wang, F., Yang, B.: Lightweight integrity auditing of edge data for distributed edge computing scenarios. Ad Hoc Netw. 133, 102906 (2022)","journal-title":"Ad Hoc Netw."},{"issue":"2327","key":"19_CR16","first-page":"4662","volume":"21","author":"G Wood","year":"2016","unstructured":"Wood, G.: Polkadot: vision for a heterogeneous multi-chain framework. White paper 21(2327), 4662 (2016)","journal-title":"White paper"},{"key":"19_CR17","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1007\/978-981-15-8086-4_56","volume-title":"Artificial Intelligence and Security","author":"X Xiao","year":"2020","unstructured":"Xiao, X., Yu, Z., Xie, K., Guo, S., Xiong, A., Yan, Y.: A Multi-blockchain Architecture Supporting Cross-Blockchain Communication. In: Sun, X., Wang, J., Bertino, E. (eds.) ICAIS 2020. CCIS, vol. 1253, pp. 592\u2013603. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-8086-4_56"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain technology overview. arXiv preprint arXiv:1906.11078 (2019)","DOI":"10.6028\/NIST.IR.8202"},{"issue":"4","key":"19_CR19","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","volume":"12","author":"Y Yu","year":"2016","unstructured":"Yu, Y., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767\u2013778 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8076-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T22:29:36Z","timestamp":1730500176000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8076-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"ISBN":["9789819980758","9789819980765"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8076-5_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023,11,14]]},"assertion":[{"value":"14 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Changsha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iconip2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1274","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"650","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"51% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.14","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.46","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}