{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:45:38Z","timestamp":1726065938981},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811527760"},{"type":"electronic","value":"9789811527777"}],"license":[{"start":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T00:00:00Z","timestamp":1577059200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T00:00:00Z","timestamp":1577059200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T00:00:00Z","timestamp":1577059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-2777-7_18","type":"book-chapter","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T12:02:45Z","timestamp":1579867365000},"page":"212-225","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Design and Analysis of an Effective Securing Consensus Scheme for Decentralized Blockchain System"],"prefix":"10.1007","author":[{"given":"Jing","family":"Wang","sequence":"first","affiliation":[]},{"given":"Lingfu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei-Chang","family":"Yeh","sequence":"additional","affiliation":[]},{"given":"Jinhai","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,23]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Evans, D.S.: Economic aspects of Bitcoin and other decentralized public-ledger currency platforms. University of Chicago Coase-Sandor Institute for Law & Economics Research Paper No. 685 (2014)","DOI":"10.2139\/ssrn.2424516"},{"key":"18_CR2","unstructured":"Kwon, J.: Tendermint: consensus without mining (2014). http:\/\/tendermint.com\/docs\/tendermint_v04.pdf"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-662-46803-6_10","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"J Garay","year":"2015","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The Bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281\u2013310. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46803-6_10"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-662-48051-9_5","volume-title":"Financial Cryptography and Data Security","author":"A Laszka","year":"2015","unstructured":"Laszka, A., Johnson, B., Grossklags, J.: When Bitcoin mining pools run dry. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976, pp. 63\u201377. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48051-9_5"},{"issue":"3","key":"18_CR5","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2014.49","volume":"12","author":"A Gervais","year":"2014","unstructured":"Gervais, A., Karame, G., Capkun, S., Capkun, V.: Is Bitcoin a decentralized currency? IEEE Secur. Priv. 12(3), 54\u201360 (2014)","journal-title":"IEEE Secur. Priv."},{"issue":"11","key":"18_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1361-3723(13)70101-5","volume":"2013","author":"D Bradbury","year":"2013","unstructured":"Bradbury, D.: The problem with Bitcoin. Comput. Fraud Secur. 2013(11), 5\u20138 (2013)","journal-title":"Comput. Fraud Secur."},{"key":"18_CR7","unstructured":"Matonis, J.: The Bitcoin mining arms race: Ghash. IO and the 51% issue (2014)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Miller, A., Kosba, A., Katz, J., Shi, E.: Nonoutsourceable scratch-off puzzles to discourage Bitcoin mining coalitions. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 680\u2013691. ACM (2015)","DOI":"10.1145\/2810103.2813621"},{"key":"18_CR9","unstructured":"Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In: Proceedings of WEIS (2013)"},{"key":"18_CR10","unstructured":"Houy, N.: It will cost you nothing to \u201ckill\u201d a proof-of-stake crypto-currency (2014). http:\/\/papers.ssrn.com\/sol3\/papers.cfm"},{"key":"18_CR11","unstructured":"Duong, T., Fan, L., Zhou, H.-S.: 2-hop blockchain: combining proof-of-work and proof-of-stake securely (2016). https:\/\/eprint.iacr.org\/2016\/716"},{"issue":"3","key":"18_CR12","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/2695533.2695545","volume":"42","author":"I Bentov","year":"2014","unstructured":"Bentov, I., Lee, C., Mizrahi, A., Rosenfeld, M.: Proof of activity: extending bitcoin\u2019s proof of work via proof of stake [extended abstract] y. ACM SIGMETRICS Perform. Eval. Rev. 42(3), 34\u201337 (2014)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Vierhauser, M., Rabiser, R., Gr\u00fcnbacher, P.: A case study on testing, commissioning, and operation of very-large-scale software systems. In: Companion Proceedings of the 36th International Conference on Software Engineering, pp. 125\u2013134. ACM (2014)","DOI":"10.1145\/2591062.2591179"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Dubois, S., Guerraoui, R., Kuznetsov, P., Petit, F., Sens, P.: The weakest failure detector for eventual consistency. In: Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, pp. 375\u2013384. ACM (2015)","DOI":"10.1145\/2767386.2767404"},{"key":"18_CR15","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Manubot (2019)"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Pass, R., Shi, E.: Fruitchains: a fair blockchain. In: Proceedings of the ACM Symposium on Principles of Distributed Computing, pp. 315\u2013324. ACM (2017)","DOI":"10.1145\/3087801.3087809"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Talukder, A.K., Chaitanya, M., Arnold, D., Sakurai, K.: Proof of disease: a Blockchain consensus protocol for accurate medical decisions and reducing the disease burden. In: 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI), pp. 257\u2013262. IEEE (2018)","DOI":"10.1109\/SmartWorld.2018.00079"},{"key":"18_CR18","unstructured":"Dong, Z., Lee, Y.C., Zomaya, A.Y.: Proofware: proof of useful work blockchain consensus protocol for decentralized applications. arXiv preprint arXiv:1903.09276 (2019)"},{"key":"18_CR19","unstructured":"Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: Research perspectives on Bitcoin and second-generation cryptocurrencies. In: IEEE Symposium on Security and Privacy (2015)"},{"key":"18_CR20","unstructured":"Miller, A., LaViola Jr., J.J.: Anonymous byzantine consensus from moderately-hard puzzles: a model for Bitcoin (2014). http:\/\/nakamotoinstitute.org\/research\/anonymous-byzantine-consensus"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Bedford Taylor, M.: Bitcoin and the age of bespoke silicon. In: International Conference on Compilers, Architecture and Synthesis for Embedded Systems (CASES), pp. 1\u201310 (2013)","DOI":"10.1109\/CASES.2013.6662520"},{"key":"18_CR22","unstructured":"Tromp, J.: Cuckoo cycle: a memory-hard proof-of-work system. IACR Cryptology ePrint Archive, 59 (2014)"},{"key":"18_CR23","unstructured":"King, S., Nadal, S.: Ppcoin: peer-to-peer crypto-currency with proof-of-stake. Self-published paper, 19 August 2012"},{"key":"18_CR24","unstructured":"Vasin, P.: Blackcoin\u2019s proof-of-stake protocol v2 (2014). http:\/\/blackcoin.co\/blackcoin-pos-protocol-v2-whitepaper.pdf"},{"key":"18_CR25","unstructured":"Poelstra, A.: Distributed consensus from proof of stake is impossible. Self-published Paper (2014)"},{"key":"18_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-642-32946-3_29","volume-title":"Financial Cryptography and Data Security","author":"S Barber","year":"2012","unstructured":"Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better\u2014how to make Bitcoin a better currency. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 399\u2013414. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32946-3_29"},{"key":"18_CR27","unstructured":"Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In: Proceedings of WEIS. Citeseer (2013)"},{"key":"18_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-662-45472-5_28","volume-title":"Financial Cryptography and Data Security","author":"I Eyal","year":"2014","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436\u2013454. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_28"},{"key":"18_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-662-54970-4_30","volume-title":"Financial Cryptography and Data Security","author":"A Sapirshtein","year":"2017","unstructured":"Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in Bitcoin. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 515\u2013532. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54970-4_30"},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Garay, J.A.: Basic properties of the Blockchain: (invited talk). In: Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, p. 1. ACM (2017)","DOI":"10.1145\/3055518.3055519"},{"key":"18_CR31","unstructured":"Billingsley, P.: Convergence of Probability Measures. Wiley (2013)"}],"container-title":["Communications in Computer and Information Science","Blockchain and Trustworthy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-2777-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T22:05:13Z","timestamp":1630101913000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-2777-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,23]]},"ISBN":["9789811527760","9789811527777"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-2777-7_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019,12,23]]},"assertion":[{"value":"23 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BlockSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain and Trustworthy Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blocksys2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/blocksys.info\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}