{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:23:27Z","timestamp":1730247807925,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,24]]},"DOI":"10.1109\/iciscae52414.2021.9590784","type":"proceedings-article","created":{"date-parts":[[2021,11,11]],"date-time":"2021-11-11T15:34:31Z","timestamp":1636644871000},"page":"30-34","source":"Crossref","is-referenced-by-count":0,"title":["Data security management of logistics network based on blockchain technology"],"prefix":"10.1109","author":[{"given":"Weisheng","family":"Wen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jun","family":"Ma","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shuqin","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","first-page":"29","volume":"62","author":"pannek","year":"2013","journal-title":"urgen Parallelizing a state exchange strategy for noncooperative dis-tributed nmpc Systems Control Letters"},{"key":"ref11","first-page":"839","article-title":"Hawk: Theblockchain model of cryptography and privacy-preserving smart contracts","author":"kosba","year":"2016","journal-title":"Security and Privacy"},{"key":"ref12","first-page":"19","volume":"8976","author":"m\u00f6ser","year":"2015","journal-title":"Trends tips tolls A longitudinal study of bitcoin transaction fees Social Science Electronic Publishing"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/SPW.2015.27"},{"key":"ref14","first-page":"2204","volume":"19","author":"li","year":"2018","journal-title":"Creditcoin 635 A pri-vacy-preserving blockchain-based incentive announcement network for communications of smart vehicles IEEE Transactions on Intelligent Trans-portation Systems"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TII.2018.2890203.25"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TII.2019.2902563"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TII.2019.2907092"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ICPHYS.2019.8780161"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/2484313.2484383"},{"year":"0","article-title":"Bitcoin:A peer-to-peer electronic cash system","key":"ref4"},{"key":"ref3","first-page":"347","volume":"58","author":"spengler","year":"1950","journal-title":"Vertical integration and antitrust policy Journal of Political Economy"},{"key":"ref6","first-page":"89","author":"goyal","year":"2006","journal-title":"Attribute-based encryption for fine-grained access control of encrypted data in ACM Conference on Computer and Communications Security"},{"year":"2004","author":"sahai","journal-title":"Fuzzy Identity-Based Encryption","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"ref7","first-page":"1","author":"xu","year":"2018","journal-title":"Secure fine-grained access control and data sharing for dynamic groups in cloud IEEE Transactions on Information Forensics and Security"},{"key":"ref2","first-page":"796","volume":"54","author":"demirag","year":"2010","journal-title":"Capacity allocation to sales agents in a decen-tralized logistics network &#x2020; Naval Research Logistics"},{"key":"ref1","first-page":"123","volume":"29","author":"lee","year":"2007","journal-title":"A heuristic to solve a sea cargo revenue manage-ment problem Or Spectrum"},{"year":"2007","author":"katja","journal-title":"Windt 1 changing paradigms in logistics understanding the shift from conventional control to autonomous cooperation and control in H'ulsmann M Windt K Understanding Autonomous Cooperaration Control - the Impact of Autonomy on Management Information Communi -cation Material Flow","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/SP.2007.11"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/978-3-642-32009-5_13"},{"key":"ref21","first-page":"99","author":"pirretti","year":"2006","journal-title":"Secure Attribute-Based System"}],"event":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","start":{"date-parts":[[2021,9,24]]},"location":"Dalian, China","end":{"date-parts":[[2021,9,26]]}},"container-title":["2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9590369\/9590638\/09590784.pdf?arnumber=9590784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:50:10Z","timestamp":1652187010000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9590784\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,24]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iciscae52414.2021.9590784","relation":{},"subject":[],"published":{"date-parts":[[2021,9,24]]}}}