{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T23:36:01Z","timestamp":1777937761111,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":4,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Basic Research Program of Key Scientific Research Projects of Henan Universities","award":["23ZX017"],"award-info":[{"award-number":["23ZX017"]}]},{"name":"Key Science and Technology Research Projects in Henan Province","award":["232102211082"],"award-info":[{"award-number":["232102211082"]}]},{"name":"the major scientific and technological project of Henan Province","award":["201300210200,201300210100"],"award-info":[{"award-number":["201300210200,201300210100"]}]},{"name":"the Collaborative innovation Key Project of Zhengzhou city","award":["21ZZXTCX07"],"award-info":[{"award-number":["21ZZXTCX07"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3594556.3594629","type":"proceedings-article","created":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T21:34:46Z","timestamp":1694554486000},"page":"148-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Pipeline-based Chain Structure Byzantine Consensus Algorithm for Blockchain Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8853-432X","authenticated-orcid":false,"given":"Xinlei","family":"Liu","sequence":"first","affiliation":[{"name":"Henan University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0637-9229","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Henan University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7519-029X","authenticated-orcid":false,"given":"Xiangyang","family":"Li","sequence":"additional","affiliation":[{"name":"Henan University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1611-7478","authenticated-orcid":false,"given":"Haohao","family":"Cao","sequence":"additional","affiliation":[{"name":"Henan University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0960-0769","authenticated-orcid":false,"given":"Yaoqi","family":"Wang","sequence":"additional","affiliation":[{"name":"Henan University of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-01023-z"},{"key":"e_1_3_2_1_2_1","volume-title":"An access control model for data security sharing cross-domain in consortium blockchain. IET Blockchain","author":"Liu Yang","year":"2023","unstructured":"Yang Liu , Weidong Yang , Yanlin Wang , and Yang Liu . 2023. An access control model for data security sharing cross-domain in consortium blockchain. IET Blockchain ( 2023 ). Yang Liu, Weidong Yang, Yanlin Wang, and Yang Liu. 2023. An access control model for data security sharing cross-domain in consortium blockchain. IET Blockchain (2023)."},{"key":"e_1_3_2_1_3_1","volume-title":"Blockchain application in modern logistics information sharing: A review and case study analysis. Production Planning & Control","author":"Xu Xiaofeng","year":"2022","unstructured":"Xiaofeng Xu and Yangyang He. 2022. Blockchain application in modern logistics information sharing: A review and case study analysis. Production Planning & Control ( 2022 ), 1\u201315. Xiaofeng Xu and Yangyang He. 2022. Blockchain application in modern logistics information sharing: A review and case study analysis. Production Planning & Control (2022), 1\u201315."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102659"}],"event":{"name":"ASIA CCS '23: ACM Asia Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594629","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3594556.3594629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:07Z","timestamp":1750183747000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594629"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":4,"alternative-id":["10.1145\/3594556.3594629","10.1145\/3594556"],"URL":"https:\/\/doi.org\/10.1145\/3594556.3594629","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}