{"id":"https://openalex.org/W7127607972","doi":"https://doi.org/10.1109/dese68208.2025.11368204","title":"Blockchain-Based Authentication System for Pharmaceutical Product Verification","display_name":"Blockchain-Based Authentication System for Pharmaceutical Product Verification","publication_year":2025,"publication_date":"2025-11-10","ids":{"openalex":"https://openalex.org/W7127607972","doi":"https://doi.org/10.1109/dese68208.2025.11368204"},"language":null,"primary_location":{"id":"doi:10.1109/dese68208.2025.11368204","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dese68208.2025.11368204","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 18th International Conference on Development in eSystem Engineering (DeSE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002844559","display_name":"Benson Okpara","orcid":null},"institutions":[{"id":"https://openalex.org/I874055015","display_name":"Teesside University","ror":"https://ror.org/03z28gk75","country_code":"GB","type":"education","lineage":["https://openalex.org/I874055015"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Benson Okpara","raw_affiliation_strings":["Teesside University,Middlesbrough,UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Teesside University,Middlesbrough,UK","institution_ids":["https://openalex.org/I874055015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000695312","display_name":"Zia Ush Shamszaman","orcid":"https://orcid.org/0000-0003-1954-1950"},"institutions":[{"id":"https://openalex.org/I874055015","display_name":"Teesside University","ror":"https://ror.org/03z28gk75","country_code":"GB","type":"education","lineage":["https://openalex.org/I874055015"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zia Ush Shamszaman","raw_affiliation_strings":["Teesside University,Middlesbrough,UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Teesside University,Middlesbrough,UK","institution_ids":["https://openalex.org/I874055015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125042192","display_name":"Shatha Ghareeb","orcid":null},"institutions":[{"id":"https://openalex.org/I874055015","display_name":"Teesside University","ror":"https://ror.org/03z28gk75","country_code":"GB","type":"education","lineage":["https://openalex.org/I874055015"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shatha Ghareeb","raw_affiliation_strings":["Teesside University,Middlesbrough,UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Teesside University,Middlesbrough,UK","institution_ids":["https://openalex.org/I874055015"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5116585917","display_name":"Jamila Mustafina Kazan","orcid":null},"institutions":[{"id":"https://openalex.org/I21203515","display_name":"Kazan Federal University","ror":"https://ror.org/05256ym39","country_code":"RU","type":"education","lineage":["https://openalex.org/I21203515"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Jamila Mustafina Kazan","raw_affiliation_strings":["Jamila Mustafina Kazan, Federal University Kazan,Russia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Jamila Mustafina Kazan, Federal University Kazan,Russia","institution_ids":["https://openalex.org/I21203515"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5002844559"],"corresponding_institution_ids":["https://openalex.org/I874055015"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.81483107,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"440","last_page":"445"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.4291999936103821,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.4291999936103821,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12878","display_name":"Pharmaceutical Quality and Counterfeiting","score":0.18449999392032623,"subfield":{"id":"https://openalex.org/subfields/2739","display_name":"Public Health, Environmental and Occupational Health"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.03739999979734421,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5863999724388123},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5245000123977661},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.5097000002861023},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5041000247001648},{"id":"https://openalex.org/keywords/counterfeit","display_name":"Counterfeit","score":0.43459999561309814},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4106000065803528},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.3456000089645386},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.321399986743927}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6876000165939331},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6068999767303467},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5863999724388123},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5245000123977661},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.5097000002861023},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5041000247001648},{"id":"https://openalex.org/C2779356469","wikidata":"https://www.wikidata.org/wiki/Q502918","display_name":"Counterfeit","level":2,"score":0.43459999561309814},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4106000065803528},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.3456000089645386},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.321399986743927},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.3077999949455261},{"id":"https://openalex.org/C92446256","wikidata":"https://www.wikidata.org/wiki/Q3306762","display_name":"Data validation","level":2,"score":0.2939000129699707},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.26980000734329224},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.25949999690055847},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2581999897956848},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.2538999915122986},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.25369998812675476},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.251800000667572}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dese68208.2025.11368204","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dese68208.2025.11368204","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 18th International Conference on Development in eSystem Engineering (DeSE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6625624895095825}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W4284679988","https://openalex.org/W4302009621","https://openalex.org/W4319663624","https://openalex.org/W4365804432","https://openalex.org/W4376602784","https://openalex.org/W4377010879","https://openalex.org/W4383868427","https://openalex.org/W4386223550","https://openalex.org/W4387436616","https://openalex.org/W4392095203","https://openalex.org/W4394893856"],"related_works":[],"abstract_inverted_index":{"This":[0,159],"project":[1,111,143],"develops":[2],"a":[3,12,47,51,90,145,162],"blockchain-based":[4],"web":[5],"application":[6,45],"aimed":[7],"at":[8],"verifying":[9],"pharmaceutical":[10,42,157,174],"products,":[11],"critical":[13,128],"step":[14],"in":[15,81,103,132,148,173],"combating":[16],"counterfeit":[17],"drugs.":[18],"By":[19],"leveraging":[20],"Ethereum's":[21],"Sepolia":[22],"test":[23],"network":[24],"and":[25,40,62,87,101,123,152],"the":[26,31,71,94,110,113,142,156],"power":[27],"of":[28,83,109,115,141,168],"smart":[29],"contracts,":[30],"system":[32],"facilitates":[33],"secure,":[34],"transparent":[35],"processes":[36],"for":[37,59,99,118,135,165],"registering,":[38],"verifying,":[39],"tracking":[41],"items.":[43],"The":[44,68,106,139],"combines":[46],"PHP-based":[48],"backend":[49],"with":[50],"JavaScript-powered":[52],"frontend,":[53],"seamlessly":[54],"integrating":[55],"tools":[56],"like":[57],"MetaMask":[58],"user":[60],"authentication":[61,121,137],"Web3.js":[63],"to":[64,126],"enable":[65],"blockchain":[66,74],"communication.":[67],"study":[69],"underscores":[70],"significant":[72],"advantages":[73],"offers":[75],"over":[76],"traditional":[77],"verification":[78],"methods,":[79],"particularly":[80],"terms":[82],"data":[84,124],"integrity,":[85],"transparency,":[86],"security.":[88,105],"As":[89],"result,":[91],"it":[92],"meets":[93],"CIA":[95],"triad":[96],"model's":[97],"requirements":[98],"confidentiality":[100],"integrity":[102],"information":[104],"novel":[107],"features":[108],"include":[112],"use":[114],"optimism":[116],"roll-ups":[117],"scalability,":[119],"two-factor":[120],"(2FA),":[122],"encryption":[125],"address":[127],"challenges":[129],"often":[130],"overlooked":[131],"similar":[133],"proposals":[134],"blockchainbased":[136],"systems.":[138],"results":[140],"demonstrate":[144],"tangible":[146],"improvement":[147],"supply":[149],"chain":[150],"transparency":[151],"fraud":[153],"prevention":[154],"within":[155],"industry.":[158],"work":[160],"lays":[161],"strong":[163],"foundation":[164],"further":[166],"exploration":[167],"decentralised":[169],"applications,":[170],"not":[171],"only":[172],"validation":[175],"but":[176],"also":[177],"across":[178],"other":[179],"essential":[180],"sectors.":[181]},"counts_by_year":[],"updated_date":"2026-04-30T09:15:22.047038","created_date":"2026-02-06T00:00:00"}
