{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:58:30Z","timestamp":1743116310760,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031192074"},{"type":"electronic","value":"9783031192081"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-19208-1_8","type":"book-chapter","created":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T00:03:45Z","timestamp":1668643425000},"page":"88-100","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Prototype System for\u00a0Blockchain Performance Evaluation"],"prefix":"10.1007","author":[{"given":"Kaixiang","family":"Hou","sequence":"first","affiliation":[]},{"given":"Tianyi","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiaobo","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Tie","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Fengbiao","family":"Zan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,17]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Hou, B., Chen, F.: A study on nine years of bitcoin transactions: understanding real-world behaviors of bitcoin miners and users. In: 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), pp. 1031\u20131043. IEEE (2020)","DOI":"10.1109\/ICDCS47774.2020.00091"},{"issue":"11","key":"8_CR2","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TSMC.2019.2895123","volume":"49","author":"S Wang","year":"2019","unstructured":"Wang, S., Ouyang, L., Yuan, Y., Ni, X., Han, X., Wang, F.Y.: Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans. Syst. Man Cybern. Syst. 49(11), 2266\u20132277 (2019)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"5","key":"8_CR3","doi-asserted-by":"publisher","first-page":"3915","DOI":"10.1109\/JIOT.2020.3025953","volume":"8","author":"H Xu","year":"2020","unstructured":"Xu, H., Zhang, L., Onireti, O., Fang, Y., Buchanan, W.J., Imran, M.A.: Beeptrace: blockchain-enabled privacy-preserving contact tracing for covid-19 pandemic and beyond. IEEE Internet Things J. 8(5), 3915\u20133929 (2020)","journal-title":"IEEE Internet Things J."},{"key":"8_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102710","volume":"167","author":"J Chi","year":"2020","unstructured":"Chi, J., et al.: A secure and efficient data sharing scheme based on blockchain in industrial internet of things. J. Netw. Comput. Appl. 167, 102710 (2020)","journal-title":"J. Netw. Comput. Appl."},{"issue":"5","key":"8_CR5","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1109\/JSAC.2020.2980916","volume":"38","author":"M Shen","year":"2020","unstructured":"Shen, M., et al.: Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J. Sel. Areas Commun. 38(5), 942\u2013954 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"5","key":"8_CR6","first-page":"2438","volume":"18","author":"J Weng","year":"2019","unstructured":"Weng, J., Weng, J., Zhang, J., Li, M., Zhang, Y., Luo, W.: Deepchain: auditable and privacy-preserving deep learning with blockchain-based incentive. IEEE Trans. Dependable Secure Comput. 18(5), 2438\u20132455 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"8_CR7","unstructured":"Foytik, P., Shetty, S., Gochhayat, S.P., Herath, E., Tosh, D., Njilla, L.: A blockchain simulator for evaluating consensus algorithms in diverse networking environments. In: 2020 Spring Simulation Conference (SpringSim), pp. 1\u201312. IEEE (2020)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Aoki, Y., Otsuki, K., Kaneko, T., Banno, R., Shudo, K.: Simblock: A blockchain network simulator. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 325\u2013329. IEEE (2019)","DOI":"10.1109\/INFCOMW.2019.8845253"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Stoykov, L., Zhang, K., Jacobsen, H.A.: Vibes: fast blockchain simulations for large-scale peer-to-peer networks. In: Proceedings of the 18th ACM\/IFIP\/USENIX Middleware Conference: Posters and Demos, pp. 19\u201320 (2017)","DOI":"10.1145\/3155016.3155020"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Carlsten, M., Kalodner, H., Weinberg, S.M., Narayanan, A.: On the instability of bitcoin without the block reward. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 154\u2013167 (2016)","DOI":"10.1145\/2976749.2978408"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Paulavi\u010dius, R., Grigaitis, S., Filatovas, E.: An overview and current status of blockchain simulators. In: 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1\u20133. IEEE (2021)","DOI":"10.1109\/ICBC51069.2021.9461114"},{"key":"8_CR12","unstructured":"Miller, A., Jansen, R.: $$\\{$$Shadow-Bitcoin$$\\}$$: Scalable simulation via direct execution of $$\\{$$Multi-Threaded$$\\}$$ applications. In: 8th Workshop on Cyber Security Experimentation and Test (CSET 2015) (2015)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.O., W\u00fcst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 3\u201316 (2016)","DOI":"10.1145\/2976749.2978341"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Faria, C., Correia, M.: Blocksim: blockchain simulator. In: 2019 IEEE International Conference on Blockchain (Blockchain), pp. 439\u2013446. IEEE (2019)","DOI":"10.1109\/Blockchain.2019.00067"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Dinh, T.T.A., Wang, J., Chen, G., Liu, R., Ooi, B.C., Tan, K.L.: Blockbench: a framework for analyzing private blockchains. In: Proceedings of the 2017 ACM International Conference on Management of Data, pp. 1085\u20131100 (2017)","DOI":"10.1145\/3035918.3064033"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Wuthier, S., Chang, S.Y.: Proof-of-work network simulator for blockchain and cryptocurrency research. In: 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS), pp. 1098\u20131101. IEEE (2021)","DOI":"10.1109\/ICDCS51616.2021.00110"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53\u201365. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_5"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Xu, T., Qiu, T., Hu, D., Mu, C., Wan, Z., Liu, W.: A scalable two-layer blockchain system for distributed multi-cloud storage in iiot. IEEE Trans. Industrial Inf. (2022)","DOI":"10.1109\/TII.2022.3179733"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1007\/3-540-45356-3_83","volume-title":"Parallel Problem Solving from Nature PPSN VI","author":"K Deb","year":"2000","unstructured":"Deb, K., Agrawal, S., Pratap, A., Meyarivan, T.: A fast elitist non-dominated sorting genetic algorithm for multi-objective optimization: NSGA-II. In: Schoenauer, M., et al. (eds.) PPSN 2000. LNCS, vol. 1917, pp. 849\u2013858. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45356-3_83"},{"key":"8_CR20","unstructured":"Kogias, E.K., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., Ford, B.: Enhancing bitcoin security and performance with strong consistency via collective signing. In: 25th Usenix Security Symposium (Usenix Security 2016), pp. 279\u2013296 (2016)"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Fan, Y., et al.: Dlbn: group storage mechanism based on double layer blockchain network. IEEE Internet of Things J. (2022)","DOI":"10.1109\/JIOT.2022.3170496"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19208-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T00:30:11Z","timestamp":1668645011000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19208-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031192074","9783031192081"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19208-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"17 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Algorithms, Systems, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dalian","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"265","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"95","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}