{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T00:27:51Z","timestamp":1724632071171},"reference-count":49,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/csnet.2017.8242004","type":"proceedings-article","created":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T21:31:33Z","timestamp":1514842293000},"source":"Crossref","is-referenced-by-count":14,"title":["Comparative analysis of blockchain technologies and TOR network: Two faces of the same reality?"],"prefix":"10.1109","author":[{"given":"Joanna","family":"Moubarak","sequence":"first","affiliation":[]},{"given":"Eric","family":"Filiol","sequence":"additional","affiliation":[]},{"given":"Maroun","family":"Chamoun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"15","author":"ali","year":"2015","journal-title":"ZombieCoin Powering Next-Generation Botnets"},{"key":"ref38","article-title":"Understanding Blockchain Consensus Models","author":"baliga","year":"2017","journal-title":"Persistent"},{"key":"ref33","year":"0","journal-title":"Github"},{"key":"ref32","year":"0","journal-title":"Github"},{"key":"ref31","year":"0","journal-title":"Github"},{"key":"ref30","year":"0","journal-title":"Github"},{"key":"ref37","author":"atzei","year":"2016","journal-title":"A survey of attacks on Ethereum smart contracts"},{"key":"ref36","year":"0","journal-title":"Hyperledger fabric"},{"key":"ref35","year":"0","journal-title":"Ethereum Blog"},{"key":"ref34","year":"2017","journal-title":"Hyperledger Fabric Blog"},{"key":"ref28","year":"0","journal-title":"Building a blockchain for business with the Hyperledger Project [Sound Recording]"},{"key":"ref27","author":"foundation","year":"0","journal-title":"Hyperledger"},{"key":"ref29","year":"0","journal-title":"Github"},{"key":"ref2","year":"0","journal-title":"Smart Contracts"},{"key":"ref1","year":"0","journal-title":"Smart Dubai"},{"key":"ref20","author":"wood","year":"2014","journal-title":"Ethereum A Secure Decentralised Generalised Transaction Ledger"},{"key":"ref22","article-title":"Swarm","author":"tron","year":"2016","journal-title":"Ethersphere"},{"key":"ref21","author":"wood","year":"2015","journal-title":"Performer"},{"key":"ref24","year":"2017","journal-title":"Github"},{"key":"ref23","author":"buterin","year":"2016","journal-title":"Ethereum 2 0 Mauve Paper"},{"key":"ref26","year":"2017","journal-title":"Github"},{"key":"ref25","author":"coleman","year":"0","journal-title":"State Channels"},{"key":"ref10","year":"2017","journal-title":"Who Will Become the King of Blockchain? IBM or Microsoft? [Film] Wealth Management Today"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1145\/343477.343502","article-title":"Towards robust distributed systems","author":"brewer","year":"2000","journal-title":"Proceedings of ACM Symposium on Principles of Distributed Computing (PODC"},{"key":"ref40","article-title":"Bitcoin's Blockchain Offers Safe Haven For Malware And Child Abuse, Warns Interpol","author":"breuster","year":"2015","journal-title":"Forbes"},{"key":"ref12","article-title":"Harvest, yield and scalable tolerant systems","author":"brewer","year":"1999","journal-title":"Hot Topics in Operating Systems IEEE 1999"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"ref14","author":"wattenhofer","year":"2017","journal-title":"Distributed Ledger Technology - The science of Blockchain"},{"key":"ref15","year":"2017","journal-title":"CoinDesk"},{"key":"ref16","year":"2017","journal-title":"History of Bitcoin"},{"key":"ref17","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref18","article-title":"A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM","author":"buterin","year":"2013","journal-title":"Ethereum Whitepaper"},{"key":"ref19","author":"diedrich","year":"2015","journal-title":"Ethereum Wildfire"},{"key":"ref4","year":"2017","journal-title":"Provenance Supply Chain Example –– Blockchain for Business [Film] IBM Blockchain"},{"key":"ref3","year":"2017","journal-title":"Blockchain explained [Film] IBM Blockchain"},{"key":"ref6","year":"2017","journal-title":"Consensus Shared Reference Data Example –– Blockchain for Business [Film] IBM Blockchain"},{"key":"ref5","year":"2017","journal-title":"Immutability Audit and Compliance Example –– Blockchain for Business [Film] IBM Blockchain"},{"key":"ref8","author":"bahga","year":"2017","journal-title":"Blockchain Application A Hands-On Approach Arshdeep Bahga & Vijay Madisetti"},{"key":"ref7","year":"2017","journal-title":"Finality Letter of Credit Example –– Blockchain for Business [Film] IBM Blockchain"},{"key":"ref49","author":"fisher","year":"2014","journal-title":"Researcher Finds Tor Exit Node Adding Malware to Binaries"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2535-6"},{"key":"ref46","year":"2017","journal-title":"StackExchange"},{"key":"ref45","author":"dingledine","year":"2014","journal-title":"Tor the Second-Generation Onion Router (2014 DRAFT v l)"},{"key":"ref48","author":"goodin","year":"2015","journal-title":"New attack on Tor can deanonymize hidden services with surprising accuracy"},{"key":"ref47","author":"filiol","year":"2017","journal-title":"Analysis of the TOR Routing Protocol"},{"key":"ref42","article-title":"At Least 1.65 Million Computers Are Mining Cryptocurrency for Hackers So Far This Year","author":"pearson","year":"2017","journal-title":"Motherboards"},{"key":"ref41","author":"suberg","year":"2017","journal-title":"THECOINTELEGRAPH"},{"key":"ref44","article-title":"Technical and Legal Overview of the Tor Anonymity Network","author":"caliskan","year":"2015","journal-title":"Tallinn"},{"key":"ref43","author":"fox-brewster","year":"0","journal-title":"Forbes"}],"event":{"name":"2017 1st Cyber Security in Networking Conference (CSNet)","location":"Rio de Janeiro","start":{"date-parts":[[2017,10,18]]},"end":{"date-parts":[[2017,10,20]]}},"container-title":["2017 1st Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8231154\/8241982\/08242004.pdf?arnumber=8242004","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,30]],"date-time":"2023-08-30T09:35:38Z","timestamp":1693388138000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8242004\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/csnet.2017.8242004","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}