{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T08:56:27Z","timestamp":1753520187638,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1145\/3573942.3573973","type":"proceedings-article","created":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T23:45:42Z","timestamp":1684280742000},"page":"197-204","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on Blockchain Consensus Algorithm for Secure Data Sharing on Industrial Internet Platform"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5078-3339","authenticated-orcid":false,"given":"Chao","family":"Jia","sequence":"first","affiliation":[{"name":"School of Computer Science, Xi'an University of Posts &amp; Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9173-7934","authenticated-orcid":false,"given":"Lili","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Computer Science, Xi'an University of Posts &amp; Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4369-4826","authenticated-orcid":false,"given":"Min","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Xi'an University of Posts &amp; Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2023,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"22","volume":"2018","author":"Zhongyi Huang","unstructured":"Huang Zhongyi. Exploring applications of blockchain technology in the field of industrial internet platform security[J]. Cyberspace Security,2018,9(10):22-25+33.","journal-title":"Cyberspace Security"},{"key":"e_1_3_2_1_2_1","first-page":"152","volume":"2022","author":"Yi Shen","unstructured":"Shen Yi, Zhou Chunjie, Hu Xiaoya, Cheng Zhan, He Xin, Tai Ruochen. Design of privacy protection control strategy for data opacity in industrial Internet[J]. China Science:Technical Science,2022,52(01):152-164.","journal-title":"China Science:Technical Science"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.15888\/j.cnki.csa.008148"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.16644\/j.cnki.cn33-1094"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.19358\/j.issn.2096-5133.2021.01.001"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.26969\/d.cnki.gbydu.2021.001018"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.27675\/d.cnki.gcydx.2021.000446"},{"key":"e_1_3_2_1_8_1","first-page":"75","volume":"2020","author":"Peiru Fan","unstructured":"Fan Peiru,Wang Chonghua. Data security perspective on attacks and protection of industrial Internet platforms[J]. Cyberspace Security,2020,11(02):75-80.","journal-title":"Cyberspace Security"},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE","author":"Ma B","year":"2020","unstructured":"Ma B , Chi C , Tian J . Access Authentication Architecture Design of Industrial Internet Identification and Resolution System[C]\/\/ 2020 IEEE\/CIC International Conference on Communications in China (ICCC). IEEE, 2020."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(20)30072-6"},{"key":"e_1_3_2_1_11_1","volume-title":"A Blockchain-Based Access Control Framework for Secured Data Sharing in Industrial Internet[C]\/\/ 2020 Eighth International Conference on Advanced Cloud and Big Data (CBD)","author":"Zhou W","year":"2020","unstructured":"Zhou W , Jin J . A Blockchain-Based Access Control Framework for Secured Data Sharing in Industrial Internet[C]\/\/ 2020 Eighth International Conference on Advanced Cloud and Big Data (CBD). 2020."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.26935\/d.cnki.gbjgu.2020.000659"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14022\/j.issn1674-6236.2022.05.035"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.26969\/d.cnki.gbydu.2021.002000"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.27029\/d.cnki.ggdgu.2021.001030"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.27029\/d.cnki.ggdgu.2021.001030"},{"key":"e_1_3_2_1_17_1","first-page":"58","volume":"2019","author":"Weiwei Fang","unstructured":"Fang Weiwei,Zijiyue,Song Huili,Wang Yunpeng,Ding Yi. An optimized PBFT consensus algorithm for blockchain[J]. Journal of Beijing Jiaotong University,2019,43(05):58-64.","journal-title":"Journal of Beijing Jiaotong University"},{"key":"e_1_3_2_1_18_1","volume-title":"Larrea M","author":"Crain","year":"2018","unstructured":"Crain T, Gramoli V, Larrea M, DBFT: Efficient Leaderless Byzantine Consensus and its Application to Blockchains[C]\/\/ 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA). IEEE Computer Society, 2018."},{"key":"e_1_3_2_1_19_1","volume-title":"ACM","author":"Zyzzyva Kotla R.","year":"2007","unstructured":"Kotla R. Zyzzyva: Speculative Byzantine Fault Tolerance[C]\/\/ Acm Sigops Symposium on Operating Systems Principles. ACM, 2007."},{"key":"e_1_3_2_1_20_1","volume-title":"HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance[C]\/\/ 7th Symposium on Operating Systems Design and Implementation (OSDI '06)","author":"Cowling J A","year":"2006","unstructured":"Cowling J A, Myers D S, Liskov B, HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance[C]\/\/ 7th Symposium on Operating Systems Design and Implementation (OSDI '06), November 6-8, Seattle, WA, USA. USENIX Association, 2006."},{"key":"e_1_3_2_1_21_1","volume-title":"Short Signatures from the Weil Pairing[C]\/\/ International Conference on the Theory and Application of Cryptology and Information Security","author":"Dan B","year":"2001","unstructured":"Dan B , Lynn B , Shacham H . Short Signatures from the Weil Pairing[C]\/\/ International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, 2001."}],"event":{"name":"AIPR 2022: 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","acronym":"AIPR 2022","location":"Xiamen China"},"container-title":["Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3573973","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573942.3573973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:22Z","timestamp":1750182562000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3573973"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":21,"alternative-id":["10.1145\/3573942.3573973","10.1145\/3573942"],"URL":"https:\/\/doi.org\/10.1145\/3573942.3573973","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"2023-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}