{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:54:34Z","timestamp":1730213674047,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361289","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"0969-0974","source":"Crossref","is-referenced-by-count":0,"title":["Balanced Hashgraph Based on Dynamic MCMC: Efficient, Practical and Compatible"],"prefix":"10.1109","author":[{"given":"Jing","family":"Tao","sequence":"first","affiliation":[{"name":"Shenzhen Research Institute Xi'an Jiaotong University,Ministry of Education Key Lab For Intelligent Networks and Network Security,Xi'an,China"}]},{"given":"Jianghua","family":"Peng","sequence":"additional","affiliation":[{"name":"Xi’ an Jiaotong University,Ministry of Education Key Lab For Intelligent Networks and Network Security,Xi’ an,China"}]},{"given":"Tian","family":"Liu","sequence":"additional","affiliation":[{"name":"Xi’ an Jiaotong University,Ministry of Education Key Lab For Intelligent Networks and Network Security,Xi’ an,China"}]},{"given":"Yangfan","family":"Li","sequence":"additional","affiliation":[{"name":"Xi’ an Jiaotong University,Ministry of Education Key Lab For Intelligent Networks and Network Security,Xi’ an,China"}]},{"given":"Ruifeng","family":"Tian","sequence":"additional","affiliation":[{"name":"Xi’ an Jiaotong University,Ministry of Education Key Lab For Intelligent Networks and Network Security,Xi’ an,China"}]},{"given":"Chengpeng","family":"Wu","sequence":"additional","affiliation":[{"name":"Xi’ an Jiaotong University,Ministry of Education Key Lab For Intelligent Networks and Network Security,Xi’ an,China"}]}],"member":"263","reference":[{"volume-title":"Bitcoin: A peer-to-peer electronic cash system","year":"2008","author":"Nakamoto","key":"ref1"},{"key":"ref2","first-page":"9","article-title":"The swirlds hashgraph consensus algorithm: Fair, fast, byzantine fault tolerance","volume":"34","author":"Baird","year":"2016","journal-title":"Swirlds Tech Reports SWIRLDS-TR-2016\u201301, Tech. Rep"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359627"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.05.047"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.25103\/jestr"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2019.12.001"},{"key":"ref8","article-title":"Verifying the hashgraph consensus algorithm","author":"Crary","year":"2021","journal-title":"ArXiv, abs\/2102.01167"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485362"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3366624.3368165"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3452789"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3350755.3400272"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2903342"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v033.i02"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1086\/670067"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361289.pdf?arnumber=10361289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:56:45Z","timestamp":1705093005000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361289\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361289","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}