{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:28:21Z","timestamp":1743085701107,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031534980"},{"type":"electronic","value":"9783031534997"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53499-7_30","type":"book-chapter","created":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T20:03:01Z","timestamp":1709150581000},"page":"373-382","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SMART CONTRACTS Based Peer to Peer Communication in Blockchain: A Decentralized Approach"],"prefix":"10.1007","author":[{"given":"Satya Bhushan","family":"Verma","sequence":"first","affiliation":[]},{"given":"Abhay Kumar","family":"Yadav","sequence":"additional","affiliation":[]},{"given":"Bineet Kumar","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Sanjay","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"30_CR1","unstructured":"Lewis, A gentle introduction to smart contracts. https:\/\/bitsonblocks.net\/2016\/02\/01\/a-gentle-introduction-to-smart-contracts"},{"key":"30_CR2","unstructured":"Andrea Corbellini. https:\/\/andrea.corbellini.name\/2015\/05\/30\/elliptic-curvecryptography-ecdh-and-ecdsa. ECDH and ECDSA (2015)"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Juels, A., Kosba, A., Shi, E.: The ring of gyges: investigating the future of criminal smart contracts. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 283\u2013295. ACM (2016)","DOI":"10.1145\/2976749.2978362"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Urquhart, The inefficiency of bitcoin. Econ. Lett. 148, 80\u201382 (2016)","DOI":"10.1016\/j.econlet.2016.09.019"},{"issue":"2","key":"30_CR5","first-page":"35","volume":"71","author":"J Fairfield","year":"2014","unstructured":"Fairfield, J.: Smart contracts, bitcoin bots and consumer protection. Washington Lee Law Rev. Online 71(2), 35\u201350 (2014)","journal-title":"Washington Lee Law Rev. Online"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Schuermann, F.: Bitcoin and beyond-a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutorials, 2084\u20132092 (2016)","DOI":"10.1109\/COMST.2016.2535718"},{"key":"30_CR7","unstructured":"Wood, G.: Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151, 1\u201332 (2014)"},{"key":"30_CR8","unstructured":"Maxwell, G.: Coinjoin: A Bitcoin privacy for the real-world application, https:\/\/bitcointalk.org\/index.php?topic=279249.0 (2013)"},{"key":"30_CR9","unstructured":"Eyal, I., Gencer, A.E., Sirer, E.G., Van Renesse, R.: Bitcoin-ng: a scalable blockchain protocol. In: 13th fUSENIXg Symposium on Networked Systems Design and Implementation (fNSDIg 16), pp. 45\u201359 (2016)"},{"key":"30_CR10","unstructured":"Stark, Making sense of blockchain smart contracts. http:\/\/www.coindesk.com\/making-sense-smart-contracts\/. Accessed 16 July 2020"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Samaniego, M., Deters, R.: Blockchain as a service for Iot. In: 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Comput-ing (CPSCom) and IEEE Smart Data (SmartData), IEEE, pp. 433\u2013436 (2016)","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.102"},{"key":"30_CR12","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.jnca.2018.10.020","volume":"126","author":"Q Feng","year":"2019","unstructured":"Feng, Q., He, D., Zeadally, S., Khan, M.K., Kumar, N.: A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 126, 45\u201358 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"30_CR13","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)"},{"key":"30_CR14","doi-asserted-by":"publisher","unstructured":"Seijas, P.L., Thompson, S., McAdams, D.: Scripting smart contracts for distributed ledger technology. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10323 LNCS, pp. 631\u2013632 (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0","DOI":"10.1007\/978-3-319-70278-0"},{"key":"30_CR15","unstructured":"Morabito, V.: Smart contracts and licensing. In: Business Innovation Through Blockchain, pp. 101\u2013124, Springer (2017)"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Xu, X., et al.: The blockchain as a software connector. In: 2016 13th Working IEEE\/IFIP Conference on Software Architecture (WICSA), pp. 182\u2013191, IEEE (2016)","DOI":"10.1109\/WICSA.2016.21"},{"issue":"2","key":"30_CR17","first-page":"313","volume":"67","author":"KD Werbach","year":"2017","unstructured":"Werbach, K.D., Cornell, N.: Contracts ex machina. Duke Law J. 67(2), 313\u2013382 (2017)","journal-title":"Duke Law J."},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Gilad, Y., Hemo, R., Micali, S., Vlachos, G., Zeldovich, N.: Al-gorand: Scaling byzantine agreements for cryptocurrencies. In: Proceedings of the 26th Symposium on Operating Systems Principles. ACM, pp. 51\u201368 (2017)","DOI":"10.1145\/3132747.3132757"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Verma, S.B., Saravanan, C.: Performance analysis of various fusion methods in multimodal biometric. In: 2018 International Conference on Computational and Characterization Techniques in Engineering & Sciences (CCTES), pp. 5\u20138. IEEE (2018)","DOI":"10.1109\/CCTES.2018.8674156"},{"key":"30_CR20","doi-asserted-by":"publisher","unstructured":"Verma, S.B., Yadav, A.K.: Detection of hard exudates in retinopathy images. ADCAIJ Adv. Distrib. Comput. Artif. Intell. J. Regular Issue 8(4), 41\u201348 eISSN: 2255\u20132863 (2019). https:\/\/doi.org\/10.14201\/ADCAIJ2019844148","DOI":"10.14201\/ADCAIJ2019844148"},{"key":"30_CR21","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-981-15-9927-9_12","volume-title":"Emerging Technologies in Data Mining and Information Security","author":"SB Verma","year":"2021","unstructured":"Verma, S.B., Yadav, A.K.: Hard exudates detection: a review. In: Hassanien, A.E., Bhattacharyya, S., Chakrabati, S., Bhattacharya, A., Dutta, S. (eds.) Emerging Technologies in Data Mining and Information Security. AISC, vol. 1286, pp. 117\u2013124. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-9927-9_12"},{"key":"30_CR22","doi-asserted-by":"publisher","unstructured":"Verma, S.B., Verma, S.B.: Data transmission in BPEL (business process execution language). ADCAIJ Adv. Distrib. Comput. Artif. Intell. J. Regular 9(3), 105\u2013117 (2020). eISSN: 2255\u20132863. https:\/\/doi.org\/10.14201\/ADCAIJ202093105117","DOI":"10.14201\/ADCAIJ202093105117"},{"issue":"1","key":"30_CR23","first-page":"23","volume":"16","author":"S Verma","year":"2019","unstructured":"Verma, S., et al.: Contactless palmprint verification system using 2-D Gabor filter and principal component analysis. Int. Arab J. Inf. Technol. 16(1), 23\u201329 (2019)","journal-title":"Int. Arab J. Inf. Technol."},{"issue":"3","key":"30_CR24","first-page":"2278","volume":"17","author":"S Chandran","year":"2015","unstructured":"Chandran, S., Verma, S.B.: Touchless palmprint verification using shock filter SIFT I-RANSAC and LPD IOSR. J. Comput. Eng. 17(3), 2278\u20138727 (2015)","journal-title":"J. Comput. Eng."},{"key":"30_CR25","doi-asserted-by":"publisher","unstructured":"Verma, S.B., Pandey, B., Gupta, B.K.: Containerization and its architectures: a study. ADCAIJ Adv. Distrib. Comput. Artif. Intell. J. 11(4), 395\u2013409, eISSN: 2255\u20132863 (2022). https:\/\/doi.org\/10.14201\/adcaij.28351","DOI":"10.14201\/adcaij.28351"}],"container-title":["Studies in Computational Intelligence","Complex Networks &amp; Their Applications XII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53499-7_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T20:08:54Z","timestamp":1709150934000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53499-7_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031534980","9783031534997"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53499-7_30","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COMPLEX NETWORKS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Complex Networks and Their Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Menton","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwcna2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.complexnetworks.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}