{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:34:49Z","timestamp":1740141289469,"version":"3.37.3"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61960206014","61702437","61602363","61702437"],"award-info":[{"award-number":["61960206014","61702437","61602363","61702437"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Blockchain Core Technology Strategic Research Program of Ministry of Education","award":["2020KJ010801"],"award-info":[{"award-number":["2020KJ010801"]}]},{"name":"National key R&amp;D Program of China","award":["2019YFB1406403"],"award-info":[{"award-number":["2019YFB1406403"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["XJS191502"],"award-info":[{"award-number":["XJS191502"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hong Kong GRF","award":["PolyU 152165\/19E"],"award-info":[{"award-number":["PolyU 152165\/19E"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2022,5,1]]},"DOI":"10.1109\/tdsc.2020.3048159","type":"journal-article","created":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T21:14:16Z","timestamp":1609362856000},"page":"2122-2137","source":"Crossref","is-referenced-by-count":0,"title":["DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0394-4432","authenticated-orcid":false,"given":"Saiyu","family":"Qi","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Xi&#x0027;an JiaoTong University, Xi&#x0027;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3096-687X","authenticated-orcid":false,"given":"Yuanqing","family":"Zheng","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"given":"Yue","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Economics, Vrije Universiteit Amsterdam, HV Amsterdam, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5858-5070","authenticated-orcid":false,"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi&#x0027;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4251-1143","authenticated-orcid":false,"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi&#x0027;an, Shaanxi, China"}]},{"given":"Dongyi","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xi&#x0027;an JiaoTong University, Xi&#x0027;an, Shaanxi, China"}]},{"given":"Yong","family":"Qi","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xi&#x0027;an JiaoTong University, Xi&#x0027;an, Shaanxi, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2016.7847701"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0767-x"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-016-9727-x"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2306391"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2015.06.002"},{"key":"ref7","article-title":"Drug busters: Tracking down counterfeiters","author":"Datz","year":"2005","journal-title":"CSO Mag."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2366471"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2401036"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3183741"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00198"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3380594"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.biosystemseng.2013.09.006"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.15623\/IJRET.2016.0509001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.265"},{"key":"ref18","article-title":"BBC news"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2015.01.028"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2012.09.024"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2013.01.009"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2008.09.017"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1111\/j.1574-0862.2000.tb00275.x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11799-2_30"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942."},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2703922"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49151-6_18"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848086"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2536626"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2538260"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3026191"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2998166"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2011.5983948"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_25"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2003.1238183"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847936"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/337449.337465"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2962129"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2957239"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2923413"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2936977"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3021678"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2906802"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.01.012"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2960"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3302506.3310386"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813711"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.43"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2904704"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2846569"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2884713"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2868106"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2777481"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057035"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.09.002"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2686085"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s11156-006-0012-9"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijproman.2016.05.013"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6874158"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9773152\/09311166.pdf?arnumber=9311166","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:04:17Z","timestamp":1704841457000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9311166\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,1]]},"references-count":57,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2020.3048159","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2022,5,1]]}}}