{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:55:15Z","timestamp":1743094515557,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030914233"},{"type":"electronic","value":"9783030914240"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-91424-0_5","type":"book-chapter","created":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T13:03:29Z","timestamp":1637067809000},"page":"75-93","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Toward Achieving Unanimity for Implicit Closings in a Trustless System"],"prefix":"10.1007","author":[{"given":"Mitsuyoshi","family":"Imamura","sequence":"first","affiliation":[]},{"given":"Kazumasa","family":"Omote","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,17]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"36500","DOI":"10.1109\/ACCESS.2019.2903554","volume":"7","author":"J Al-Jaroodi","year":"2019","unstructured":"Al-Jaroodi, J., Mohamed, N.: Blockchain in industries: a survey. IEEE Access 7, 36500\u201336515 (2019)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Ali, S.T., McCorry, P., Lee, P.H.J., Hao, F.: Zombiecoin 2.0: managing next-generation botnets using bitcoin. Int. J. Inf. Secur. 17(4), 411\u2013422 (2018)","key":"5_CR2","DOI":"10.1007\/s10207-017-0379-8"},{"doi-asserted-by":"crossref","unstructured":"Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: routing attacks on cryptocurrencies. In: IEEE Symposium on Security and Privacy (S&P), pp. 375\u2013392. IEEE (2017)","key":"5_CR3","DOI":"10.1109\/SP.2017.29"},{"doi-asserted-by":"crossref","unstructured":"Babaioff, M., Dobzinski, S., Oren, S., Zohar, A.: On bitcoin and red balloons. In: Proceedings of the 13th ACM Conference on Electronic Commerce, pp. 56\u201373. ACM (2012)","key":"5_CR4","DOI":"10.1145\/2229012.2229022"},{"unstructured":"Back, A., et al.: Hashcash-a denial of service counter-measure (2002). http:\/\/www.hashcash.org\/papers\/hashcash.pdf","key":"5_CR5"},{"doi-asserted-by":"crossref","unstructured":"Baden, M., Torres, C.F., Pontiveros, B.B.F., State, R.: Whispering botnet command and control instructions. In: 2019 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 77\u201381. IEEE (2019)","key":"5_CR6","DOI":"10.1109\/CVCBT.2019.00014"},{"doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Cimoli, T., Pompianu, L., Serusi, S.: Blockchain for social good: a quantitative analysis. In: Proceedings of the 4th EAI International Conference on Smart Objects and Technologies for Social Good, pp. 37\u201342. ACM (2018)","key":"5_CR7","DOI":"10.1145\/3284869.3284881"},{"unstructured":"Cunico, H.A., Dunne, S., Harpur, L.S., Silva, A.: Blockchain lifecycle management. US Patent App. 15\/848,036. 20 June 2019","key":"5_CR8"},{"doi-asserted-by":"crossref","unstructured":"DuPont, Q.: Experiments in algorithmic governance: a history and ethnography of \u201cthe DAO,\u201d a failed decentralized autonomous organization. Bitcoin and beyond, pp. 157\u2013177 (2017)","key":"5_CR9","DOI":"10.4324\/9781315211909-8"},{"issue":"1","key":"5_CR10","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s40812-019-00136-8","volume":"47","author":"D Fantazzini","year":"2020","unstructured":"Fantazzini, D., Zimin, S.: A multivariate approach for the simultaneous modelling of market risk and credit risk for cryptocurrencies. J. Ind. Bus. Econ. 47(1), 19\u201369 (2020)","journal-title":"J. Ind. Bus. Econ."},{"doi-asserted-by":"crossref","unstructured":"Gervais, A., Ritzdorf, H., Karame, G.O., Capkun, S.: Tampering with the delivery of blocks and transactions in bitcoin. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 692\u2013705. ACM (2015)","key":"5_CR11","DOI":"10.1145\/2810103.2813655"},{"key":"5_CR12","series-title":"Statistics and Computing","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-662-54486-0_16","volume-title":"Applied Quantitative Finance","author":"L Guo","year":"2017","unstructured":"Guo, L., Li, X.J.: Risk analysis of cryptocurrency as an alternative asset class. In: H\u00e4rdle, W.K., Chen, C.Y.-H., Overbeck, L. (eds.) Applied Quantitative Finance. SC, pp. 309\u2013329. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54486-0_16"},{"unstructured":"Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin\u2019s peer-to-peer network. In: 24th USENIX Security Symposium, pp. 129\u2013144. USENIX Association (2015)","key":"5_CR13"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/978-3-030-36938-5_31","volume-title":"Network and System Security","author":"M Imamura","year":"2019","unstructured":"Imamura, M., Omote, K.: Difficulty of decentralized structure due to rational user behavior on blockchain. In: Liu, J.K., Huang, X. (eds.) NSS 2019. LNCS, vol. 11928, pp. 504\u2013519. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-36938-5_31"},{"doi-asserted-by":"crossref","unstructured":"Kim, S.K., Ma, Z., Murali, S., Mason, J., Miller, A., Bailey, M.: Measuring Ethereum network peers. In: Proceedings of the Internet Measurement Conference 2018, pp. 91\u2013104. ACM (2018)","key":"5_CR15","DOI":"10.1145\/3278532.3278542"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/978-3-662-58387-6_23","volume-title":"Financial Cryptography and Data Security","author":"R Matzutt","year":"2018","unstructured":"Matzutt, R., et al.: A quantitative analysis of the impact of arbitrary blockchain content on bitcoin. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 420\u2013438. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-58387-6_23"},{"doi-asserted-by":"crossref","unstructured":"Motlagh, S.G., Misic, J., Misic, V.B.: Modeling of churn process in bitcoin network. In: 2020 International Conference on Computing, Networking and Communications (ICNC), pp. 686\u2013691. IEEE (2020)","key":"5_CR17","DOI":"10.1109\/ICNC47757.2020.9049704"},{"key":"5_CR18","doi-asserted-by":"publisher","first-page":"57009","DOI":"10.1109\/ACCESS.2019.2914098","volume":"7","author":"S Park","year":"2019","unstructured":"Park, S., Im, S., Seol, Y., Paek, J.: Nodes in the bitcoin network: comparative measurement study and survey. IEEE Access 7, 57009\u201357022 (2019)","journal-title":"IEEE Access"},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-030-41702-4_9","volume-title":"Information Security Theory and Practice","author":"T Sato","year":"2020","unstructured":"Sato, T., Imamura, M., Omote, K.: Threat analysis of poisoning attack against ethereum blockchain. In: Laurent, M., Giannetsos, T. (eds.) WISTP 2019. LNCS, vol. 12024, pp. 139\u2013154. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-41702-4_9"},{"unstructured":"Satoshi, N.: Bitcoin: a peer-to-peer electronic cash system (2008). http:\/\/www.bitcoin.org\/bitcoin.pdf","key":"5_CR20"},{"doi-asserted-by":"crossref","unstructured":"Tran, M., Choi, I., Moon, G.J., Vu, A.V., Kang, M.S.: A stealthier partitioning attack against bitcoin peer-to-peer network. In: IEEE Symposium on Security and Privacy (S&P). IEEE (2020)","key":"5_CR21","DOI":"10.1109\/SP40000.2020.00027"},{"doi-asserted-by":"crossref","unstructured":"Voigt, P., Von dem Bussche, A.: The EU General Data Protection Regulation (GDPR). A Practical Guide, 1st edn, Springer International Publishing, Cham (2017)","key":"5_CR22","DOI":"10.1007\/978-3-319-57959-7_1"},{"doi-asserted-by":"crossref","unstructured":"Walck, M., Wang, K., Kim, H.S.: Tendrilstaller: block delay attack in bitcoin. In: 2019 IEEE International Conference on Blockchain (Blockchain), pp. 1\u20139. IEEE (2019)","key":"5_CR23","DOI":"10.1109\/Blockchain.2019.00010"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Quality, Reliability, Security and Robustness in Heterogeneous Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-91424-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T08:08:09Z","timestamp":1641197289000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-91424-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030914233","9783030914240"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-91424-0_5","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"17 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"QShine","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"qshine2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/qshine.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EAI Confy+","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}