{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:28:20Z","timestamp":1742912900035,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030630065"},{"type":"electronic","value":"9783030630072"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63007-2_50","type":"book-chapter","created":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T00:02:39Z","timestamp":1606089759000},"page":"640-651","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Analysis of Segregated Witness Implementation for Increasing Efficiency and Security of the Bitcoin Cryptocurrency"],"prefix":"10.1007","author":[{"given":"Micha\u0142","family":"K\u0119dziora","sequence":"first","affiliation":[]},{"given":"Dawid","family":"Pieprzka","sequence":"additional","affiliation":[]},{"given":"Ireneusz","family":"J\u00f3\u017awiak","sequence":"additional","affiliation":[]},{"given":"Yongxin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Houbing","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,23]]},"reference":[{"key":"50_CR1","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.O., W\u00fcst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 3\u201316 (2016)","DOI":"10.1145\/2976749.2978341"},{"key":"50_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-030-32101-7_6","volume-title":"Financial Cryptography and Data Security","author":"T Neudecker","year":"2019","unstructured":"Neudecker, T., Hartenstein, H.: Short paper: an empirical analysis of blockchain forks in bitcoin. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 84\u201392. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32101-7_6"},{"key":"50_CR3","doi-asserted-by":"crossref","unstructured":"Decker, C., Wattenhofer, R.: Information propagation in the Bitcoin network. In: IEEE P2P 2013 Proceedings, pp. 1\u201310. IEEE (2013)","DOI":"10.1109\/P2P.2013.6688704"},{"key":"50_CR4","doi-asserted-by":"crossref","unstructured":"Kuzuno, H., Karam, C.: Blockchain explorer: an analytical process and investigation environment for Bitcoin. In 2017 APWG Symposium on Electronic Crime Research (eCrime), pp. 9\u201316. IEEE (2017)","DOI":"10.1109\/ECRIME.2017.7945049"},{"key":"50_CR5","unstructured":"Rudlang, M.: Comparative analysis of Bitcoin and Ethereum (Master\u2019s thesis, NTNU), Norwegian Univeristy of Science and Technology (2017)"},{"key":"50_CR6","unstructured":"Song, J.: Understanding Segwit Block Size\u2013Jimmy Song\u2013Medium (2017)"},{"key":"50_CR7","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-030-30440-9_22","volume-title":"Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology \u2013 ISAT 2019","author":"M Kedziora","year":"2020","unstructured":"Kedziora, M., Koz\u0142owski, P., Szczepanik, M., J\u00f3\u017awiak, P.: Analysis of Blockchain Selfish Mining Attacks. In: Borzemski, L., \u015awiatek, J., Wilimowska, Z. (eds.) ISAT 2019. AISC, vol. 1050, pp. 231\u2013240. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-30440-9_22"},{"key":"50_CR8","series-title":"Lecture Notes on Data Engineering and Communications Technologies","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-030-34706-2_10","volume-title":"Data-Centric Business and Applications","author":"M Kedziora","year":"2020","unstructured":"Kedziora, M., Gorka, A., Marianski, A., J\u00f3\u017awiak, P.: Anti-Cheat tool for detecting unauthorized user interference in the unity engine using Blockchain. In: Poniszewska-Mara\u0144da, A., Kryvinska, N., Jarzabek, S., Madeyski, L. (eds.) Data-Centric Business and Applications. LNDECT, vol. 40, pp. 191\u2013209. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-34706-2_10"},{"key":"50_CR9","unstructured":"BTC.TOP: btc.com Mining Pool Statistics (2018). https:\/\/btc.com\/stats\/pool\/BTC.TOP. Accessed Feb 2018"},{"key":"50_CR10","volume-title":"Mastering Bitcoin: Unlocking Digital Cryptocurrencies","author":"AM Antonopoulos","year":"2014","unstructured":"Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O\u2019Reilly Media Inc., Sebastopol (2014)"},{"key":"50_CR11","volume-title":"Mastering Bitcoin: Programming the Open Blockchain","author":"AM Antonopoulos","year":"2017","unstructured":"Antonopoulos, A.M.: Mastering Bitcoin: Programming the Open Blockchain. O\u2019Reilly Media Inc., Sebastopol (2017)"},{"key":"50_CR12","volume-title":"Bitcoin: Ultimate Guide to Understanding Blockchain, Bitcoin, Cryptocurrencies, Smart Contracts and the Future of Money","author":"P Nakamoto","year":"2017","unstructured":"Nakamoto, P.: Bitcoin: Ultimate Guide to Understanding Blockchain, Bitcoin, Cryptocurrencies, Smart Contracts and the Future of Money. CreateSpace Independent Publishing Platform, Scotts Valley (2017)"},{"key":"50_CR13","unstructured":"Nakamoto, S.: The Book of Satoshi: The Collected Writings of Bitcoin Creator Satoshi Nakamoto. Phil Champagne. e53 Publishing LLC (2014)"},{"key":"50_CR14","unstructured":"Song, J.: Programming Bitcoin: Learn how to Program Bitcoin from Scratch. O\u2019Reilly Media, Inc., Sebastopol (2019)"},{"key":"50_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2604-9","volume-title":"Blockchain Basics","author":"D Drescher","year":"2017","unstructured":"Drescher, D.: Blockchain Basics, vol. 276. Apress, Berkeley (2017)"},{"key":"50_CR16","doi-asserted-by":"crossref","unstructured":"Core, B.: Segregated witness benefits (2016). https:\/\/Bitcoincore.org\/en\/2016\/01\/26\/ segwit-benefits\/","DOI":"10.1016\/S0262-1762(16)70026-5"},{"key":"50_CR17","unstructured":"Fry, S.: BIP 148: Mandatory Activation of Segwit Deployment, GitHub, 12 March 2017"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63007-2_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T00:22:47Z","timestamp":1606090967000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-63007-2_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030630065","9783030630072"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63007-2_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"23 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Collective Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Da Nang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccci2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccci.pwr.edu.pl\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}