{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T18:56:54Z","timestamp":1769021814512,"version":"3.49.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319968926","type":"print"},{"value":"9783319968933","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-96893-3_33","type":"book-chapter","created":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T11:30:49Z","timestamp":1531999849000},"page":"440-454","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["ElasticChain: Support Very Large Blockchain by Reducing Data Redundancy"],"prefix":"10.1007","author":[{"given":"Dayu","family":"Jia","sequence":"first","affiliation":[]},{"given":"Junchang","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Zhiqiong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Guoren","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,19]]},"reference":[{"key":"33_CR1","unstructured":"Eyal, I., Gencer, A.E., Renesse, R.V.: Bitcoin-NG: a scalable blockchain protocol, pp. 45\u201359 (2015)"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: Research perspectives and challenges for bitcoin and cryptocurrencies, pp. 104\u2013121 (2015)","DOI":"10.1109\/SP.2015.14"},{"key":"33_CR3","unstructured":"Yuan, Y., Wang, F.Y.: Blockchain: the state of the art and future trends. Acta Automatica Sinica (2016)"},{"key":"33_CR4","unstructured":"Blockmeta: The Blockchain Data of Bitcoin. https:\/\/blockmeta.com\/. Accessed 28 Sept 2017"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Li, J., Wolf, T.: A one-way proof-of-work protocol to protect controllers in software-defined networks. In: Symposium on Architectures for NETWORKING and Communications Systems, pp. 123\u2013124 (2016)","DOI":"10.1145\/2881025.2889481"},{"key":"33_CR6","unstructured":"Herbert, J., Litchfield, A.: A novel method for decentralised peer-to-peer software license validation using cryptocurrency blockchain technology. In: Australasian Computer Science Conference, pp. 27\u201335 (2015)"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Zyskind, G., Nathan, O., Pentland, A.S.: Decentralizing privacy: using blockchain to protect personal data. In: IEEE Security and Privacy Workshops, pp. 180\u2013184 (2015)","DOI":"10.1109\/SPW.2015.27"},{"key":"33_CR8","unstructured":"Ali, M., Nelson, J., Shea, R., Freedman, M.J.: Blockstack: a global naming and storage system secured by blockchains, pp. 181\u2013194 (2016)"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Hari, A., Lakshman, T.V.: The internet blockchain: a distributed, tamper-resistant transaction framework for the internet. In: ACM Workshop on Hot Topics in Networks, pp. 204\u2013210 (2016)","DOI":"10.1145\/3005745.3005771"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.O., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: ACM Sigsac Conference on Computer and Communications Security, pp. 3\u201316 (2016)","DOI":"10.1145\/2976749.2978341"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Karame, G.: On the security and scalability of bitcoin\u2019s blockchain. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 1861\u20131862 (2016)","DOI":"10.1145\/2976749.2976756"},{"issue":"3","key":"33_CR12","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/2695533.2695545","volume":"42","author":"Iddo Bentov","year":"2014","unstructured":"Bentov, I., Lee, C., Mizrahi, A., Rosenfeld, M.: Proof of activity: extending bitcoins proof of work via proof of stake. ACM SIGMETRICS Perform. Eval. Rev. 42(3), 34\u201337","journal-title":"ACM SIGMETRICS Performance Evaluation Review"},{"issue":"9","key":"33_CR13","doi-asserted-by":"publisher","first-page":"2807","DOI":"10.1109\/TC.2015.2495213","volume":"65","author":"T Distler","year":"2016","unstructured":"Distler, T., Cachin, C., Kapitza, R.: Resource-efficient byzantine fault tolerance. IEEE Trans. Comput. 65(9), 2807\u20132819 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Karame, G.O., Androulaki, E., Capkun, S.: Double-spending fast payments in bitcoin. In: ACM Conference on Computer and Communications Security, pp. 906\u2013917 (2012)","DOI":"10.1145\/2382196.2382292"},{"key":"33_CR15","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1007\/978-3-662-45472-5_28","volume-title":"Financial Cryptography and Data Security","author":"Ittay Eyal","year":"2014","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: International Conference on Financial Cryptography and Data Security, pp. 436\u2013454 (2014)"},{"key":"33_CR16","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted (2008)"},{"key":"33_CR17","volume-title":"Probabilities and Life","author":"E Borel","year":"1962","unstructured":"Borel, E.: Probabilities and Life. Dover Publications Inc., New York (1962)"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Juels, A.: PORs: proofs of retrievability for large files. In: ACM Conference on Computer and Communications Security, pp. 584\u2013597 (2007)","DOI":"10.1145\/1315245.1315317"},{"key":"33_CR19","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Bohli, J.M., Karame, G.O., Liu, Z., Reuter, C.A.: Outsourced proofs of retrievability. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 831\u2013843 (2014)","DOI":"10.1145\/2660267.2660310"},{"key":"33_CR20","doi-asserted-by":"crossref","unstructured":"Dinh, A., Wang, J., Chen, G., Ooi, B.C., Tan, K.-L.: Blockbench: a framework for analyzing private blockchains (2017)","DOI":"10.1145\/3035918.3064033"}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-96893-3_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T10:35:59Z","timestamp":1710326159000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-96893-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319968926","9783319968933"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-96893-3_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"19 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APWeb-WAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apwebwaim2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conferences.cis.umac.mo\/apwebwaim2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}