{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:14:14Z","timestamp":1759364054627,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032003461","type":"print"},{"value":"9783032003478","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-00347-8_9","type":"book-chapter","created":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:10:41Z","timestamp":1759277441000},"page":"146-162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SmartShards: Churn-Tolerant Continuously Available Distributed Ledger"],"prefix":"10.1007","author":[{"given":"Joseph","family":"Oglio","sequence":"first","affiliation":[]},{"given":"Mikhail","family":"Nesterenko","sequence":"additional","affiliation":[]},{"given":"Gokarna","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,1]]},"reference":[{"key":"9_CR1","unstructured":"Smartshards implementation. https:\/\/github.com\/QuantasSupport\/Quantas\/tree\/SmartShards"},{"key":"9_CR2","unstructured":"Smartshards perfromance evaluation data. http:\/\/www.cs.kent.edu\/mikhail\/Research\/trail.output.tar.gz Feb 2025"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Agbo, C.C., Mahmoud, Q.H., Eklund, J.M.: Blockchain technology in healthcare: a systematic review. In: Healthcare, vol. 7, p.\u00a056. MDPI (2019)","DOI":"10.3390\/healthcare7020056"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.rser.2018.10.014","volume":"100","author":"M Andoni","year":"2019","unstructured":"Andoni, M., et al.: Blockchain technology in the energy sector: a systematic review of challenges and opportunities. Renew. Sustain. Energy Rev. 100, 143\u2013174 (2019)","journal-title":"Renew. Sustain. Energy Rev."},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Androulaki, E., et\u00a0al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp. 1\u201315 (2018)","DOI":"10.1145\/3190508.3190538"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., Scheideler, C.: Towards a scalable and robust DHT. In: Proceedings of the Eighteenth Annual ACM Symposium on Parallelism in Algorithms and Architectures, pp. 318\u2013327 (2006)","DOI":"10.1145\/1148109.1148163"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Baldoni, R., Bonomi, S., Nezhad, A.S.: A protocol for implementing byzantine storage in churn-prone distributed systems. Theor. Comput. Sci. 512, 28\u201340 (2013)","DOI":"10.1016\/j.tcs.2013.04.005"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Bessani, A., Alchieri, E., Sousa, J., Oliveira, A., Pedone, F.: From byzantine replication to blockchain: Consensus is only the beginning. In: 2020 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 424\u2013436. IEEE (2020)","DOI":"10.1109\/DSN48063.2020.00057"},{"issue":"4","key":"9_CR9","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1145\/571637.571640","volume":"20","author":"M Castro","year":"2002","unstructured":"Castro, M., Liskov, B.: Practical byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20(4), 398\u2013461 (2002)","journal-title":"ACM Trans. Comput. Syst."},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Douceur, J.R.: The sybil attack. In: International workshop on peer-to-peer systems, pp. 251\u2013260. Springer (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Dujak, D., Sajter, D.: Blockchain applications in supply chain. SMART supply network, pp. 21\u201346 (2019)","DOI":"10.1007\/978-3-319-91668-2_2"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Foreback, D., Nesterenko, M., Tixeuil, S.: Infinite unlimited churn. arXiv preprint arXiv:1608.00726 (2016)","DOI":"10.1007\/978-3-319-49259-9_12"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Foreback, D., Nesterenko, M., Tixeuil, S.: Churn possibilities and impossibilities. In: Networked Systems: 6th International Conference, NETYS 2018, Essaouira, Morocco, May 9\u201311, 2018, Revised Selected Papers 6, pp. 303\u2013317. Springer (2019)","DOI":"10.1007\/978-3-030-05529-5_20"},{"key":"9_CR14","unstructured":"Garc\u00eda-P\u00e9rez, A., Gotsman, A.: Federated byzantine quorum systems. In: 22nd International Conference on Principles of Distributed Systems (OPODIS 2018). Schloss-Dagstuhl-Leibniz Zentrum f\u00fcr Informatik, (2019)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Hafid, A., Hafid, A.S., Samih, M.: Scaling blockchains: a comprehensive survey. In: IEEE Access 8, 125244\u2013125262 (2020)","DOI":"10.1109\/ACCESS.2020.3007251"},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-319-99058-3_12","volume":"II","author":"K Ito","year":"2019","unstructured":"Ito, K., O\u2019Dair, M.: A critical examination of the application of blockchain technology to intellectual property management. Business Transform. Blockchain II, 317\u2013335 (2019)","journal-title":"Business Transform. Blockchain"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Syta, E.,Ford, B.: Omniledger: aA secure, scale-out, decentralized ledger via sharding. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 583\u2013598. IEEE (2018)","DOI":"10.1109\/SP.2018.000-5"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s00446-010-0099-z","volume":"22","author":"F Kuhn","year":"2010","unstructured":"Kuhn, F., Schmid, S., Wattenhofer, R.: Towards worst-case churn resistant peer-to-peer systems. Distrib. Comput. 22, 249\u2013267 (2010)","journal-title":"Distrib. Comput."},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Lafourcade, P., Nopere, M., Picot, J., Pizzuti, D., Roudeix, E.: Security analysis of auctionity: a blockchain based e-auction. In: Foundations and Practice of Security: 12th International Symposium, FPS 2019, Toulouse, France, November 5\u20137, 2019, Revised Selected Papers 12, pp. 290\u2013307. Springer, 2020","DOI":"10.1007\/978-3-030-45371-8_18"},{"issue":"3","key":"9_CR20","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382\u2013401 (1982)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"9_CR21","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.isatra.2023.06.029","volume":"141","author":"X Liu","year":"2023","unstructured":"Liu, X., Xie, H., Yan, Z., Liang, X.: A survey on blockchain sharding. ISA Trans. 141, 30\u201343 (2023)","journal-title":"ISA Trans."},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Luu, L., Narayanan, V., Zheng, C., Baweja, K., Gilbert, S., Saxena, P.: A secure sharding protocol for open blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 17\u201330 (2016)","DOI":"10.1145\/2976749.2978389"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Malkhi, D., Reiter, M.: Byzantine quorum systems. Distributed Comput. 11(4), 203\u2013213 (1998)","DOI":"10.1007\/s004460050050"},{"key":"9_CR24","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Oglio, J., Hood, K., Nesterenko, M., Tixeuil, S.: Quantas: quantitative user-friendly adaptable networked things abstract simulator. In: Proceedings of the 2022 Workshop on Advanced tools, programming languages, and PLatforms for Implementing and Evaluating algorithms for Distributed systems, pp. 40\u201346 (2022)","DOI":"10.1145\/3524053.3542744"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Samaniego, M., Jamsrandorj, U., Deters, R.: Blockchain as a service for Iot. In: 2016 IEEE International Conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp. 433\u2013436. IEEE (2016)","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.102"},{"key":"9_CR27","unstructured":"Wang, J., Wang, H.: Monoxide: scale out blockchains with asynchronous consensus zones. In: 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19), pp. 95\u2013112 (2019)"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Wendl, M., Doan, M.H., Sassen, R.: The environmental impact of cryptocurrencies using proof of work and proof of stake consensus algorithms: a systematic review. J. Environ. Manage. 326, 116530 (2023)","DOI":"10.1016\/j.jenvman.2022.116530"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"White, B., Mahanti, A., Passi, K.: Characterizing the OpenSea NFT marketplace. In: Companion Proceedings of the Web Conference 2022, pp. 488\u2013496 (2022)","DOI":"10.1145\/3487553.3524629"},{"key":"9_CR30","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G.: Ethereum: a secure decentralized generalized transaction ledger. Ethereum Project Yellow Paper 151, 1\u201332 (2014)","journal-title":"Ethereum Project Yellow Paper"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Yu, G., Wang, X., Yu, K., Ni, W., Zhang, J.A., Liu, R.P.: Sharding in blockchains: Survey. IEEE Access 8, 14155\u201314181 (2020)","DOI":"10.1109\/ACCESS.2020.2965147"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Zamani, M., Movahedi, M., Raykova, M: Rapidchain: scaling blockchain via full sharding. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 931\u2013948 (2018)","DOI":"10.1145\/3243734.3243853"}],"container-title":["Lecture Notes in Computer Science","Networked Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00347-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:10:53Z","timestamp":1759277453000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00347-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,1]]},"ISBN":["9783032003461","9783032003478"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00347-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,1]]},"assertion":[{"value":"1 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NETYS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Networked Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rabat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"netys2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/netys.net","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}