{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:30:23Z","timestamp":1742913023697,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819708369"},{"type":"electronic","value":"9789819708376"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-0837-6_5","type":"book-chapter","created":{"date-parts":[[2024,2,21]],"date-time":"2024-02-21T06:02:43Z","timestamp":1708495363000},"page":"63-77","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Practical Byzantine Fault Tolerance Algorithms Based on\u00a0Randomized Mean Clustering, Trust and\u00a0Credibility"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-3762-3582","authenticated-orcid":false,"given":"Haonan","family":"Zhai","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4855-3723","authenticated-orcid":false,"given":"Xiangrong","family":"Tong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,22]]},"reference":[{"issue":"3","key":"5_CR1","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.dcan.2017.10.006","volume":"4","author":"M Banerjee","year":"2018","unstructured":"Banerjee, M., Lee, J., Choo, K.K.R.: A blockchain future for internet of things security: a position paper. Digit. Commun. Netw. 4(3), 149\u2013160 (2018)","journal-title":"Digit. Commun. Netw."},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-642-36424-2_4","volume-title":"Architecture of Computing Systems \u2013 ARCS 2013","author":"M Zbierski","year":"2013","unstructured":"Zbierski, M.: Iwazaru: the byzantine sequencer. In: Kub\u00e1tov\u00e1, H., Hochberger, C., Dan\u011bk, M., Sick, B. (eds.) ARCS 2013. LNCS, vol. 7767, pp. 38\u201349. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36424-2_4"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-642-35170-9_22","volume-title":"Middleware 2012","author":"N Chondros","year":"2012","unstructured":"Chondros, N., Kokordelis, K., Roussopoulos, M.: On the practicality of practical byzantine fault tolerance. In: Narasimhan, P., Triantafillou, P. (eds.) Middleware 2012. LNCS, vol. 7662, pp. 436\u2013455. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-35170-9_22"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Watanabe, H., Fujimura, S., Nakadaira, A., Miyazaki, Y., Akutsu, A., Kishigami, J.: Blockchain contract: securing a blockchain applied to smart contracts. IEEE International Conference on Consumer Electronics (2016)","DOI":"10.1109\/ICCE.2016.7430693"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Alwabe, M., Kwon, Y.: Blockchain consistency check protocol for improved reliability Int. J. Comput. Syst. Sci. Eng. (2), 36 (2021)","DOI":"10.32604\/csse.2021.014630"},{"issue":"1","key":"5_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13278-014-0242-0","volume":"5","author":"P Bhat","year":"2015","unstructured":"Bhat, P., Thankachan, R., Chandrasekaran, K.: Sharding distributed social databases using social network analysis. Soci. Netw. Anal. Min. 5(1), 1\u201311 (2015)","journal-title":"Soci. Netw. Anal. Min."},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"102011","DOI":"10.1016\/j.sysarc.2021.102011","volume":"115","author":"Z Chen","year":"2021","unstructured":"Chen, Z., Fiandrino, C., Kantarci, B.: On blockchain integration into mobile crowdsensing via smart embedded devices: a comprehensive survey. J. Syst. Architecture 115, 102011 (2021)","journal-title":"J. Syst. Architecture"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.future.2014.11.016","volume":"52","author":"K Liang","year":"2015","unstructured":"Liang, K., et al.: A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Gener. Comput. Syst. 52, 95\u2013108 (2015)","journal-title":"Future Gener. Comput. Syst."},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Wang, J., et al.: Distributed secure storage scheme based on sharding blockchain Comput. Mater. the Continuum, no. 3, pp. 18 (2022)","DOI":"10.32604\/cmc.2022.020648"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Kokoris-Kogias, E., et al.: OmniLedger: a secure, scale-out, decentralized ledger via sharding (2017)","DOI":"10.1109\/SP.2018.000-5"},{"issue":"4","key":"5_CR11","first-page":"002","volume":"2","author":"A Li","year":"2020","unstructured":"Li, A., et al.: An improved distributed query for large-scale RDF data. Big Data Mag. 2(4), 002 (2020)","journal-title":"Big Data Mag."},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Yuvaraju, M., Mansingh, P.: A secure data sharing scheme based on blockchain for industrial internet of things using consensus algorithm. Industry 4.0 Interoperability, Analytics, Security, and Case Studies. N.p.: CRC Press (2021)","DOI":"10.1201\/9781003048855-8"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Lao, L., et al.: G-PBFT: a location-based and scalable consensus protocol for IoT-Blockchain applications. In: 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS) (2020)","DOI":"10.1109\/IPDPS47924.2020.00074"},{"key":"5_CR14","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-981-15-2777-7_4","volume-title":"Blockchain and Trustworthy Systems","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Song, Z., Cheng, T.: Improvement research of PBFT consensus algorithm based on credit. In: Zheng, Z., Dai, H.N., Tang, M., Chen, X. (eds.) BlockSys 2019. CCIS, vol. 1156, pp. 47\u201359. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-15-2777-7_4"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Luu, L., et al.: A secure sharding protocol for open blockchains. In: the 2016 ACM SIGSAC Conference (2016)D","DOI":"10.1145\/2976749.2978389"},{"key":"5_CR16","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.1007\/978-3-030-89698-0_136","volume-title":"Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery","author":"S Zhai","year":"2022","unstructured":"Zhai, S., Li, X., Wang, Y.: Research on the storage and sharing model of electronic license based on blockchain. In: Xie, Q., Zhao, L., Li, K., Yadav, A., Wang, L. (eds.) ICNC-FSKD 2021. LNCS, vol. 89, pp. 1321\u20131330. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-89698-0_136"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Team, Z., et al.: The zilliqa technical whitepaper, vol. 16 (2019). Accessed Sept","DOI":"10.2139\/ssrn.3442330"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Syta, E., et al.: Scalable bias-resistant distributed randomness. In: 2017 IEEE Symposium on Security and Privacy (SP) (2017)","DOI":"10.1109\/SP.2017.45"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Zamani, M., Movahedi, M., Raykova, M.: RapidChain: scaling blockchain via full sharding (2018)","DOI":"10.1145\/3243734.3243853"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Liu, F., et al.: Regulated and unregulated emissions from a spark-ignition engine fuelled with low-blend ethanol-gasoline mixtures. In: Proceedings of the Institution of Mechanical Engineers, Part D: Journal of Automobile Engineering (2012)","DOI":"10.1177\/0954407011421741"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Aublin, P., Mokhtar, S., Quema, V.: RBFT: redundant byzantine fault tolerance. In: IEEE International Conference on Distributed Computing Systems (2013)","DOI":"10.1109\/ICDCS.2013.53"},{"issue":"1","key":"5_CR22","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1109\/TC.2018.2860009","volume":"68","author":"J Liu","year":"2019","unstructured":"Liu, J., et al.: Scalable byzantine consensus via hardware-assisted secret sharing. IEEE Trans. Comput. 68(1), 139\u2013151 (2019)","journal-title":"IEEE Trans. Comput."},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Crain, T., et al.: DBFT: efficient leaderless byzantine consensus and its application to blockchains. In: 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) (2018)","DOI":"10.1109\/NCA.2018.8548057"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Saad, S., Radzi, R.: Comparative review of the blockchain consensus algorithm between proof of stake (POS) and delegated proof of stake (DPOS). Penerbit UTM Press (2020)","DOI":"10.1109\/ICoDSA53588.2021.9617549"},{"issue":"3","key":"5_CR25","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1097\/SLA.0000000000005553","volume":"276","author":"S Chinnakotla","year":"2022","unstructured":"Chinnakotla, S., et al.: Intraportal islet autotransplantation independently improves quality of life after total pancreatectomy in patients with chronic refractory pancreatitis. Ann. Surg. 276(3), 441\u2013449 (2022)","journal-title":"Ann. Surg."},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Yin, M., et al.: HotStuff: BFT consensus with linearity and responsiveness. In: the 2019 ACM Symposium (2019)","DOI":"10.1145\/3293611.3331591"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Wang, Z., et al.: Reinforcement-mining: protecting reward in selfish mining. In: International Conference on Provable Security (2022)","DOI":"10.1007\/978-3-031-20917-8_14"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Shen, T.: Reputation-driven dynamic node consensus and reliability sharding model in IoT blockchain. Algorithms, 15 (2022)","DOI":"10.3390\/a15020028"},{"issue":"2","key":"5_CR29","first-page":"19","volume":"11","author":"X Ren","year":"2023","unstructured":"Ren, X., Tong, X., Zhang, W.: Improved PBFT consensus algorithm based on node role division. Comput. Commun. 11(2), 19 (2023)","journal-title":"Comput. Commun."},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Frauenthaler, P., et al.: ETH relay: a cost-efficient relay for ethereum-based blockchains. In: 2020 IEEE International Conference on Blockchain (Blockchain) (2020)","DOI":"10.1109\/Blockchain50366.2020.00032"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Zegers, F., et al.: Event-triggered formation control and leader tracking with resilience to byzantine adversaries: a reputation-based approach. IEEE Trans. Control Netw. Syst. 99, 1\u20131 (2021)","DOI":"10.23919\/ACC45564.2020.9147996"}],"container-title":["Communications in Computer and Information Science","Data Mining and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-0837-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,21]],"date-time":"2024-02-21T06:08:57Z","timestamp":1708495737000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-0837-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819708369","9789819708376"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-0837-6_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"22 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DMBD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Mining and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sanya","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dmbd2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iasei.org\/dmbd2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"79","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}