{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:19:00Z","timestamp":1742912340442,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811527760"},{"type":"electronic","value":"9789811527777"}],"license":[{"start":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T00:00:00Z","timestamp":1577059200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-2777-7_11","type":"book-chapter","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T12:02:45Z","timestamp":1579867365000},"page":"123-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["BIT Problem: Is There a Trade-off in the Performances of Blockchain Systems?"],"prefix":"10.1007","author":[{"given":"Shuangfeng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xingren","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,23]]},"reference":[{"issue":"3","key":"11_CR1","doi-asserted-by":"publisher","first-page":"4650","DOI":"10.1109\/JIOT.2018.2874095","volume":"6","author":"S Biswas","year":"2019","unstructured":"Biswas, S., Sharif, K., Li, F., Nour, B., Wang, Y.: A scalable blockchain framework for secure transactions in IoT. IEEE Internet Things J. 6(3), 4650\u20134659 (2019)","journal-title":"IEEE Internet Things J."},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MC.2012.37","volume":"45","author":"E Brewer","year":"2012","unstructured":"Brewer, E.: Cap twelve years later: how the \u201crules\u201d have changed. Computer 45, 23\u201329 (2012)","journal-title":"Computer"},{"key":"11_CR3","unstructured":"Castro, M., Liskov, B., et al.: Practical Byzantine fault tolerance. In: Proceedings of the Third Symposium on Operating Systems Design and Implementation, pp. 173\u2013186 (1999)"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the Internet of Things. IEEE Access 4, 2292\u20132303 (2016)","journal-title":"IEEE Access"},{"key":"11_CR5","unstructured":"Courtois, N.T., Bahack, L.: On subversive miner strategies and block withholding attack in bitcoin digital currency. arXiv preprint arXiv:1402.1718 (2014)"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.O., W\u00fcst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 3\u201316 (2016)","DOI":"10.1145\/2976749.2978341"},{"issue":"3","key":"11_CR7","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Trans. Program. Lang. Syst. (TOPLAS) 4(3), 382\u2013401 (1982)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"47615","DOI":"10.1109\/ACCESS.2019.2909924","volume":"7","author":"Z Liu","year":"2019","unstructured":"Liu, Z., Luong, N.C., Wang, W., Niyato, D., Wang, P., Liang, Y.C., Kim, D.I.: A survey on blockchain: a game theoretical perspective. IEEE Access 7, 47615\u201347643 (2019)","journal-title":"IEEE Access"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/TSMCB.2010.2045891","volume":"41","author":"Z Meng","year":"2011","unstructured":"Meng, Z., Ren, W., Cao, Y., You, Z.: Leaderless and leader-following consensus with communication and input delays under a directed network topology. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 41, 75\u201388 (2011)","journal-title":"IEEE Trans. Syst. Man Cybern. Part B (Cybern.)"},{"key":"11_CR10","unstructured":"Nakamoto, S., et al.: Bitcoin: a peer-to-peer electronic cash system (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"11_CR11","unstructured":"Natoli, C., Gramoli, V.: The balance attack against proof-of-work blockchains: the R3 testbed as an example. CoRR abs\/1612.09426 (2016). http:\/\/arxiv.org\/abs\/1612.09426"},{"key":"11_CR12","first-page":"1","volume":"23","author":"M Prokofieva","year":"2019","unstructured":"Prokofieva, M., Miah, S.J.: Blockchain in healthcare. Australas. J. Inf. Syst. 23, 1\u201322 (2019)","journal-title":"Australas. J. Inf. Syst."},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-662-53641-4_11","volume-title":"Theory of Cryptography","author":"L Ren","year":"2016","unstructured":"Ren, L., Devadas, S.: Proof of space from stacked expanders. In: Hirt, M., Smith, A. (eds.) TCC 2016. LNCS, vol. 9985, pp. 262\u2013285. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53641-4_11"},{"issue":"1","key":"11_CR14","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1109\/COMST.2018.2863956","volume":"21","author":"T Salman","year":"2019","unstructured":"Salman, T., Zolanvari, M., Erbad, A., Jain, R., Samaka, M.: Security services using blockchains: a state of the art survey. IEEE Commun. Surv. Tutor. 21(1), 858\u2013880 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-662-54970-4_30","volume-title":"Financial Cryptography and Data Security","author":"A Sapirshtein","year":"2017","unstructured":"Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 515\u2013532. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54970-4_30"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-319-39028-4_9","volume-title":"Open Problems in Network Security","author":"M Vukoli\u0107","year":"2016","unstructured":"Vukoli\u0107, M.: The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. In: Camenisch, J., Kesdo\u011fan, D. (eds.) iNetSec 2015. LNCS, vol. 9591, pp. 112\u2013125. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39028-4_9"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-030-03332-3_10","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2018","author":"P Wei","year":"2018","unstructured":"Wei, P., Yuan, Q., Zheng, Y.: Security of the blockchain against long delay attack. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018, Part III. LNCS, vol. 11274, pp. 250\u2013275. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03332-3_10"},{"issue":"4","key":"11_CR18","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng, Z., Xie, S., Dai, H.N., Chen, X., Wang, H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352\u2013375 (2018)","journal-title":"Int. J. Web Grid Serv."},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.cose.2019.04.007","volume":"84","author":"L Zhong","year":"2019","unstructured":"Zhong, L., Wu, Q., Xie, J., Guan, Z., Qin, B.: A secure large-scale instant payment system based on blockchain. Comput. Secur. 84, 349\u2013364 (2019)","journal-title":"Comput. Secur."}],"container-title":["Communications in Computer and Information Science","Blockchain and Trustworthy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-2777-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T22:04:47Z","timestamp":1630101887000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-2777-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,23]]},"ISBN":["9789811527760","9789811527777"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-2777-7_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019,12,23]]},"assertion":[{"value":"23 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BlockSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain and Trustworthy Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blocksys2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/blocksys.info\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}