{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T22:56:25Z","timestamp":1767912985082,"version":"3.49.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T00:00:00Z","timestamp":1621900800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T00:00:00Z","timestamp":1621900800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s11227-021-03879-1","type":"journal-article","created":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T14:02:57Z","timestamp":1621951377000},"page":"343-360","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A study of application platform for smart contract visualization based blockchain"],"prefix":"10.1007","volume":"78","author":[{"given":"SoonHyeong","family":"Jeong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3431-9493","authenticated-orcid":false,"given":"Byeongtae","family":"Ahn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,25]]},"reference":[{"key":"3879_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102936","author":"B Farahani farshad","year":"2017","unstructured":"Farahani farshad B, Luecking M (2017) The convergence of IoT and distributed ledger technologies (DLT): opportunities, challenges, and solutions. J Netw Comput Appl. https:\/\/doi.org\/10.1016\/j.jnca.2020.102936","journal-title":"J Netw Comput Appl"},{"key":"3879_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2020.101519","author":"L Ante","year":"2021","unstructured":"Ante L (2021) Smart contracts on the blockchain \u2013 a bibliometric analysis and review. Telematics Inform. https:\/\/doi.org\/10.1016\/j.tele.2020.101519","journal-title":"Telematics Inform"},{"key":"3879_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102814","author":"AS Almasoud","year":"2020","unstructured":"Almasoud AS, Hussain FK, Hussain OK (2020) Smart contracts for blockchain-based reputation systems: a systematic literature review. J Netw Comput Appl. https:\/\/doi.org\/10.1016\/j.jnca.2020.102814","journal-title":"J Netw Comput Appl"},{"key":"3879_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102857","author":"T Hewa","year":"2021","unstructured":"Hewa T, Ylianttila M (2021) Survey on blockchain based smart contracts: Applications, opportunities and challenges. J Netw Comput Appl. https:\/\/doi.org\/10.1016\/j.jnca.2020.102857","journal-title":"J Netw Comput Appl"},{"issue":"8","key":"3879_CR5","doi-asserted-by":"publisher","first-page":"2337","DOI":"10.1016\/j.tele.2018.10.004","volume":"35","author":"D Macrinici","year":"2018","unstructured":"Macrinici D, Cartofeane C (2018) Smart contract applications within blockchain technology: a systematic mapping study. Telematics Inform 35(8):2337\u20132354. https:\/\/doi.org\/10.1016\/j.tele.2018.10.004","journal-title":"Telematics Inform"},{"key":"3879_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100360","author":"AH Lone","year":"2021","unstructured":"Lone AH, Naaz R (2021) Applicability of Blockchain smart contracts in securing Internet and IoT: a systematic literature review. Computer Sci Rev. https:\/\/doi.org\/10.1016\/j.cosrev.2020.100360","journal-title":"Computer Sci Rev"},{"key":"3879_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2020.102081","author":"F Agata","year":"2021","unstructured":"Agata F (2021) Regulating smart contracts: legal revolution or simply evolution? Telecommun Policy. https:\/\/doi.org\/10.1016\/j.telpol.2020.102081","journal-title":"Telecommun Policy"},{"issue":"3","key":"3879_CR8","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1016\/j.ejor.2019.06.051","volume":"281","author":"K Conboy","year":"2020","unstructured":"Conboy K, Mikalef P, Dennehy D, Krogstie J (2020) Using business analytics to enhance dynamic capabilities in operations research: a case analysis and research agenda. Eur J Oper Res 281(3):656\u2013672. https:\/\/doi.org\/10.1016\/j.ejor.2019.06.051","journal-title":"Eur J Oper Res"},{"key":"3879_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2019.e02541","author":"L Nelson","year":"2019","unstructured":"Nelson L, Jose A (2019) Big data analytics capability and co-innovation: an empirical study. Heliyon. https:\/\/doi.org\/10.1016\/j.heliyon.2019.e02541","journal-title":"Heliyon"},{"key":"3879_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2020.120315","author":"S Shamim","year":"2020","unstructured":"Shamim S, Zeng J (2020) Big data analytics capability and decision making performance in emerging market firms: the role of contractual and relational governance mechanisms. Technol Forecast Soc Chang. https:\/\/doi.org\/10.1016\/j.techfore.2020.120315","journal-title":"Technol Forecast Soc Chang"},{"key":"3879_CR11","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1016\/j.cie.2016.09.023","volume":"101","author":"R Addo-Tenkorang","year":"2016","unstructured":"Addo-Tenkorang R, Helo PT (2016) Big data applications in operations\/supply-chain management: a literature review. Comput Ind Eng 101:528\u2013543. https:\/\/doi.org\/10.1016\/j.cie.2016.09.023","journal-title":"Comput Ind Eng"},{"key":"3879_CR12","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.ins.2019.06.048","volume":"502","author":"B Huang","year":"2019","unstructured":"Huang B, Jin Li, Zhihui Lu, Yan M (2019) RDMA-driven mongoDB: An approach of RDMA enhanced NoSQL paradigm for large-scale data processing. Inf Sci 502:376\u2013393. https:\/\/doi.org\/10.1016\/j.ins.2019.06.048","journal-title":"Inf Sci"},{"key":"3879_CR13","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.cie.2016.09.023","volume":"86","author":"E Sch\u00e4ffer","year":"2019","unstructured":"Sch\u00e4ffer E, Mayr A, Fuchs J, Sjarov M (2019) Microservice-based architecture for engineering tools enabling a collaborative multi-user configuration of robot-based automation solutions. Procedia CIRP 86:86\u201391. https:\/\/doi.org\/10.1016\/j.cie.2016.09.023","journal-title":"Procedia CIRP"},{"key":"3879_CR14","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1016\/j.procs.2018.10.143","volume":"141","author":"F Kaimer","year":"2018","unstructured":"Kaimer F, Brune P (2018) Return of the JS: towards a node.js-based software architecture for combined CMS\/CRM applications. Procedia Computer Science 141:454\u2013459. https:\/\/doi.org\/10.1016\/j.procs.2018.10.143","journal-title":"Procedia Computer Science"},{"issue":"8","key":"3879_CR15","doi-asserted-by":"publisher","first-page":"11363","DOI":"10.1016\/j.cie.2016.09.023","volume":"36","author":"FE Boran","year":"2009","unstructured":"Boran FE, Gen\u00e7 S, Kurt M, Akay D (2009) A multi-criteria intuitionistic fuzzy group decision making for supplier selection with TOPSIS method. Expert Syst Appl 36(8):11363\u201311368. https:\/\/doi.org\/10.1016\/j.cie.2016.09.023","journal-title":"Expert Syst Appl"},{"key":"3879_CR16","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.procs.2016.08.135","volume":"96","author":"MA Zingla","year":"2016","unstructured":"Zingla MA, Chiraz L (2016) Short query expansion for microblog retrieval. Procedia Computer Sci 96:225\u2013234. https:\/\/doi.org\/10.1016\/j.procs.2016.08.135","journal-title":"Procedia Computer Sci"},{"issue":"13","key":"3879_CR17","doi-asserted-by":"publisher","first-page":"2463","DOI":"10.1016\/j.ifacol.2019.11.576","volume":"52","author":"H Borstell","year":"2019","unstructured":"Borstell H, Reggelin T (2019) Towards virtual commissioning of image-based information systems for state detection in logistics. IFAC-PapersOnLine 52(13):2463\u20132470. https:\/\/doi.org\/10.1016\/j.ifacol.2019.11.576","journal-title":"IFAC-PapersOnLine"},{"issue":"10","key":"3879_CR18","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/0011-684X(85)90032-2","volume":"27","author":"R Jones","year":"1985","unstructured":"Jones R (1985) The C programming language: popularity grows for the high-level assembly language\". Data Process 27(10):35\u201338. https:\/\/doi.org\/10.1016\/0011-684X(85)90032-2","journal-title":"Data Process"},{"issue":"1","key":"3879_CR19","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.elerap.2014.11.004","volume":"14","author":"K Chen","year":"2015","unstructured":"Chen K, Kou G, Shang J, Chen Y (2015) Visualizing market structure through online product reviews: integrate topic modeling. Electron Commer Res Appl 14(1):58\u201374. https:\/\/doi.org\/10.1016\/j.elerap.2014.11.004","journal-title":"Electron Commer Res Appl"},{"key":"3879_CR20","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1016\/j.sbspro.2013.08.095","volume":"96","author":"X Chen","year":"2013","unstructured":"Chen X, Hua L (2013) Research on e-commerce logistics system informationization in chain. Procedia Soc Behav Sci 96:838\u2013843. https:\/\/doi.org\/10.1016\/j.sbspro.2013.08.095","journal-title":"Procedia Soc Behav Sci"},{"issue":"10","key":"3879_CR21","doi-asserted-by":"publisher","first-page":"1868","DOI":"10.1111\/poms.12838","volume":"27","author":"TM Choi","year":"2018","unstructured":"Choi TM, Wallace SW, Wang Y (2018) Big data analytics in operations management. Prod Oper Manag 27(10):1868\u20131883. https:\/\/doi.org\/10.1111\/poms.12838","journal-title":"Prod Oper Manag"},{"issue":"5","key":"3879_CR22","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1016\/j.omega.2010.12.002","volume":"39","author":"TJ Barker","year":"2011","unstructured":"Barker TJ, Zabinsky ZB (2011) A multicriteria decision making model for reverse logistics using analytical hierarchy process. Omega 39(5):558\u2013573. https:\/\/doi.org\/10.1016\/j.omega.2010.12.002","journal-title":"Omega"},{"issue":"3","key":"3879_CR23","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1504\/IJSHC.2017.084732","volume":"2","author":"Xu Zheng","year":"2017","unstructured":"Zheng Xu (2017) The analytics and applications on supporting big data framework in wireless surveillance networks. Int J Social Humanistic Comput 2(3):141\u2013149. https:\/\/doi.org\/10.1504\/IJSHC.2017.084732","journal-title":"Int J Social Humanistic Comput"},{"key":"3879_CR24","doi-asserted-by":"publisher","first-page":"6132","DOI":"10.1016\/j.egypro.2019.01.498","volume":"158","author":"F Han","year":"2019","unstructured":"Han F, Chen Z (2019) An intelligent fault diagnosis method for PV arrays based on an improved rotation forest algorithm. Energy Procedia 158:6132\u20136138. https:\/\/doi.org\/10.1016\/j.egypro.2019.01.498","journal-title":"Energy Procedia"},{"issue":"3","key":"3879_CR25","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1504\/IJSHC.2017.084760","volume":"2","author":"C You-Shyang","year":"2017","unstructured":"You-Shyang C, Chien-Ku L, Chyuan-Yuh L, Huan-Ming C, Li-Chuan W (2017) Electronic commerce marketing-based social networks in evaluating competitive advantages using SORM. Int J Social Humanistic Comput 2(3):261\u2013277. https:\/\/doi.org\/10.1504\/IJSHC.2017.084760","journal-title":"Int J Social Humanistic Comput"},{"key":"3879_CR26","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.procs.2020.06.093","volume":"174","author":"M Usman","year":"2020","unstructured":"Usman M, Qamar U (2020) Secure electronic medical records storage and sharing using blockchain technology. Procedia Computer Sci 174:321\u2013327. https:\/\/doi.org\/10.1016\/j.procs.2020.06.093","journal-title":"Procedia Computer Sci"},{"key":"3879_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2020.11.066","author":"C de Villiers","year":"2020","unstructured":"de Villiers C, Kuruppu S (2020) A (new) role for business \u2013 promoting the United Nations\u2019 sustainable development goals through the internet-of-things and blockchain technology. J Bus Res. https:\/\/doi.org\/10.1016\/j.jbusres.2020.11.066","journal-title":"J Bus Res"},{"key":"3879_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2016.09.023","author":"B-S Eli","year":"2019","unstructured":"Eli B-S, Alessandro C, Eran T, Madars V (2019) Succinct non-interactive zero knowledge for a von neumann architecture. Computer Indus Eng. https:\/\/doi.org\/10.1016\/j.cie.2016.09.023","journal-title":"Computer Indus Eng"},{"key":"3879_CR29","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.jcss.2017.07.005","volume":"92","author":"G Ivanyos","year":"2018","unstructured":"Ivanyos G, Kulkarni R (2018) On the complexity of trial and error for constraint satisfaction problems. J Comput Syst Sci 92:48\u201364. https:\/\/doi.org\/10.1016\/j.jcss.2017.07.005","journal-title":"J Comput Syst Sci"},{"issue":"8","key":"3879_CR30","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1016\/j.jcss.2010.04.003","volume":"76","author":"H Chen","year":"2010","unstructured":"Chen H, Grohe M (2010) Constraint satisfaction with succinctly specified relations. J Comput Syst Sci 76(8):847\u2013860. https:\/\/doi.org\/10.1016\/j.jcss.2010.04.003","journal-title":"J Comput Syst Sci"},{"key":"3879_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2020.10.001","author":"B Soewito","year":"2020","unstructured":"Soewito B, Marcellinus Y (2020) IoT security system with modified Zero Knowledge Proof algorithm for authentication. Egypt Inform J. https:\/\/doi.org\/10.1016\/j.eij.2020.10.001","journal-title":"Egypt Inform J"},{"key":"3879_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2019.105864","author":"B Morrison","year":"2020","unstructured":"Morrison B, Groce A (2020) Oracle separations between quantum and non-interactive zero-knowledge classes. Inf Process Lett. https:\/\/doi.org\/10.1016\/j.ipl.2019.105864","journal-title":"Inf Process Lett"},{"key":"3879_CR33","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.ins.2019.03.063","volume":"490","author":"M Seo","year":"2019","unstructured":"Seo M, Abdalla M (2019) New technique for chosen-ciphertext security based on non-interactive zero-knowledge. Inf Sci 490:18\u201335. https:\/\/doi.org\/10.1016\/j.ins.2019.03.063","journal-title":"Inf Sci"},{"key":"3879_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/0140-3664(96)81600-8","author":"C Yung-Hsiang","year":"1995","unstructured":"Yung-Hsiang C (1995) ID-based non-interactive zero-knowledge proof system based on one-out-of-two non-interactive oblivious transfer. Computer Commun. https:\/\/doi.org\/10.1016\/0140-3664(96)81600-8","journal-title":"Computer Commun"},{"key":"3879_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102050","author":"X Yang","year":"2020","unstructured":"Yang X, Li W (2020) A zero-knowledge-proof-based digital identity management scheme in blockchain. Computer Secur. https:\/\/doi.org\/10.1016\/j.cose.2020.102050","journal-title":"Computer Secur"},{"key":"3879_CR36","doi-asserted-by":"publisher","unstructured":"Lynton L, Stefan K (2021) 8\u00a0-\u00a0Securing the digital witness identity using blockchain and zero-knowledge proofs. Strategy, Leadership, and AI in the Cyber Ecosystem. Pp. 159\u2013194. https:\/\/doi.org\/10.1016\/B978-0-12-821442-8.00010-0","DOI":"10.1016\/B978-0-12-821442-8.00010-0"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03879-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-03879-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03879-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T12:13:22Z","timestamp":1641298402000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-03879-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,25]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["3879"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-03879-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,25]]},"assertion":[{"value":"8 May 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}