{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T18:23:30Z","timestamp":1769624610547,"version":"3.49.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T00:00:00Z","timestamp":1694476800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T00:00:00Z","timestamp":1694476800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,12]]},"DOI":"10.1109\/iicaiet59451.2023.10291379","type":"proceedings-article","created":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T13:48:39Z","timestamp":1698414519000},"page":"200-205","source":"Crossref","is-referenced-by-count":2,"title":["Blockchain-Based Anti-Counterfeit Product Identification System"],"prefix":"10.1109","author":[{"given":"Yen Xuan","family":"Lo","sequence":"first","affiliation":[{"name":"School of Computer Science, University of Nottingham, Malaysia,Selangor,Malaysia"}]},{"given":"Chye Cheah","family":"Tan","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Nottingham, Malaysia,Selangor,Malaysia"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2020.02.002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972026"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4337\/9781785366451.00030"},{"key":"ref31","author":"s","year":"0","journal-title":"5 Ways to Interpret a SUS Score-MeasuringU"},{"key":"ref30","article-title":"SUS: A quick and dirty usability scale","author":"brooke","year":"1995","journal-title":"[Online] ReasearchGate"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5121\/cseij.2021.11101"},{"key":"ref33","author":"tuan","year":"0","journal-title":"Blockbench A framework for analyzing private blockchains"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2010.02.001"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2812844"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2008.01.002"},{"key":"ref1","article-title":"The Economic Impacts of Counterfeiting and Piracy","year":"2017","journal-title":"[online] ICC-International Chamber of Commerce"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.tre.2019.09.019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1287\/msom.2018.0752"},{"key":"ref19","first-page":"877","article-title":"Fake Product Identification using Blockchain","volume":"9","author":"buvaneswari","year":"2021","journal-title":"International Journal of Applied Science and Engineering Research"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MobiSecServ48690.2020.9042950"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1051\/itmconf\/20224403015"},{"key":"ref23","author":"tambe","year":"0","journal-title":"Fake Product Detection Using Blockchain Technology"},{"key":"ref26","article-title":"MARKETING Magazine Asia","year":"2019","journal-title":"[online] MARKETING Magazine Asia"},{"key":"ref25","author":"desk","year":"2020","journal-title":"BloomBloc Blockchain partners with Malaysian Palm Oil Council"},{"key":"ref20","article-title":"Combating Copycats in the Supply Chain with Permissioned Blockchain Technology","author":"shen","year":"2021","journal-title":"Production and Operations Management"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2019.07.026"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1108\/SCM-09-2018-0309"},{"key":"ref28","volume":"192","author":"momjian","year":"2001","journal-title":"PostgreSQL Introduction and Concepts"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2535-6_9"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3524481.3527228"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1108\/03090560910935451"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015482707900"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3797\/scipharm.1202-03"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-11-2020-0471"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2018916579"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.019"},{"key":"ref5","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"}],"event":{"name":"2023 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)","location":"Kota Kinabalu, Malaysia","start":{"date-parts":[[2023,9,12]]},"end":{"date-parts":[[2023,9,14]]}},"container-title":["2023 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10291172\/10291205\/10291379.pdf?arnumber=10291379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T14:17:07Z","timestamp":1701094627000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10291379\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/iicaiet59451.2023.10291379","relation":{},"subject":[],"published":{"date-parts":[[2023,9,12]]}}}