{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:10:22Z","timestamp":1760137822244,"version":"build-2065373602"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tsc.2025.3570857","type":"journal-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:15:57Z","timestamp":1760033757000},"page":"3093-3105","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Preserving Blockchain-Enabled Parametric Insurance via Remote Sensing and IoT"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0601-6631","authenticated-orcid":false,"given":"Mingyu","family":"Hao","sequence":"first","affiliation":[{"name":"School of Computing, Australian National University, Canberra, ACT, Australia"}]},{"given":"Keyang","family":"Qian","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Monash University, Clayton, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0362-2844","authenticated-orcid":false,"given":"Sid Chi-Kin","family":"Chau","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Sydney, NSW, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1111\/rmir.12146"},{"key":"ref2","article-title":"Global parametrics - Mexican reef protection program"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3575813.3576880"},{"year":"2022","key":"ref4","article-title":"Etherisc"},{"year":"2022","key":"ref5","article-title":"USGS global visualization viewer"},{"year":"2022","key":"ref6","article-title":"Earth online"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00022"},{"year":"2023","key":"ref8","article-title":"Gas and fees"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_35"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339817"},{"year":"2017","key":"ref11","article-title":"Munich re Blockchain initiative B3i gains truly international scope"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00273"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090245"},{"key":"ref14","article-title":"Verifiable computation using multiple provers","volume":"2014","author":"Blumberg","year":"2014","journal-title":"Cryptol. ePrint Arch."},{"key":"ref15","first-page":"219","article-title":"Flashproofs: Efficient zero-knowledge arguments of range and polynomial evaluation with transparent setup","volume-title":"Proc. 28th Int. Conf. Theory Appl. Cryptol. Inf. Secur.","author":"Wang"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1561\/9781638281252"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2856449"},{"key":"ref18","article-title":"Plonk: Permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge","volume":"2019","author":"Gabizon","year":"2019","journal-title":"Cryptol. ePrint Arch."},{"key":"ref19","first-page":"14:1","article-title":"Fast reed-solomon interactive oracle proofs of proximity","volume-title":"Proc. Int. Colloq. Automata, Lang., Program.","author":"Ben-Sasson"},{"key":"ref20","article-title":"Efficient polynomial commitment schemes for multiple points and polynomials","volume":"2020","author":"Boneh","year":"2021","journal-title":"Cryptol. ePrint Arch."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45721-1_26"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45721-1_24"},{"key":"ref24","article-title":"Scalable, transparent, and post-quantum secure computational integrity","volume":"2018","author":"Ben-Sasson","year":"2018","journal-title":"Cryptol. ePrint Arch."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90453-1_1"},{"volume-title":"Cryptography","year":"2017","author":"Buchanan","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_11"},{"article-title":"EIP-4844","year":"2022","author":"Community","key":"ref28"},{"article-title":"zk-SNARKs: A gentle introduction","year":"2019","author":"Nitulescu","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_12"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3801\/IAFSS.FSS.10-1449"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1071\/WF07049"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1111\/ele.12151"},{"article-title":"Digital earth Australia notebooks and tools repository","year":"2021","author":"Krause","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2535-6"},{"year":"2022","key":"ref36","article-title":"Goerli ETH\u2013What is the Goerli Testnet?"},{"year":"2023","key":"ref37","article-title":"Ethereum price"},{"year":"2022","key":"ref38","article-title":"EIP-197: Precompiled contracts for optimal pairing check on the elliptic curve alt bn128"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96881-0_2"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_12"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4629386\/11198176\/11198177.pdf?arnumber=11198177","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:31:04Z","timestamp":1760135464000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11198177\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":40,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2025.3570857","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"type":"electronic","value":"1939-1374"},{"type":"electronic","value":"2372-0204"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}