{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:41:12Z","timestamp":1740148872588,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,6,24]],"date-time":"2020-06-24T00:00:00Z","timestamp":1592956800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,24]],"date-time":"2020-06-24T00:00:00Z","timestamp":1592956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002790","name":"Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002790","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002790","name":"Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002790","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s12083-020-00953-y","type":"journal-article","created":{"date-parts":[[2020,6,24]],"date-time":"2020-06-24T16:03:23Z","timestamp":1593014603000},"page":"1931-1942","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An analytical model for churn process in Bitcoin network with ordinary and relay nodes"],"prefix":"10.1007","volume":"13","author":[{"given":"Saeideh G.","family":"Motlagh","sequence":"first","affiliation":[]},{"given":"Jelena","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7760-9920","authenticated-orcid":false,"given":"Vojislav B.","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,24]]},"reference":[{"key":"953_CR1","doi-asserted-by":"crossref","unstructured":"Aoki Y, Otsuki K, Kaneko T, Banno R, Shudo K (2019) Simblock: A blockchain network simulator. In: Proceeding of CryBlock 2019 (in conj with IEEE INFOCOM)","DOI":"10.1109\/INFCOMW.2019.8845253"},{"key":"953_CR2","unstructured":"Basu S, Eyal I, Sirer EG (2020) Falcon: A Fast Bitcoin backbone (Last accessed February 24)https:\/\/www.falcon-net.org\/"},{"key":"953_CR3","unstructured":"Ben Mariem S, Casas P, Donnet B (2018) Vivisecting blockchain P2P networks: Unveiling the Bitcoin IP network. In: ACM CoNEXT student workshop"},{"key":"953_CR4","unstructured":"Corallo M (2013) High-speed bitcoin relay network. https:\/\/www.mail-archive.com\/bitcoin-development@lists.sourceforge.net\/msg03189.html"},{"key":"953_CR5","unstructured":"Corallo M (2016) Compact block relay. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0152.mediawiki"},{"key":"953_CR6","unstructured":"Corallo M (2017) FIBRE: Fast internet Bitcoin relay engine. https:\/\/github.com\/bitcoinfibre\/bitcoinfibre"},{"key":"953_CR7","doi-asserted-by":"crossref","unstructured":"Daniel E, Rohrer E, Tschorsch F (2019) Map-z: Exposing the zcash network in times of transition. In: Proceedings of the IEEE 44th Conference on Local Computer Networks (LCN). arXiv:1907.09755","DOI":"10.1109\/LCN44214.2019.8990796"},{"key":"953_CR8","doi-asserted-by":"crossref","unstructured":"Delgado-Segura S, Bakshi S, P\u00e9rez-Sol\u00e0 C, Litton J, Pachulski A, Miller A, Bhattacharjee B (2018) TxProbe: Discovering Bitcoin\u2019s network topology using orphan transactions. arXiv:1812.00942","DOI":"10.1007\/978-3-030-32101-7_32"},{"key":"953_CR9","doi-asserted-by":"publisher","unstructured":"Delgado-Segura S, P\u00e9rez-Sol\u00e0 C, Herrera-Joancomart\u00ed J, Navarro-Arribas G, Borrell J (2018) Cryptocurrency networks: A new P2P paradigm. Mobile Information Systems. https:\/\/doi.org\/10.1155\/2018\/2159082","DOI":"10.1155\/2018\/2159082"},{"key":"953_CR10","doi-asserted-by":"crossref","unstructured":"Gervais A, Karame GO, W\u00fcst K, Glykantzis V, Ritzdorf H, Capkun S (2016) On the security and performance of proof of work blockchains. In: Proc. 2016 ACM SIGSAC conference on computer and communications security, pp. 3\u201316. ACM","DOI":"10.1145\/2976749.2978341"},{"key":"953_CR11","doi-asserted-by":"crossref","unstructured":"Gervais A, Ritzdorf H, Karame GO, \u010capkun S (2015) Tampering with the delivery of blocks and transactions in Bitcoin. In: Proc. 22nd ACM SIGSAC conference on computer and communications security, pp. 692\u2013705. ACM","DOI":"10.1145\/2810103.2813655"},{"key":"953_CR12","doi-asserted-by":"crossref","unstructured":"Imtiaz MA, Starobinski D, Trachtenberg A, Younis N (2019) Churn in the bitcoin network: Characterization and impact. In: IEEE Int. Conf. on blockchain and cryptocurrency. Seoul, South Korea","DOI":"10.1109\/BLOC.2019.8751297"},{"key":"953_CR13","doi-asserted-by":"crossref","unstructured":"Karame GO, Androulaki E, Capkun S (2012) Double-spending fast payments in Bitcoin. In: Proc. 2012 ACM conference on computer and communications security, pp. 906\u2013917. ACM","DOI":"10.1145\/2382196.2382292"},{"issue":"1","key":"953_CR14","doi-asserted-by":"publisher","first-page":"7","DOI":"10.3390\/fi8010007","volume":"8","author":"M Lischke","year":"2016","unstructured":"Lischke M, Fabian B (2016) Analyzing the Bitcoin network: The first four years. Future Internet 8(1):7","journal-title":"Future Internet"},{"key":"953_CR15","doi-asserted-by":"crossref","unstructured":"Miller A, Kosba A, Katz J, Shi E (2015) Nonoutsourceable scratch-off puzzles todiscourage bitcoin mining coalitions. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 680\u2013691","DOI":"10.1145\/2810103.2813621"},{"key":"953_CR16","doi-asserted-by":"crossref","unstructured":"Mi\u0161i\u0107 J, Mi\u0161i\u0107 VB, Chang X, Motlagh SG, Ali MZ (2019) Modeling of bitcoin\u2019s blockchain delivery network IEEE Transactions on Network Science and Engineering to appear","DOI":"10.1109\/TNSE.2019.2928716"},{"key":"953_CR17","doi-asserted-by":"crossref","unstructured":"Mi\u0161i\u0107 J, Mi\u0161i\u0107 VB, Chang X (2020) On the benefits of compact blocks in Bitcoin. In: IEEE Int. Conf. on communications ICC 2020. Dublin, Ireland","DOI":"10.1109\/ICC40277.2020.9149418"},{"key":"953_CR18","doi-asserted-by":"crossref","unstructured":"Motlagh SG, Mi\u0161i\u0107 J, Mi\u0161i\u0107 V (2020) Modeling of churn process in bitcoin network. In: Int. Conf. on computing, networking and communications (ICNC 2020). Big Island, HI","DOI":"10.1109\/ICNC47757.2020.9049704"},{"key":"953_CR19","doi-asserted-by":"crossref","unstructured":"Motlagh SG, Mi\u0161i\u0107 J, Mi\u0161i\u0107 VB (2020) Impact of node churn in the bitcoin network. IEEE Transactions on Network Science and Engineering to appear","DOI":"10.1109\/GLOBECOM42002.2020.9347971"},{"key":"953_CR20","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system"},{"key":"953_CR21","doi-asserted-by":"publisher","unstructured":"Neudecker T (2019) Characterization of the bitcoin peer-to-peer network (2015-2018). Tech. Rep. 1 Karlsruher Institut fu\u0307r Technologie (KIT), https:\/\/doi.org\/10.5445\/IR\/1000091933","DOI":"10.5445\/IR\/1000091933"},{"key":"953_CR22","doi-asserted-by":"crossref","unstructured":"Otsuki K, Banno R, Shudo K (2019) Effects of a simple relay network on the bitcoin network. In: Proceedings of Asian Internet Engineering Conference (AINTEC)","DOI":"10.1145\/3340422.3343640"},{"key":"953_CR23","unstructured":"(2014) P2P Network, https:\/\/www.bitcoin.org\/en\/p2p-network-guide#initial-block-download"},{"key":"953_CR24","doi-asserted-by":"crossref","unstructured":"Ron D, Shamir A (2013) Quantitative analysis of the full Bitcoin transaction graph. In: Int. Conf. Financial cryptography and data security, pp. 6\u201324. Springer","DOI":"10.1007\/978-3-642-39884-1_2"},{"key":"953_CR25","doi-asserted-by":"crossref","unstructured":"Stutzbach D, Rejaie R (2006) Understanding churn in peer to peer networks. In: Proceeding of the 6th ACM SIGCOMM conference on Internet measurement","DOI":"10.1145\/1177080.1177105"},{"key":"953_CR26","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.procs.2018.07.193","volume":"134","author":"R Casado-Vara","year":"2018","unstructured":"Casado-Vara R, Prieto J, De la Prieta F, Corchado JM (2018) How blockchain improves the supply chain: Case study alimentary supply chain. Procedia Computer Science 134:393\u2013398","journal-title":"Procedia Computer Science"},{"key":"953_CR27","doi-asserted-by":"publisher","unstructured":"Zhang Y, Xu C, Ni J, Li H, Shen X (2019) Sherman: Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage IEEE Transactions on Cloud Computing, https:\/\/doi.org\/10.1109\/TCC.2019.2923222","DOI":"10.1109\/TCC.2019.2923222"},{"key":"953_CR28","unstructured":"Buterin V (2017) Ethereum: A next-generation smart contract and decentralized application platform. http:\/\/ethereum.org\/ethereum.html"},{"key":"953_CR29","doi-asserted-by":"crossref","unstructured":"Zhang Y, Xu C, Lin X, Shen X (2019) Sherman: Blockchain-based public integrity verification for cloud storage against procrastinating auditors IEEE Transactions on Cloud Computing","DOI":"10.1109\/TCC.2019.2908400"},{"key":"953_CR30","doi-asserted-by":"crossref","unstructured":"Zhang Y, Xu C, Cheng N, Li H, Yang H, Shen X (2020) Sherman: chronos+: An accurate blockchain-based time-stamping scheme for cloud storage IEEE Transactions on Service Computing","DOI":"10.1109\/TSC.2019.2947476"},{"key":"953_CR31","doi-asserted-by":"crossref","unstructured":"Casado-Vara R, Chamoso P, De la Prieta F, Prieto J, Corchado JM (2019) Non-linear adaptive closed-loop control system for improved efficiency in IoT-blockchain management. Information Fusion, pp 227\u2013239","DOI":"10.1016\/j.inffus.2018.12.007"},{"key":"953_CR32","doi-asserted-by":"publisher","unstructured":"Abdullah N, H\u00f8akansson A, Moradian E (2017) Blockchain based approach to enhance big data authentication in distributed environment Ninth International Conference on Ubiquitous and Future Networks (ICUFN), https:\/\/doi.org\/10.1109\/ICUFN.2017.7993927","DOI":"10.1109\/ICUFN.2017.7993927"},{"key":"953_CR33","unstructured":"Klarman U, Basu S, Kuzmanovic A, Gun Sirer E (2018) bloXroute: A scalable trustless blockchain distribution network. whitepaper"},{"key":"953_CR34","unstructured":"Bi W, Yang H, Zheng M (2018) An Accelerated Method for Message Propagation in Blockchain Networks. arXiv:1809.00455"},{"key":"953_CR35","doi-asserted-by":"crossref","unstructured":"Decker C, Wattenhofer R (2013) Information propagation in the Bitcoin network. Proc. 13th IEEE Int. Conf Peer-to-Peer Computing (P2P\u201913)","DOI":"10.1109\/P2P.2013.6688704"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00953-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-020-00953-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00953-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T01:06:53Z","timestamp":1624496813000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-020-00953-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,24]]},"references-count":35,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["953"],"URL":"https:\/\/doi.org\/10.1007\/s12083-020-00953-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2020,6,24]]},"assertion":[{"value":"23 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}