{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T04:56:39Z","timestamp":1773896199573,"version":"3.50.1"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s11390-019-1916-x","type":"journal-article","created":{"date-parts":[[2019,3,27]],"date-time":"2019-03-27T17:52:34Z","timestamp":1553709154000},"page":"403-415","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["MicroBTC: Efficient, Flexible and Fair Micropayment for Bitcoin Using Hash Chains"],"prefix":"10.1007","volume":"34","author":[{"given":"Zhi-Guo","family":"Wan","sequence":"first","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]},{"given":"David","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,22]]},"reference":[{"key":"1916_CR1","doi-asserted-by":"crossref","unstructured":"Pass R, Shelat A. Micropayments for decentralized currencies. In Proc. the 22nd ACM SIGSAC Conference on Computer and Communications Security, October 2015, pp.207-218.","DOI":"10.1145\/2810103.2813713"},{"key":"1916_CR2","doi-asserted-by":"crossref","unstructured":"Eyal I, Sirer E G. Majority is not enough: Bitcoin mining is vulnerable. In Proc. the 18th International Conference on Financial Cryptography and Data Security, March 2014, pp.436-454.","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"1916_CR3","unstructured":"Danezis G, Meiklejohn S. Centrally banked cryptocurrencies. arXiv: 1505.06895, 2015. \n                    http:\/\/arxiv.org\/abs\/1505.06895\n                    \n                  , Feb. 2018."},{"key":"1916_CR4","doi-asserted-by":"crossref","unstructured":"Luu L, Narayanan V, Zheng C, Baweja K, Gilbert S, Saxena P. A secure sharding protocol for open blockchains. In Proc. the 2016 ACM SIGSAC Conference on Computer and Communications Security, October 2016, pp.17-30.","DOI":"10.1145\/2976749.2978389"},{"key":"1916_CR5","doi-asserted-by":"crossref","unstructured":"Rivest R, Shamir A. Payword and micromint: Two simple micropayment schemes. In Proc. the 4th International Workshop on Security Protocols, April 1996, pp.69-87.","DOI":"10.1007\/3-540-62494-5_6"},{"key":"1916_CR6","unstructured":"Hauser R, Steiner M, Waidne M. Micropayments based on iKP. In Proc. the 14th Worldwide Congress on Computer and Communications Security and Protection, June 1996, pp.67-82."},{"key":"1916_CR7","doi-asserted-by":"crossref","unstructured":"Anderson R, Manifavas C, Sutherland C. NetCard: A practical electroniccash system. In Proc. the 4th International Workshop on Security Protocols, April 1996, pp.49-57.","DOI":"10.1007\/3-540-62494-5_4"},{"key":"1916_CR8","doi-asserted-by":"crossref","unstructured":"Rivest R. Electronic lottery tickets as micropayments. In Proc. the 1st International Conference on Financial Cryptography, February 1997, pp.307-314.","DOI":"10.1007\/3-540-63594-7_87"},{"key":"1916_CR9","doi-asserted-by":"crossref","unstructured":"Micali S, Rivest R. Micropayments revisited. In Proc. the Cryptographers\u2019 Track at the RSA Conference, February 2002, pp.149-163.","DOI":"10.1007\/3-540-45760-7_11"},{"key":"1916_CR10","doi-asserted-by":"crossref","unstructured":"Rivest R. Peppercoin micropayments. In Proc. the 8th International Conference on Financial Cryptography, February 2004, pp.2-8.","DOI":"10.1007\/978-3-540-27809-2_2"},{"key":"1916_CR11","unstructured":"Jutla C, Yung M. Paytree: \u201cA mortised signature\u201d for flexible micropayments. In Proc. the 2nd USENIX Association Workshop on Electronic Commerce, November 1996, pp.213-221."},{"key":"1916_CR12","doi-asserted-by":"crossref","unstructured":"M\u00f6ser M, Eyal I, Sirer E G. Bitcoin covenants. In Proc. International Conference on Financial Cryptography and Data Security, February 2016, pp. 126-141.","DOI":"10.1007\/978-3-662-53357-4_9"},{"key":"1916_CR13","doi-asserted-by":"crossref","unstructured":"Ruffing T, Moreno-Sanchez P, Kate A. CoinShuffle: Practical decentralized coin mixing for Bitcoin. In Proc. the 19th European Symposium on Research in Computer Security, September 2014, pp.345-364.","DOI":"10.1007\/978-3-319-11212-1_20"},{"key":"1916_CR14","doi-asserted-by":"crossref","unstructured":"Bonneau J, Narayanan A, Miller A, Clark J, Kroll J A, Felten E W. Mixcoin: Anonymity for Bitcoin with accountable mixes. In Proc. the 18th International Conference on Financial Cryptography and Data Security, March 2014, pp.486-504.","DOI":"10.1007\/978-3-662-45472-5_31"},{"key":"1916_CR15","doi-asserted-by":"crossref","unstructured":"Miers I, Garman C, Green M, Rubin A D. Zerocoin: Anonymous distributed e-cash from Bitcoin. In Proc. IEEE Symposium on Security and Privacy, May 2013, pp.397-411.","DOI":"10.1109\/SP.2013.34"},{"key":"1916_CR16","doi-asserted-by":"crossref","unstructured":"Sasson E B, Chiesa A, Garman C, Green M, Miers I, Tromer E, Virza M. Zerocash: Decentralized anonymous payments from Bitcoin. In Proc. IEEE Symposium on Security and Privacy, May 2014, pp.459-474.","DOI":"10.1109\/SP.2014.36"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-019-1916-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-019-1916-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-019-1916-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,21]],"date-time":"2020-03-21T00:14:14Z","timestamp":1584749654000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-019-1916-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":16,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["1916"],"URL":"https:\/\/doi.org\/10.1007\/s11390-019-1916-x","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3]]},"assertion":[{"value":"19 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}