{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T19:56:30Z","timestamp":1759694190137,"version":"3.37.3"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Eng. Manage."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tem.2021.3087112","type":"journal-article","created":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T19:59:35Z","timestamp":1625169575000},"page":"3710-3725","source":"Crossref","is-referenced-by-count":23,"title":["Blockchain-Based Solution for Detecting and Preventing Fake Check Scams"],"prefix":"10.1109","volume":"69","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4470-6406","authenticated-orcid":false,"given":"Badis","family":"Hammi","sequence":"first","affiliation":[{"name":"EPITA School of Engineering and Computer Science, Le Kremlin-Bic&#x00EA;tre, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5982-8190","authenticated-orcid":false,"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[{"name":"University of Kentucky, Lexington, KY, USA"}]},{"given":"Yves Christian Elloh","family":"Adja","sequence":"additional","affiliation":[{"name":"Telecom Paris, Palaiseau, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2389-4495","authenticated-orcid":false,"given":"Manlio Del","family":"Giudice","sequence":"additional","affiliation":[{"name":"University of Rome, Link Campus, Roma, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8610-3451","authenticated-orcid":false,"given":"Jamel","family":"Nebhen","sequence":"additional","affiliation":[{"name":"Prince Sattam bin Abdulaziz University, Al-Kharj, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8376948"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"ref31","first-page":"1","article-title":"An adaptive authentication and authorization scheme for IoT&#x2019;s gateways: A blockchain based approach","author":"fayad","year":"0","journal-title":"Proc 3rd Int Conf Secur Smart Cities Ind Control System Commun"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4236\/jsea.2016.910036"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3335772.3335936"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2969706"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1108\/JKM-10-2016-0443"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.130"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539529"},{"article-title":"Scalability analysis of blockchains through blockchain simulation","year":"2017","author":"goswami","key":"ref62"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2967218"},{"key":"ref63","first-page":"1861","article-title":"On the security and scalability of bitcoin&#x2019;s blockchain","author":"karame","year":"0","journal-title":"Proc 2016 ACM SIGSAC Conf Comput Commun Secur"},{"article-title":"Bitcoin: A peer-to-peer electronic cash system","year":"2008","author":"nakamoto","key":"ref28"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1165-9_57"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1177\/0020702017741909"},{"key":"ref65","first-page":"45","article-title":"Bitcoin-NG: A scalable blockchain protocol","author":"eyal","year":"0","journal-title":"Proc 13th Symp Netw Syst Des Implementation"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"article-title":"Cryptocurrencies, monetary stability and regulation","year":"2018","author":"mandeng","key":"ref67"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"year":"2019","key":"ref69","article-title":"A Blockchain Platform for the Enterprise, Hyperledger Fabric"},{"article-title":"Modernizing check fraud detection with machine learning","year":"2018","author":"rose","key":"ref2"},{"article-title":"Don&#x2019;t cash that check: BBB study shows how fake check scams bait consumers","year":"2018","author":"baker","key":"ref1"},{"article-title":"Check with electrically conductive layer","year":"1980","author":"bell jr","key":"ref20"},{"key":"ref22","first-page":"81","article-title":"Fake check scams: A blockchain based detection solution","author":"badis","year":"0","journal-title":"Proc 9th Int Conf Comput Sci Inf Technol"},{"article-title":"System and method for enhancing detection of counterfeit financial transaction documents","year":"1994","author":"mcwhortor","key":"ref21"},{"key":"ref24","first-page":"p. 177","article-title":"Smart contracts: Legal agreements for the blockchain","volume":"21","author":"o\u2019shields","year":"2017","journal-title":"NC Banking Inst"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3012295"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1186\/s40854-016-0034-9"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/fi9030025"},{"journal-title":"Secure Hash Standard (SHS)","first-page":"31","year":"2015","key":"ref50"},{"journal-title":"Digital Signature Standard (DSS) National Institute of Standards and Technology","first-page":"130","year":"2013","key":"ref51"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2018.00034"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/COMST.2005.1610546","article-title":"A survey and comparison of peer-to-peer overlay network schemes","volume":"7","author":"lua","year":"2005","journal-title":"IEEE Commun Surv Tut"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596782"},{"journal-title":"Semantics and Verification of Security Protocols","year":"2006","author":"cremers","key":"ref56"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"3440","DOI":"10.1109\/JSYST.2020.2970167","article-title":"A lightweight ECC-based authentication scheme for Internet of things (IoT)","volume":"14","author":"badis","year":"2020","journal-title":"IEEE Syst J"},{"key":"ref54","first-page":"252","article-title":"On the performance of signature schemes based on elliptic curves","author":"win","year":"0","journal-title":"Proc Int Algorithmic Number Theory Symp"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269719"},{"journal-title":"Public key cryptography for the financial services industry The Elliptic Curve Digital Signature Algorithm (ECDSA)","first-page":"128","year":"0","key":"ref52"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.004"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/978-1-4939-1320-6_9","article-title":"Financial and legal methods to protect individuals from financial exploitation","author":"factora","year":"2014","journal-title":"Aging and Money"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3335772.3335934"},{"key":"ref12","article-title":"Defense to a payor bank&#x2019;s liability for late returns","volume":"2","author":"smith","year":"2001","journal-title":"CCH Deposit Law Notes"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-1320-6_1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2014.6963162"},{"key":"ref15","first-page":"628","article-title":"An assessment of fraud and its management in nigeria commercial banks","volume":"10","author":"abiola","year":"2009","journal-title":"European Journal of Social Science"},{"key":"ref16","first-page":"103","article-title":"Effect of bank frauds on banking operations in Nigeria","volume":"1","author":"ojo","year":"2008","journal-title":"Int J Investment Finance"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67208-3_14"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46279-0_16"},{"article-title":"Coded checks and in methods of coding","year":"1974","author":"smagala","key":"ref19"},{"article-title":"FTC: The bottom-line on fake checks scams","year":"2020","author":"tressler","key":"ref4"},{"journal-title":"Federal Trade Commission","article-title":"Consumer sentinel network data book 2017","year":"2018","key":"ref3"},{"article-title":"AARP Foundation national fraud victim study","year":"2011","author":"pak","key":"ref6"},{"year":"0","key":"ref5","article-title":"2017 Internet crime report"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref49","first-page":"1","article-title":"An empirical study of Namecoin and lessons for decentralized Namespace design","author":"kalodner","year":"0","journal-title":"Proc Workshop Econ Inf Secur"},{"key":"ref7","first-page":"91","article-title":"Online deception investigation: Content analysis and cross-cultural comparison","volume":"6","author":"chen","year":"2011","journal-title":"Int J Bus Inf"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.046"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896108"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3335772.3335939"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144502417715"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/BF00252458"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2993.2994"},{"key":"ref44","first-page":"1","article-title":"Paxos made simple","volume":"35","author":"lamport","year":"2001","journal-title":"ACM SIGACT News"},{"article-title":"Viewstamped replication revisited","year":"2012","author":"liskov","key":"ref43"}],"container-title":["IEEE Transactions on Engineering Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/17\/9993768\/09469218.pdf?arnumber=9469218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,5]],"date-time":"2023-11-05T14:54:13Z","timestamp":1699196053000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9469218\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":69,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tem.2021.3087112","relation":{},"ISSN":["0018-9391","1558-0040"],"issn-type":[{"type":"print","value":"0018-9391"},{"type":"electronic","value":"1558-0040"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}