{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:16:51Z","timestamp":1761621411491,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,8]],"date-time":"2018-10-08T00:00:00Z","timestamp":1538956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,8]]},"DOI":"10.1145\/3267305.3267547","type":"proceedings-article","created":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T19:05:14Z","timestamp":1541099114000},"page":"630-635","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["The Quality Control in Crowdsensing Based on Twice Consensuses of Blockchain"],"prefix":"10.1145","author":[{"given":"Danwei","family":"Liang","sequence":"first","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]},{"given":"Jian","family":"An","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University Shenzhen Research School, High-Tech Zone, Shenzhen, P.R. China"}]},{"given":"Jindong","family":"Cheng","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]},{"given":"He","family":"Yang","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]},{"given":"Ruowei","family":"Gui","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]}],"member":"320","published-online":{"date-parts":[[2018,10,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6069707"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2794400"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2415035"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130916"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632059"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2686085"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130972"},{"key":"e_1_3_2_1_8_1","volume-title":"Blockchain: the state of the art and future trends. Acta Automatica Sinica","author":"Yuan Y.","year":"2016","unstructured":"Yuan Y. , and Wang , F. Y . ( 2016 ). Blockchain: the state of the art and future trends. Acta Automatica Sinica . Yuan Y., and Wang, F. Y. (2016). Blockchain: the state of the art and future trends. Acta Automatica Sinica."},{"key":"e_1_3_2_1_9_1","volume-title":"Analysis of the Blockchain Protocol in Asynchronous Networks. International Conference on the Theory and Applications of Cryptographic Techniques (pp. 643--673)","author":"Pass R.","year":"2017","unstructured":"Pass R. , Seeman L. , and Shelat A . ( 2017 ). Analysis of the Blockchain Protocol in Asynchronous Networks. International Conference on the Theory and Applications of Cryptographic Techniques (pp. 643--673) . Springer, Cham. Pass R., Seeman L., and Shelat A. (2017). Analysis of the Blockchain Protocol in Asynchronous Networks. International Conference on the Theory and Applications of Cryptographic Techniques (pp. 643--673). Springer, Cham."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/21.52551"},{"key":"e_1_3_2_1_11_1","volume-title":"Protocols for secure computation. Focs, 160--164","author":"Yao A. C.","year":"1982","unstructured":"Yao , A. C. ( 1982 ). Protocols for secure computation. Focs, 160--164 . Yao, A. C. (1982). Protocols for secure computation. Focs, 160--164."},{"key":"e_1_3_2_1_12_1","volume-title":"UCI Machine Learning Repository. from http:\/\/archive.ics.uci.edu\/ml","author":"Dua D.","year":"2017","unstructured":"Dua , D. and Karra Taniskidou , E. ( 2017 ). UCI Machine Learning Repository. from http:\/\/archive.ics.uci.edu\/ml Dua, D. and Karra Taniskidou, E. (2017). UCI Machine Learning Repository. from http:\/\/archive.ics.uci.edu\/ml"}],"event":{"name":"UbiComp '18: The 2018 ACM International Joint Conference on Pervasive and Ubiquitous Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","University of Florida University of Florida","SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGSPATIAL ACM Special Interest Group on Spatial Information"],"location":"Singapore Singapore","acronym":"UbiComp '18"},"container-title":["Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267305.3267547","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3267305.3267547","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:21Z","timestamp":1750208241000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267305.3267547"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,8]]},"references-count":12,"alternative-id":["10.1145\/3267305.3267547","10.1145\/3267305"],"URL":"https:\/\/doi.org\/10.1145\/3267305.3267547","relation":{},"subject":[],"published":{"date-parts":[[2018,10,8]]},"assertion":[{"value":"2018-10-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}