{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:26:58Z","timestamp":1745321218685,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/ic3.2019.8844938","type":"proceedings-article","created":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T20:37:05Z","timestamp":1568925425000},"page":"1-4","source":"Crossref","is-referenced-by-count":11,"title":["Tampering Detection of Distributed Databases using Blockchain Technology"],"prefix":"10.1109","author":[{"given":"Kritika","family":"Rani","sequence":"first","affiliation":[]},{"given":"Chinmay","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Dynamic Prediction Based Watermarking for Temporal relational based Databases","author":"unnikrishnan","year":"2016","journal-title":"IEEE International Conference on Data Science and Engineering (ICDSE)"},{"key":"ref3","first-page":"26","article-title":"Detecting Database File Tampering through Page Carving","author":"wanger","year":"0","journal-title":"International Conference on Extending Database Technology (EDBT)"},{"key":"ref6","article-title":"Fragile Watermarking Scheme for Tamper Detection of Relational Database","author":"guo","year":"0","journal-title":"International Conference on Computer and Management (CAMAN)"},{"key":"ref5","article-title":"Database Tamper Detection And Analysis","volume":"105","author":"rajguru","year":"2014","journal-title":"International Journal of Computer Applications"},{"key":"ref8","article-title":"Blockchain - An Introduction","author":"bruyn","year":"2017","journal-title":"VU University Amsterdam"},{"key":"ref7","first-page":"493","article-title":"Fragile Database Watermarking for Malicious Tamper Detection Using Support Vector Regression","volume":"1","author":"meng-hsiun","year":"0","journal-title":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1145\/1412331.1412342","article-title":"Forensic Analysis Of Database Tampering","volume":"33","author":"pavlou","year":"2008","journal-title":"ACM Transactions on Database Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2487259.2487264"}],"event":{"name":"2019 Twelfth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2019,8,8]]},"location":"Noida, India","end":{"date-parts":[[2019,8,10]]}},"container-title":["2019 Twelfth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8830728\/8844868\/08844938.pdf?arnumber=8844938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T10:52:45Z","timestamp":1658141565000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8844938\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/ic3.2019.8844938","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}