{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:31:51Z","timestamp":1755225111643,"version":"3.43.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T00:00:00Z","timestamp":1702512000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T00:00:00Z","timestamp":1702512000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,14]]},"DOI":"10.1109\/wetice57085.2023.10477832","type":"proceedings-article","created":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T14:43:21Z","timestamp":1711637001000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Trust-Centric User Authentication on Neo Blockchain: The Integration of zk-SNARKs Verification"],"prefix":"10.1109","author":[{"given":"Md Masum","family":"Musfique","sequence":"first","affiliation":[{"name":"Independent University Bangladesh,Dept. of Computer Science and Engineering,Dhaka,Bangladesh"}]},{"given":"Tanvir Ahmed","family":"Aadeef","sequence":"additional","affiliation":[{"name":"Independent University Bangladesh,Dept. of Computer Science and Engineering,Dhaka,Bangladesh"}]},{"given":"Md Samiur","family":"Rahman","sequence":"additional","affiliation":[{"name":"Independent University Bangladesh,Dept. of Computer Science and Engineering,Dhaka,Bangladesh"}]},{"given":"Monosij Kanti","family":"Sarker","sequence":"additional","affiliation":[{"name":"Independent University Bangladesh,Dept. of Computer Science and Engineering,Dhaka,Bangladesh"}]},{"given":"Md Fahad","family":"Monir","sequence":"additional","affiliation":[{"name":"Independent University Bangladesh,Dept. of Computer Science and Engineering,Dhaka,Bangladesh"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.06.027"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/isriti54043.2021.9702853"},{"key":"ref3","article-title":"Blockchain facts: What is it, how it works, and how it can be used","volume-title":"Investopedia","author":"Hayes","year":"2023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3135562"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.08.021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2938001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03058-6"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/icccn.2018.8487449"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/aiccsa.2018.8612856"},{"key":"ref10","article-title":"What is NEOVM and how does it work","volume-title":"Medium","author":"Wang","year":"2023"},{"key":"ref11","article-title":"Private blockchain vs. public blockchain: What\u2019s the difference?","volume-title":"Built In","author":"Kawamoto","year":"2023"},{"key":"ref12","article-title":"ZK-SNARKs explained: A beginner\u2019s guide [2023]","volume-title":"thirdweb","author":"Musharraf","year":"2023"},{"key":"ref13","article-title":"A review of zksnarks","author":"Chen","year":"2022","journal-title":"arXiv preprint"},{"volume-title":"Symmetric vs. Asymmetric Encryption - What are differences?","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/356789.356793"},{"key":"ref16","article-title":"Ethereum vs. EOS vs. NEO: Smart Contracts Developer Perspective Showdown","volume-title":"Medium","author":"Elrom","year":"2021"},{"key":"ref17","article-title":"What is Asymmetric Cryptography? Definition from Search","volume-title":"Security","author":"Brush","year":"2021"},{"article-title":"How is blockchain verifiable by the public and yet anonymous?","volume-title":"Consensys","year":"2020","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/nca.2018.8548057"},{"key":"ref20","article-title":"zkTree: A Zero-Knowledge Recursion Tree with ZKP Membership Proofs","author":"Deng","year":"2023","journal-title":"Cryptology ePrint Archive"},{"key":"ref21","article-title":"From POS to DBFT: A brief review of consensus protocols","volume-title":"Cointelegraph","author":"Kuznetsov","year":"2018"},{"key":"ref22","article-title":"Neo Blockchain 3.0: The Neo Crypto Network Reborn","volume-title":"Gemini","author":"Anziani","year":"2023"},{"key":"ref23","article-title":"The evolution of gas in the Neo N3 blockchain ecosystem","volume-title":"Neo News Today","author":"Grabowski","year":"2023"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/desec.2018.8625141"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/s22103956"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/info12050203"}],"event":{"name":"2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","start":{"date-parts":[[2023,12,14]]},"location":"Paris, France","end":{"date-parts":[[2023,12,16]]}},"container-title":["2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10477677\/10477776\/10477832.pdf?arnumber=10477832","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T05:28:47Z","timestamp":1755062927000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10477832\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,14]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/wetice57085.2023.10477832","relation":{},"subject":[],"published":{"date-parts":[[2023,12,14]]}}}