{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:29Z","timestamp":1750309589647,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1145\/3723178.3723260","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:20:33Z","timestamp":1749194433000},"page":"623-628","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Event Detection and Trust Verification using Blockchain"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-4447-9451","authenticated-orcid":false,"given":"Amir Labib","family":"Khan","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, Khulna University of Engineering &amp; Technology, Khulna, Khulna, Khulna, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1228-9043","authenticated-orcid":false,"given":"K. M. Azharul","family":"Hasan","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Khulna University of Engineering &amp; Technology, Khulna, Khulna, Khulna, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2018.8606032"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00270"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN52240.2021.9522184"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-1089-9_79"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Erik Daniel and Florian Tschorsch. 2022. IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks. IEEE Communications Surveys & Tutorials 24 1 (2022) 31\u201352. 10.1109\/COMST.2022.3143147","DOI":"10.1109\/COMST.2022.3143147"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","unstructured":"Xingjian Ding Jianxiong Guo Deying Li and Weili Wu. 2021. An Incentive Mechanism for Building a Secure Blockchain-Based Internet of Things. IEEE Transactions on Network Science and Engineering 8 1 (2021) 477\u2013487. 10.1109\/TNSE.2020.3040446","DOI":"10.1109\/TNSE.2020.3040446"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"Yunhua He Hong Li Xiuzhen Cheng Yan Liu Chao Yang and Limin Sun. 2018. A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications. IEEE Access 6 (2018) 27324\u201327335. 10.1109\/ACCESS.2018.2821705","DOI":"10.1109\/ACCESS.2018.2821705"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Sung-Jung Hsiao and Wen-Tsai Sung. 2022. Blockchain-based supply chain information sharing mechanism. IEEE Access 10 (2022) 78875\u201378886.","DOI":"10.1109\/ACCESS.2022.3194157"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87304-210"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Nayreet Islam and Akramul Azim. 2020. A situation-aware task model for adaptive real-time systems. Journal of Ambient Intelligence and Humanized Computing 11 10 (2020) 4249\u20134259.","DOI":"10.1007\/s12652-020-01705-9"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50011-9_20"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Gustavo\u00a0A Oliva Ahmed\u00a0E Hassan and Zhen\u00a0Ming Jiang. 2020. An exploratory study of smart contracts in the Ethereum blockchain platform. Empirical Software Engineering 25 (2020) 1864\u20131904.","DOI":"10.1007\/s10664-019-09796-5"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S50200.2020.00043"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","unstructured":"Yongjun Ren Yepeng Liu Sai Ji Arun\u00a0Kumar Sangaiah and Jin Wang. 2018. Incentive Mechanism of Data Storage Based on Blockchain for Wireless Sensor Networks. Mobile Information Systems 2018 (29 Aug 2018) 6874158. 10.1155\/2018\/6874158","DOI":"10.1155\/2018\/6874158"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","unstructured":"Sara Rouhani and Ralph Deters. 2019. Security Performance and Applications of Smart Contracts: A Systematic Survey. IEEE Access 7 (2019) 50759\u201350779. 10.1109\/ACCESS.2019.2911031","DOI":"10.1109\/ACCESS.2019.2911031"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","unstructured":"Jin Sun Xiaomin Yao Shangping Wang and Ying Wu. 2020. Blockchain-Based Secure Storage and Access Scheme For Electronic Medical Records in IPFS. IEEE Access 8 (2020) 59389\u201359401. 10.1109\/ACCESS.2020.2982964","DOI":"10.1109\/ACCESS.2020.2982964"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.10299"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","unstructured":"Ashwin Verma Pronaya Bhattacharya Deepti Saraswat and Sudeep Tanwar. 2021. NyaYa: Blockchain-based electronic law record management scheme for judicial investigations. Journal of Information Security and Applications 63 (2021) 103025. 10.1016\/j.jisa.2021.103025","DOI":"10.1016\/j.jisa.2021.103025"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","unstructured":"Yao-Tsung Yang Li-Der Chou Chia-Wei Tseng Fan-Hsun Tseng and Chien-Chang Liu. 2019. Blockchain-Based Traffic Event Validation and Trust Verification for VANETs. IEEE Access 7 (2019) 30868\u201330877. 10.1109\/ACCESS.2019.2903202","DOI":"10.1109\/ACCESS.2019.2903202"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2018.000-8"}],"event":{"name":"ICCA 2024: 3rd International Conference on Computing Advancements","acronym":"ICCA 2024","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the 3rd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723260","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723178.3723260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:47Z","timestamp":1750298207000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723260"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":20,"alternative-id":["10.1145\/3723178.3723260","10.1145\/3723178"],"URL":"https:\/\/doi.org\/10.1145\/3723178.3723260","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"2025-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}