{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:55:34Z","timestamp":1756994134175},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319988269"},{"type":"electronic","value":"9783319988276"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98827-6_29","type":"book-chapter","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T11:48:21Z","timestamp":1534765701000},"page":"304-314","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Blockchain Consensus Protocols"],"prefix":"10.1007","author":[{"given":"Hadja F.","family":"Ouattara","sequence":"first","affiliation":[]},{"given":"Daouda","family":"Ahmat","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9deric T.","family":"Ou\u00e9draogo","sequence":"additional","affiliation":[]},{"given":"Tegawend\u00e9 F.","family":"Bissyand\u00e9","sequence":"additional","affiliation":[]},{"given":"Oumarou","family":"Si\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,21]]},"reference":[{"issue":"1\u2013suppl","key":"29_CR1","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1111\/j.1467-954X.1990.tb03350.x","volume":"38","author":"B Latour","year":"1990","unstructured":"Latour, B.: Technology is society made durable. Sociol. Rev. 38(1\u2013suppl), 103\u2013131 (1990)","journal-title":"Sociol. Rev."},{"issue":"4","key":"29_CR2","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1080\/00131727609336501","volume":"40","author":"D Bell","year":"1976","unstructured":"Bell, D.: The coming of the post-industrial society. Educ. Forum. 40(4), 574\u2013579 (1976)","journal-title":"Educ. Forum."},{"key":"29_CR3","volume-title":"Bitcoin: A Primer for Policymakers","author":"J Brito","year":"2013","unstructured":"Brito, J., Castillo, C.: Bitcoin: A Primer for Policymakers. Mercatus Center at George Mason University, Arlington (2013)"},{"key":"29_CR4","unstructured":"Vitalik buterin about ethereum, smart contracts, and himself, May 2016. https:\/\/goo.gl\/C58nJZ"},{"issue":"3","key":"29_CR5","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport, L.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382\u2013401 (1982). http:\/\/dl.acm.org\/citation.cfm?id=357176","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"29_CR6","unstructured":"Bheemaiah, K.: Block chain 2.0: the renaissance of money. Wired, January 2015"},{"key":"29_CR7","unstructured":"Economist Staff: Blockchains: the great chain of being sure about things. The Economist, 31 October 2015. https:\/\/goo.gl\/PwLDsw"},{"key":"29_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-48071-4_10","volume-title":"Advances in Cryptology \u2014 CRYPTO 1992","author":"C Dwork","year":"1993","unstructured":"Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139\u2013147. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/3-540-48071-4_10"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Juels, A.: Proofs of work and bread pudding protocols. In: Communications and Multimedia Security, pp. 258\u2013272. Kluwer Academic Publishers (1999)","DOI":"10.1007\/978-0-387-35568-9_18"},{"key":"29_CR10","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system, October 2008. https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"69","DOI":"10.5195\/LEDGER.2016.46","volume":"1","author":"S Popov","year":"2016","unstructured":"Popov, S.: A probabilistic analysis of the Nxt forging algorithm. Ledger 1, 69\u201383 (2016). https:\/\/doi.org\/10.5195\/LEDGER.2016.46 . ISSN 2379\u20135980","journal-title":"Ledger"},{"key":"29_CR12","unstructured":"Vitalik, B.: What proof of stake is and why it matters. Bitcoin Mag"},{"key":"29_CR13","volume-title":"Bitcoin and Cryptocurrency Technologies","author":"B Narayanan","year":"2016","unstructured":"Narayanan, B.: Bitcoin and Cryptocurrency Technologies. Princeton University Press, Princeton (2016)"},{"key":"29_CR14","unstructured":"Chepurnoy, A.: PoS forging algorithms: formal approach and multibranch forging. https:\/\/www.scribd.com\/doc\/248208963\/Multibranch-forging"},{"key":"29_CR15","unstructured":"Castro, M., Liskov, B.: Practical byzantine fault tolerance. In: OSDI, vol. 99 (1999)"},{"key":"29_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-319-39028-4_9","volume-title":"Open Problems in Network Security","author":"M Vukoli\u0107","year":"2016","unstructured":"Vukoli\u0107, M.: The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. In: Camenisch, J., Kesdo\u011fan, D. (eds.) iNetSec 2015. LNCS, vol. 9591, pp. 112\u2013125. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39028-4_9"},{"key":"29_CR17","unstructured":"Mazieres, D.: The stellar consensus protocol: federated model for internet level consensus. Stellar Development Foundation (2015)"},{"issue":"3","key":"29_CR18","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/2695533.2695545","volume":"42","author":"I Bentov","year":"2014","unstructured":"Bentov, I.: Proof of activity: extending Bitcoin\u2019s proof of work via proof of stake. ACM SIGMETRICS Perform. Eval. Rev. 42(3), 34\u201337 (2014)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"29_CR19","unstructured":"P4Titan: Slimcoin: a peer-to-peer crypto-currency with proof-of-burn, May 2014. http:\/\/www.slimcoin.club\/whitepaper.pdf"},{"key":"29_CR20","unstructured":"BURST\u2019s proof of capacity mining. Bitcoin Talk. https:\/\/bitcointalk.org\/index.php?topic=731923.0"},{"issue":"11","key":"29_CR21","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/2994581","volume":"59","author":"S Underwood","year":"2016","unstructured":"Underwood, S.: Blockchain beyond bitcoin. Commun. ACM 59(11), 15\u201317 (2016)","journal-title":"Commun. ACM"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Yli-Huumo, J., et al.: Where is current research on blockchain technology? A systematic review. PLoS one 11(10) (2016)","DOI":"10.1371\/journal.pone.0163477"},{"key":"29_CR23","unstructured":"CoinDesk: Carbon footprint of bitcoin. http:\/\/www.coindesk.com\/carbon-footprint-bitcoin\/"},{"key":"29_CR24","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-41178-6_17","volume-title":"e-Infrastructure and e-Services for Developing Countries","author":"J Ouoba","year":"2013","unstructured":"Ouoba, J., Bissyand\u00e9, T.F.: Leveraging the cultural model for opportunistic networking in sub-saharan Africa. In: Jonas, K., Rai, I.A., Tchuente, M. (eds.) AFRICOMM 2012. LNICST, vol. 119, pp. 163\u2013173. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41178-6_17"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98827-6_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,22]],"date-time":"2019-10-22T12:34:27Z","timestamp":1571747667000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98827-6_29"}},"subtitle":["Towards a Review of Practical Constraints for\u00a0Implementation in Developing Countries"],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319988269","9783319988276"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98827-6_29","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}