{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:48:37Z","timestamp":1774453717608,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T00:00:00Z","timestamp":1610064000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T00:00:00Z","timestamp":1610064000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 108-2221-E-324-013"],"award-info":[{"award-number":["MOST 108-2221-E-324-013"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11227-020-03558-7","type":"journal-article","created":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T16:06:47Z","timestamp":1610122007000},"page":"7791-7832","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["A blockchain-based intelligent anti-switch package in tracing logistics system"],"prefix":"10.1007","volume":"77","author":[{"given":"Chin-Ling","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9581-8184","authenticated-orcid":false,"given":"Yong-Yuan","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Hongyu","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,8]]},"reference":[{"issue":"2","key":"3558_CR1","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s10796-014-9489-2","volume":"17","author":"A Whitmore","year":"2015","unstructured":"Whitmore A, Agarwal A, Da Xu L (2015) The internet of things: a survey of topics and trends. Inf Syst Front 17(2):261\u2013274","journal-title":"Inf Syst Front"},{"issue":"2","key":"3558_CR2","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1016\/j.future.2017.02.020","volume":"78","author":"BR Ray","year":"2018","unstructured":"Ray BR, Abawajy J, Chowdhury M, Alelaiwi A (2018) Universal and secure object ownership transfer protocol for the Internet of Things. Fut Gener Comput Syst 78(2):838\u2013849","journal-title":"Fut Gener Comput Syst"},{"issue":"9","key":"3558_CR3","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1109\/TIFS.2015.2442215","volume":"10","author":"K Liang","year":"2015","unstructured":"Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensics Secur 10(9):1981\u20131992","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3558_CR4","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.future.2014.10.010","volume":"49","author":"X Yao","year":"2015","unstructured":"Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Fut Gener Comput Syst 49:104\u2013112","journal-title":"Fut Gener Comput Syst"},{"key":"3558_CR5","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1109\/TIFS.2015.2464781","volume":"10","author":"J Han","year":"2015","unstructured":"Han J, Susilo W, Mu Y (2015) Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans Inf Forensics Secur 10:665\u2013678","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"3558_CR6","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1109\/SURV.2011.020211.00045","volume":"14","author":"S Zhao","year":"2012","unstructured":"Zhao S, Aggarwal A, Frost R, Bai X (2012) A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun Surv Tutor 14(2):380\u2013400","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"3558_CR7","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TC.2013.200","volume":"64","author":"Z Zhou","year":"2015","unstructured":"Zhou Z, Huang D, Wang Z (2015) Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans Comput 64(1):126\u2013138","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"3558_CR8","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1002\/wcm.947","volume":"12","author":"H Kim","year":"2012","unstructured":"Kim H, Kim CH, Chung JM (2012) A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks. Wirel Commun Mob Comput 12(2):145\u2013157","journal-title":"Wirel Commun Mob Comput"},{"key":"3558_CR9","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.elerap.2010.09.001","volume":"10","author":"CL Chen","year":"2011","unstructured":"Chen CL, Liao JJ (2011) A fair online payment system for digital content via subliminal channel\u201d. Electron Commerce Res Appl 10:279\u2013287","journal-title":"Electron Commerce Res Appl"},{"key":"3558_CR10","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/j.elerap.2009.04.012","volume":"8","author":"CL Chen","year":"2009","unstructured":"Chen CL, Liu MH (2009) A traceable E-cash transfer system against blackmail via subliminal channel. Electron Commerce Res Appl 8:327\u2013333","journal-title":"Electron Commerce Res Appl"},{"key":"3558_CR11","first-page":"470","volume":"46","author":"CL Chen","year":"2017","unstructured":"Chen CL, Wang KH, Tsaur WJ, Chen JH, Chen CH (2017) An electronic public engineering project bidding protocol via a subliminal channel. J Inf Technol Control 46:470\u2013483","journal-title":"J Inf Technol Control"},{"issue":"4","key":"3558_CR12","doi-asserted-by":"publisher","first-page":"2884","DOI":"10.1109\/JIOT.2017.2714179","volume":"5","author":"S Roy","year":"2017","unstructured":"Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2017) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things. IEEE Internet Things J 5(4):2884\u20132895","journal-title":"IEEE Internet Things J"},{"key":"3558_CR13","doi-asserted-by":"crossref","unstructured":"Banerjee S, Odelu V, Das AK, Srinivas J, Kumar N, Chattopadhyay S, Choo KKR (2019)A provably secure and lightweight anonymous user authenticated session key exchange scheme for the Internet of Things deployment. IEEE Internet Things J 6(5): 8739\u20138752","DOI":"10.1109\/JIOT.2019.2923373"},{"key":"3558_CR14","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.cose.2019.06.002","volume":"86","author":"M Shuai","year":"2019","unstructured":"Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132\u2013146","journal-title":"Comput Secur"},{"issue":"5","key":"3558_CR15","doi-asserted-by":"publisher","first-page":"3408","DOI":"10.1109\/JIOT.2017.2739921","volume":"5","author":"SH Islam","year":"2017","unstructured":"Islam SH, Vijayakumar P, Bhuiyan MZA, Amin R, Balusamy B (2017) A provably secure three-factor session initiation protocol for multimedia big data communications. IEEE Internet Things J 5(5):3408\u20133418","journal-title":"IEEE Internet Things J"},{"key":"3558_CR16","unstructured":"Global Trade and Blockchain Forum. https:\/\/www.wto.org\/english\/res_e\/reser_e\/workshop_blockchain_21219_e.htm\/, April 27, 2020"},{"key":"3558_CR17","unstructured":"Blockchain in Supply Chain Management. https:\/\/consensys.net\/blockchain-use-cases\/supply-chain-management\/, April. 27, 2020"},{"key":"3558_CR18","unstructured":"Who will win the race to blockchain supply chain supremacy? https:\/\/www.ibm.com\/blockchain\/industries\/supply-chain, April. 27, 2020"},{"key":"3558_CR19","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.comcom.2016.05.002","volume":"98","author":"MA Simplicio Jr","year":"2017","unstructured":"Simplicio MA Jr, Silva MVM, Alves RCA, Shibata TKC (2017) Lightweight and escrow-less authenticated key agreement for the Internet of Things. Comput Commun 98:43\u201351","journal-title":"Comput Commun"},{"key":"3558_CR20","doi-asserted-by":"crossref","unstructured":"Simplicio M., Oliveira B, Barreto P, Margi C, Carvalho T, Naslund M (2011) Comparison of authenticated-encryption schemes in wireless sensor networks. In: Proceedings of the 36th IEEE Conference on Local Computer Networks (LCN), 2011, pp 454\u2013461","DOI":"10.1109\/LCN.2011.6115506"},{"issue":"11","key":"3558_CR21","doi-asserted-by":"publisher","first-page":"4155","DOI":"10.1109\/TIE.2011.2178214","volume":"59","author":"D He","year":"2012","unstructured":"He D, Chen C, Chan S, Bu J (2012) SDRP: a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 59(11):4155\u20134163","journal-title":"IEEE Trans Ind Electron"},{"key":"3558_CR22","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.undsp.2017.10.004","volume":"2","author":"Z Dakhli","year":"2017","unstructured":"Dakhli Z, Lafhaj Z (2017) Efficient logistics enabled by smart solutions in tunneling. Undergr Space 2:227\u2013233","journal-title":"Undergr Space"},{"key":"3558_CR23","first-page":"20","volume":"10","author":"JM Danielsen","year":"2018","unstructured":"Danielsen JM, Engelseth P, Wang H (2018) Large scale integration of wireless sensor network technologies for air quality monitoring at a logistics shipping base. J Ind Inf Integr 10:20\u201328","journal-title":"J Ind Inf Integr"},{"key":"3558_CR24","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.rcim.2016.01.008","volume":"45","author":"H Luo","year":"2017","unstructured":"Luo H, Wang K, Kong XTR, Lu S, Qu T (2017) Synchronized production and logistics via ubiquitous computing technology. Robot Comput-Integr Manuf 45:99\u2013115","journal-title":"Robot Comput-Integr Manuf"},{"key":"3558_CR25","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18\u201336","journal-title":"ACM Trans Comput Syst"},{"issue":"8","key":"3558_CR26","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.1002\/dac.2405","volume":"27","author":"W Han","year":"2014","unstructured":"Han W, Zhu Z (2014) An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int J Commun Syst 27(8):1173\u20131185","journal-title":"Int J Commun Syst"},{"key":"3558_CR27","doi-asserted-by":"crossref","unstructured":"Simmons GJ (1984) The subliminal channel and digital signatures. In: Proceedings of the Eurocrypt\u201984 workshop on Advances in Cryptology, pp 364\u2013378","DOI":"10.1007\/3-540-39757-4_25"},{"key":"3558_CR28","doi-asserted-by":"crossref","unstructured":"Simmons GJ (1993) Subliminal communication is easy using the DSA. In: Proceedings of Eurocrypt\u201993, pp 218\u2013232","DOI":"10.1007\/3-540-48285-7_18"},{"key":"3558_CR29","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1109\/49.668969","volume":"16","author":"GJ Simmons","year":"1998","unstructured":"Simmons GJ (1998) The history of subliminal channels. IEEE J Sel Areas Commun 16:452\u2013462","journal-title":"IEEE J Sel Areas Commun"},{"key":"3558_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.techfore.2019.03.015","volume":"144","author":"SE Chang","year":"2019","unstructured":"Chang SE, Chen YC, Lu MF (2019) Supply chain re-engineering using blockchain technology: a case of smart contract based tracking process. Technol Forecast Soc Change 144:1\u201311","journal-title":"Technol Forecast Soc Change"},{"key":"3558_CR31","doi-asserted-by":"publisher","DOI":"10.3390\/s17071482","author":"CT Li","year":"2017","unstructured":"Li CT, Wu TY, Chen CL, Lee CC, Chen CM (2017) An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system. Sensors. https:\/\/doi.org\/10.3390\/s17071482","journal-title":"Sensors"},{"key":"3558_CR32","doi-asserted-by":"crossref","unstructured":"Das AK, Goswami A (2015) A robust anonymous biometric-based remote user authentication scheme using smart cards. J King Saud Univ Comput Inf Sci 27:193\u2013210","DOI":"10.1016\/j.jksuci.2014.03.020"},{"key":"3558_CR33","doi-asserted-by":"publisher","first-page":"830","DOI":"10.1016\/j.ejor.2016.08.032","volume":"264","author":"MG Speranza","year":"2018","unstructured":"Speranza MG (2018) Trends in transportation and logistics. Eur J Oper Res 264:830\u2013836","journal-title":"Eur J Oper Res"},{"key":"3558_CR34","first-page":"1","volume":"21","author":"V Odelu","year":"2015","unstructured":"Odelu V, Das AK, Goswami A (2015) An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card. J Inf Secur Appl 21:1\u201319","journal-title":"J Inf Secur Appl"},{"key":"3558_CR35","first-page":"44","volume":"23","author":"D Mishra","year":"2015","unstructured":"Mishra D, Chaturvedi A, Mukhopadhyay S (2015) Design of a lightweight two-factor authentication scheme with smart card revocation. J Inf Secur Appl 23:44\u201353","journal-title":"J Inf Secur Appl"},{"key":"3558_CR36","first-page":"64","volume":"30","author":"A Chaturvedi","year":"2016","unstructured":"Chaturvedi A, Das AK, Mishra D, Mukhopadhyay S (2016) Design of a secure smart card-based multi-server authentication scheme. J Inf Secur Appl 30:64\u201380","journal-title":"J Inf Secur Appl"},{"key":"3558_CR37","first-page":"59","volume":"36","author":"R Madhusudhan","year":"2017","unstructured":"Madhusudhan R, Hegde M (2017) Security bound enhancement of remote user authentication using smart card. J Inf Secur Appl 36:59\u201368","journal-title":"J Inf Secur Appl"},{"key":"3558_CR38","unstructured":"Store, deliverer, and package graphics. http:\/\/616pic.com\/, April. 27, 2020"},{"key":"3558_CR39","unstructured":"Blockchain center, logistics, and client graphics. https:\/\/zh.pngtree.com\/, April. 27, 2020"},{"issue":"4","key":"3558_CR40","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/MWC.2015.7224717","volume":"22","author":"MJ Marcus","year":"2015","unstructured":"Marcus MJ (2015) 5G and IMT for 2020 and beyond. IEEE Wirel Commun 22(4):2\u20133","journal-title":"IEEE Wirel Commun"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-020-03558-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-020-03558-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-020-03558-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T10:59:44Z","timestamp":1624273184000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-020-03558-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,8]]},"references-count":40,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["3558"],"URL":"https:\/\/doi.org\/10.1007\/s11227-020-03558-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,8]]},"assertion":[{"value":"3 December 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}