{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:58:05Z","timestamp":1730231885420,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/icc40277.2020.9148867","type":"proceedings-article","created":{"date-parts":[[2020,7,27]],"date-time":"2020-07-27T18:26:45Z","timestamp":1595874405000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["An Online Verifiable Rating System Based on Unverified Rating Output (URTO)"],"prefix":"10.1109","author":[{"given":"Changxin","family":"Yang","sequence":"first","affiliation":[]},{"given":"Erwu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IWBOSE.2019.8666470"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GCWCN.2018.8668619"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDA.2019.8713204"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2018.8465233"},{"key":"ref14","article-title":"Developing the e-commerce model a consumer to consumer using blockchain network technique","volume":"11","author":"shorman","year":"2019","journal-title":"International Journal of Managing Information Technology (IJMIT) Vol"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194120"},{"key":"ref16","article-title":"A peer-to-peer electronic cash system","author":"nakamoto","year":"2008","journal-title":"Bitcoin"},{"key":"ref17","article-title":"Ethereum white paper: a next generation smart contract & decentralized application platform","volume":"53","author":"buterin","year":"2014","journal-title":"first version"},{"key":"ref18","first-page":"131","article-title":"The tangle","author":"popov","year":"2016","journal-title":"CIT"},{"journal-title":"Byteball A decentralized system for storage and transfer of value","year":"2016","author":"churyumov","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242592"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2017.8096051"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1361684.1361686"},{"key":"ref3","first-page":"19","article-title":"Blockchain-based trusted computing in social network","author":"fu","year":"2016","journal-title":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2018.8466516"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2019.8661978"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29238-6_8"},{"key":"ref7","first-page":"955","article-title":"A theoretical framework to build trust and prevent fake news in social media using blockchain","author":"jing","year":"2018","journal-title":"International Conference of Reliable Information and Communication Technology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3022227.3022325"},{"journal-title":"Collaborative Filtering on the Blockchain A Secure Recommender System for e-Commerce","year":"2016","author":"frey","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apmrv.2015.03.005"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2006","author":"hankerson","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSNET.2017.8241988"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35568-9_18"},{"journal-title":"Developer&#x2019;s Guide about Pay-to-PubKey-Hash (P2PKH)","year":"0","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v2i9.548"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761307"},{"journal-title":"Multichain private blockchain white paper","year":"2015","author":"greenspan","key":"ref25"}],"event":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","start":{"date-parts":[[2020,6,7]]},"location":"Dublin, Ireland","end":{"date-parts":[[2020,6,11]]}},"container-title":["ICC 2020 - 2020 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9141367\/9148588\/09148867.pdf?arnumber=9148867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T20:23:16Z","timestamp":1656361396000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9148867\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icc40277.2020.9148867","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}