{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:48:46Z","timestamp":1747284526022,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030596170"},{"type":"electronic","value":"9783030596187"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59618-7_1","type":"book-chapter","created":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T11:31:01Z","timestamp":1600428661000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Reputation Based Hybrid Consensus for E-Commerce Blockchain"],"prefix":"10.1007","author":[{"given":"You","family":"Sun","sequence":"first","affiliation":[]},{"given":"Rui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Qianqian","family":"Su","sequence":"additional","affiliation":[]},{"given":"Pengchao","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,19]]},"reference":[{"key":"1_CR1","unstructured":"Delegated Proof-of-Stake Consensus. https:\/\/bitshares.org\/technology\/delegated-proof-of-stake-consensus\/"},{"key":"1_CR2","unstructured":"POA Network Whitepaper (2018). https:\/\/github.com\/poanetwork\/wiki\/wiki\/POA-Network-Whitepaper"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains (2018)","DOI":"10.1145\/3190508.3190538"},{"key":"1_CR4","first-page":"919","volume":"2016","author":"I Bentov","year":"2016","unstructured":"Bentov, I., Pass, R., Shi, E.: Snow white: provably secure proofs of stake. IACR Cryptol. ePrint Arch. 2016, 919 (2016)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-662-53357-4_2","volume-title":"Financial Cryptography and Data Security","author":"J Bonneau","year":"2016","unstructured":"Bonneau, J.: Why buy when you can rent? In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 19\u201326. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_2"},{"key":"1_CR6","unstructured":"Chen, J., Micali, S.: Algorand (2016)"},{"key":"1_CR7","unstructured":"community, N.: NXT Whitepaper (2014)"},{"issue":"7","key":"1_CR8","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/3212998","volume":"61","author":"I Eyal","year":"2018","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. Commun. ACM 61(7), 95\u2013102 (2018)","journal-title":"Commun. ACM"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1007\/978-3-319-91458-9_41","volume-title":"Database Systems for Advanced Applications","author":"F Gai","year":"2018","unstructured":"Gai, F., Wang, B., Deng, W., Peng, W.: Proof of reputation: a reputation-based consensus protocol for peer-to-peer network. In: Pei, J., Manolopoulos, Y., Sadiq, S., Li, J. (eds.) DASFAA 2018. LNCS, vol. 10828, pp. 666\u2013681. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91458-9_41"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Juels, A.: Proofs of work and bread pudding protocols (extended abstract). In: IFIP TC6\/TC11 Joint Working Conference on Secure Information Networks: Communications & Multimedia Security (1999)","DOI":"10.1007\/978-0-387-35568-9_18"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Karame, G., Androulaki, E., Capkun, S.: Double-spending fast payments in bitcoin. In: CCS 2012, Raleigh, NC, USA, pp. 906\u2013917 (2012)","DOI":"10.1145\/2382196.2382292"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/978-3-540-24676-3_34","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"A Kiayias","year":"2004","unstructured":"Kiayias, A., Tsiounis, Y., Yung, M.: Traceable signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 571\u2013589. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_34"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-63688-7_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"A Kiayias","year":"2017","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357\u2013388. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_12"},{"key":"1_CR14","unstructured":"King, S., Nadal, S.: PPCoin: peer-to-peer crypto-currency with proof-of-stake (2012)"},{"issue":"2","key":"1_CR15","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/279227.279229","volume":"16","author":"L Lamport","year":"1998","unstructured":"Lamport, L.: The part-time parliament. ACM Trans. Comput. Syst. 16(2), 133\u2013169 (1998)","journal-title":"ACM Trans. Comput. Syst."},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem (1982)","DOI":"10.1145\/357172.357176"},{"issue":"3","key":"1_CR17","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1504\/IJHPCN.2019.102138","volume":"14","author":"H Li","year":"2019","unstructured":"Li, H., Huang, H., Tan, S., Zhang, N., Fu, X., Tao, X.: A new revocable reputation evaluation system based on blockchain. IJHPCN 14(3), 385\u2013396 (2019)","journal-title":"IJHPCN"},{"issue":"4","key":"1_CR18","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1145\/571637.571640","volume":"20","author":"OTDC Miguel","year":"2002","unstructured":"Miguel, O.T.D.C.: Practical Byzantine fault tolerance. ACM Trans. Comput. Syst. 20(4), 398\u2013461 (2002)","journal-title":"ACM Trans. Comput. Syst."},{"key":"1_CR19","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008, consulted)"},{"key":"1_CR20","unstructured":"Ongaro, D., Ousterhout, J.K.: In search of an understandable consensus algorithm. In: USENIX ATC 2014, Philadelphia, PA, USA, 19\u201320 June 2014, pp. 305\u2013319 (2014)"},{"key":"1_CR21","unstructured":"Pass, R., Shi, E.: Hybrid consensus: efficient consensus in the permissionless model. In: DISC 2017, Vienna, Austria, pp. 39:1\u201339:16 (2017)"},{"key":"1_CR22","unstructured":"Rosenfeld, M.: Analysis of hashrate-based double spending. Eprint Arxiv (2014)"},{"key":"1_CR23","unstructured":"Schiller, E.M., Schwarzmann, A.A. (eds.): PODC 2017, Washington, DC, USA, 25\u201327 July 2017. ACM (2017)"},{"key":"1_CR24","unstructured":"Vasin, P.: BlackCoins Proof-of-Stake Protocol v2 (2017). www.blackcoin.co"},{"issue":"8","key":"1_CR25","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1109\/TC.2019.2900648","volume":"68","author":"J Yu","year":"2019","unstructured":"Yu, J., Kozhaya, D., Decouchant, J., Ver\u00edssimo, P.J.E.: RepuCoin: your reputation is your power. IEEE Trans. Comput. 68(8), 1225\u20131237 (2019)","journal-title":"IEEE Trans. Comput."}],"container-title":["Lecture Notes in Computer Science","Web Services \u2013 ICWS 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59618-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T14:04:53Z","timestamp":1726754693000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-59618-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030596170","9783030596187"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59618-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICWS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Honolulu, HI","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icws2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icws.org\/2020\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}