{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T23:48:25Z","timestamp":1773704905334,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T00:00:00Z","timestamp":1599696000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T00:00:00Z","timestamp":1599696000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Peng Cheng Laboratory Project of Guangdong Province","award":["PCL2018KP004"],"award-info":[{"award-number":["PCL2018KP004"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772150"],"award-info":[{"award-number":["61772150"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862012"],"award-info":[{"award-number":["61862012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962012"],"award-info":[{"award-number":["61962012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangxi Key R&D Program","award":["AB17195025"],"award-info":[{"award-number":["AB17195025"]}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"crossref","award":["2018GXNSFDA281054"],"award-info":[{"award-number":["2018GXNSFDA281054"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"crossref","award":["2018GXNSFAA281232"],"award-info":[{"award-number":["2018GXNSFAA281232"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"crossref","award":["2019GXNSFFA245015"],"award-info":[{"award-number":["2019GXNSFFA245015"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"crossref","award":["2019GXNSFGA245004"],"award-info":[{"award-number":["2019GXNSFGA245004"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"crossref","award":["AD19245048"],"award-info":[{"award-number":["AD19245048"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Cryptography Development Fund of China","award":["MMJJ20170217"],"award-info":[{"award-number":["MMJJ20170217"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s12083-020-00984-5","type":"journal-article","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T14:05:21Z","timestamp":1599746721000},"page":"482-496","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Design and implementation of blockchain-based digital advertising media promotion system"],"prefix":"10.1007","volume":"14","author":[{"given":"Yong","family":"Ding","sequence":"first","affiliation":[]},{"given":"Decun","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Hengkui","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Wenyao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yujue","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,10]]},"reference":[{"key":"984_CR1","doi-asserted-by":"publisher","unstructured":"Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y, Muralidharan S, Murthy C, Nguyen B, Sethi M, Singh G, Smith K, Sorniotti A, Stathakopoulou C, Vukoli\u0107 M, Cocco S W, Yellick J (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference, EuroSys \u201918. ACM, New York, pp 30:1\u201330:15. https:\/\/doi.org\/10.1145\/3190508.3190538\/. http:\/\/doi.acm.org\/10.1145\/3190508.3190538","DOI":"10.1145\/3190508.3190538\/"},{"key":"984_CR2","doi-asserted-by":"crossref","unstructured":"Andrychowicz M, Dziembowski S, Malinowski D, Mazurek \u0141 (2014) Modeling bitcoin contracts by timed automata. In: Legay A, Bozga M (eds) Formal modeling and analysis of timed systems. Springer International Publishing, Cham, pp 7\u201322","DOI":"10.1007\/978-3-319-10512-3_2"},{"issue":"9","key":"984_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MC.2017.3571064","volume":"50","author":"T Aste","year":"2017","unstructured":"Aste T, Tasca P, Matteo T D (2017) Blockchain technologies: the foreseeable impact on society and industry. Computer 50(9):18\u201328. https:\/\/doi.org\/10.1109\/MC.2017.3571064","journal-title":"Computer"},{"key":"984_CR4","doi-asserted-by":"crossref","unstructured":"Bach L, Mihaljevic B, Zagar M (2018) Comparative analysis of blockchain consensus algorithms. In: 2018 41st International convention on information and communication technology, electronics and microelectronics (MIPRO). IEEE, pp 1545\u20131550","DOI":"10.23919\/MIPRO.2018.8400278"},{"issue":"2","key":"984_CR5","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2018.1451660","volume":"51","author":"R Beck","year":"2018","unstructured":"Beck R (2018) Beyond bitcoin: the rise of blockchain world. Computer 51(2):54\u201358. https:\/\/doi.org\/10.1109\/MC.2018.1451660","journal-title":"Computer"},{"issue":"3","key":"984_CR6","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/2695533.2695545","volume":"42","author":"I Bentov","year":"2014","unstructured":"Bentov I, Lee C, Mizrahi A, Rosenfeld M (2014) Proof of activit y: extending bitcoin\u2019s proof of work via proof of stake. SIGMETRICS Perform Eval Rev 42(3):34\u201337. https:\/\/doi.org\/10.1145\/2695533.2695545","journal-title":"SIGMETRICS Perform Eval Rev"},{"key":"984_CR7","unstructured":"Brown R G, Carlyle J, Grigg I, Hearn M (2016) Corda: an introduction. R3 CEV. August 1, 15"},{"key":"984_CR8","doi-asserted-by":"publisher","unstructured":"Budak C, Goel S, Rao J, Zervas G (2016) Understanding emerging threats to online advertising. In: Proceedings of the 2016 ACM conference on economics and computation, EC \u201916. ACM, New York, pp 561\u2013578. https:\/\/doi.org\/10.1145\/2940716.2940787","DOI":"10.1145\/2940716.2940787"},{"key":"984_CR9","doi-asserted-by":"publisher","unstructured":"Caro M P, Ali M S, Vecchio M, Giaffreda R (2018) Blockchain-based traceability in agri-food supply chain management: a practical implementation. In: 2018 IoT vertical and topical summit on agriculture\u2014Tuscany (IOT Tuscany), pp 1\u20134. https:\/\/doi.org\/10.1109\/IOT-TUSCANY.2018.8373021","DOI":"10.1109\/IOT-TUSCANY.2018.8373021"},{"key":"984_CR10","unstructured":"Castro M, Liskov B (1999) Practical byzantine fault tolerance. In: Proceedings of the third symposium on operating systems design and implementation, OSDI \u201999. USENIX Association, Berkeley, pp 173\u2013186. http:\/\/dl.acm.org\/citation.cfm?id=296806.296824"},{"key":"984_CR11","doi-asserted-by":"crossref","unstructured":"Dennis R, Disso J P (2019) An analysis into the scalability of bitcoin and ethereum. In: Third international congress on information and communication technology. Springer, pp 619\u2013627","DOI":"10.1007\/978-981-13-1165-9_57"},{"key":"984_CR12","doi-asserted-by":"crossref","unstructured":"Dhumwad S, Sukhadeve M, Naik C, Manjunath KN, Prabhu S (2017) A peer to peer money transfer using sha256 and merkle tree. In: Annual international conference on advanced computing and communications, pp 40\u201343. http:\/\/eprints.manipal.edu\/id\/eprint\/150090","DOI":"10.1109\/ADCOM.2017.00013"},{"key":"984_CR13","doi-asserted-by":"crossref","unstructured":"Ding Y, Luo D, Xiang H, Tang C, Liu L, Zou X, Li S, Wang Y (2019) A blockchain-based digital advertising media promotion system. In: International conference on security and privacy in new computing environments. Springer, pp 472\u2013484","DOI":"10.1007\/978-3-030-21373-2_38"},{"issue":"1","key":"984_CR14","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.comcom.2016.12.016","volume":"100","author":"J Estrada-Jim\u00e9nez","year":"2017","unstructured":"Estrada-Jim\u00e9nez J, Parra-Arnau J, Rodr\u00edguez-Hoyos A, Forn\u00e9 J (2017) Online advertising: analysis of privacy threats and protection approaches. Comput Commun 100(1):32\u201351. https:\/\/doi.org\/10.1016\/j.comcom.2016.12.016. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0140366416307083","journal-title":"Comput Commun"},{"issue":"4","key":"984_CR15","doi-asserted-by":"publisher","first-page":"934","DOI":"10.1007\/s12083-018-0685-6","volume":"12","author":"X Feng","year":"2019","unstructured":"Feng X, Ma J, Miao Y, Meng Q, Liu X, Jiang Q, Li H (2019) Pruneable sharding-based blockchain protocol. Peer-to-Peer Netw Appl 12(4):934\u2013950. https:\/\/doi.org\/10.1007\/s12083-018-0685-6","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"1","key":"984_CR16","doi-asserted-by":"crossref","first-page":"67","DOI":"10.69554\/VRSM5078","volume":"10","author":"DA Freund","year":"2018","unstructured":"Freund D A (2018) Economic incentives and blockchain security. J Secur Oper Custody 10 (1):67\u201376","journal-title":"J Secur Oper Custody"},{"key":"984_CR17","doi-asserted-by":"publisher","unstructured":"Hjalmarsson FP, Hreioarsson GK, Hamdaqa M, Hjalmtysson G (2018) Blockchain-based e-voting system. In: 2018 IEEE 11th international conference on cloud computing (CLOUD), pp 983\u2013986. https:\/\/doi.org\/10.1109\/CLOUD.2018.00151","DOI":"10.1109\/CLOUD.2018.00151"},{"issue":"1","key":"984_CR18","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/TSMC.2019.2895471","volume":"50","author":"D Huang","year":"2020","unstructured":"Huang D, Ma X, Zhang S (2020) Performance analysis of the raft consensus algorithm for private blockchains. IEEE Trans Syst Man Cybern: Syst 50(1):172\u2013181. https:\/\/doi.org\/10.1109\/TSMC.2019.2895471","journal-title":"IEEE Trans Syst Man Cybern: Syst"},{"key":"984_CR19","unstructured":"Hyperledger (2018) A blockchain benchmark framework to measure performance of multiple blockchain solutions. https:\/\/github.com\/hyperledger\/caliper"},{"key":"984_CR20","doi-asserted-by":"publisher","unstructured":"Karame G (2016) On the security and scalability of bitcoin\u2019s blockchain. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, CCS \u201916. https:\/\/doi.org\/10.1145\/2976749.2976756. ACM, New York, pp 1861\u20131862","DOI":"10.1145\/2976749.2976756"},{"issue":"2","key":"984_CR21","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s12626-017-0007-0","volume":"11","author":"S Katsumata","year":"2017","unstructured":"Katsumata S, Motohashi E, Nishimoto A, Toyosawa E (2017) The contents-based website classification for the internet advertising planning: an empirical application of the natural language analysis. Rev Socionetwork Strateg 11(2):129\u2013142. https:\/\/doi.org\/10.1007\/s12626-017-0007-0","journal-title":"Rev Socionetwork Strateg"},{"key":"984_CR22","doi-asserted-by":"crossref","unstructured":"Kiayias A, Russell A, David B, Oliynykov R (2017) Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Annual international cryptology conference. Springer, pp 357\u2013388","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"984_CR23","doi-asserted-by":"crossref","unstructured":"Korpela K, Hallikas J, Dahlberg T (2017) Digital supply chain transformation toward blockchain integration. In: Proceedings of the 50th Hawaii international conference on system sciences, pp 4182\u20134191","DOI":"10.24251\/HICSS.2017.506"},{"key":"984_CR24","doi-asserted-by":"crossref","unstructured":"Kosba A, Miller A, Shi E, Wen Z, Papamanthou C (2016) Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE symposium on security and privacy (SP). IEEE, pp 839\u2013858","DOI":"10.1109\/SP.2016.55"},{"key":"984_CR25","unstructured":"Kotila M, Cuevas Rumin R, Dhar S (2016) Compendium of ad fraud knowledge for media investors. Report ETLA Reports No 68, WFA Global Transparency Group, Brussels, Belgium. https:\/\/pub.etla.fi\/ETLA-Raportit-Reports-68.pdf"},{"key":"984_CR26","unstructured":"Larimer D (2017) Dpos consensus algorithm\u2013the missing whitepaper. Tech. rep. Steemit"},{"key":"984_CR27","doi-asserted-by":"crossref","unstructured":"Lauslahti K, Mattila J, Sepp\u00e4l\u00e4 T (2017) Smart contracts\u2013how will blockchain technology affect contractual practices? Report ETLA Reports No 68, ETLA. The Research Institute of the Finnish Economy. https:\/\/pub.etla.fi\/ETLA-Raportit-Reports-68.pdf","DOI":"10.2139\/ssrn.3154043"},{"issue":"8","key":"984_CR28","doi-asserted-by":"publisher","first-page":"3690","DOI":"10.1109\/TII.2017.2786307","volume":"14","author":"Z Li","year":"2018","unstructured":"Li Z, Kang J, Yu R, Ye D, Deng Q, Zhang Y (2018) Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans Ind Inf 14(8):3690\u20133700. https:\/\/doi.org\/10.1109\/TII.2017.2786307","journal-title":"IEEE Trans Ind Inf"},{"issue":"5","key":"984_CR29","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1007\/s12083-019-00786-4","volume":"12","author":"H Li","year":"2019","unstructured":"Li H, Pei L, Liao D, Sun G, Xu D (2019) Blockchain meets vanet: an architecture for identity and location privacy protection in vanet. Peer-to-Peer Netw Appl 12(5):1178\u20131193. https:\/\/doi.org\/10.1007\/s12083-019-00786-4","journal-title":"Peer-to-Peer Netw Appl"},{"key":"984_CR30","unstructured":"Kotila M, Cuevas Rumin R, Dhar S (2016) Compendium of ad fraud knowledge for media investors. WFA Global Transparency Group,Brussels, Belgium Universidad Carlos III de Madrid(Tech Rep)"},{"key":"984_CR31","doi-asserted-by":"publisher","unstructured":"Markovic M (2007) Data protection techniques, cryptographic protocols and pki systems in modern computer networks. In: 2007 14th International workshop on systems, signals and image processing and 6th EURASIP conference focused on speech and image processing, multimedia communications and services, pp 13\u201324. https:\/\/doi.org\/10.1109\/IWSSIP.2007.4381086","DOI":"10.1109\/IWSSIP.2007.4381086"},{"key":"984_CR32","unstructured":"Merkle R (1979) Secrecy, authentication, and public key systems. Ph. D Thesis. Stanford University"},{"key":"984_CR33","doi-asserted-by":"publisher","unstructured":"M\u00fcller L (2018) Transforming online advertising: a user centric approach to bridge the gap. In: Proceedings of the 2018 ACM SIGMIS conference on computers and people research, SIGMIS-CPR\u201918. https:\/\/doi.org\/10.1145\/3209626.3209632. ACM, New York, pp 181\u2013182","DOI":"10.1145\/3209626.3209632"},{"key":"984_CR34","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Tech. rep. https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"984_CR35","doi-asserted-by":"publisher","first-page":"3976093","DOI":"10.1155\/2018\/3976093","volume":"2018","author":"Q Nasir","year":"2018","unstructured":"Nasir Q, Qasse I A, Abu Talib M, Nassif A B (2018) Performance analysis of hyperledger fabric platforms. Secur Commun Netw 2018:3976093","journal-title":"Secur Commun Netw"},{"key":"984_CR36","doi-asserted-by":"publisher","first-page":"54884","DOI":"10.1109\/ACCESS.2018.2872694","volume":"6","author":"M P\u00e4rssinen","year":"2018","unstructured":"P\u00e4rssinen M, Kotila M, Cuevas R, Phansalkar A, Manner J (2018) Is blockchain ready to revolutionize online advertising? IEEE Access 6:54884\u201354899. https:\/\/doi.org\/10.1109\/ACCESS.2018.2872694","journal-title":"IEEE Access"},{"key":"984_CR37","unstructured":"Pastor Valles A (2016) An entropy-based methodology for detecting online advertising fraud at scale. Ph.D. thesis. Universidad Carlos III de Madrid, Spain"},{"key":"984_CR38","unstructured":"PwC: Iab internet advertising revenue report\u20142016 full-year results. Tech. rep., Interactive Advertising Bureau (IAB) and PricewaterhouseCoopers (PwC) (2017). https:\/\/doi.org\/https:\/\/www.iab.com\/wp-content\/uploads\/2016\/04\/IAB_Internet_Advertising_Revenue_Report_FY_2016.pdfReport_FY_2016.pdf"},{"key":"984_CR39","doi-asserted-by":"publisher","unstructured":"Rouhani S, Deters R (2017) Performance analysis of ethereum transactions in private blockchain. In: 2017 8th IEEE international conference on software engineering and service science (ICSESS), pp 70\u201374. https:\/\/doi.org\/10.1109\/ICSESS.2017.8342866","DOI":"10.1109\/ICSESS.2017.8342866"},{"issue":"7","key":"984_CR40","doi-asserted-by":"publisher","first-page":"2117","DOI":"10.1080\/00207543.2018.1533261","volume":"57","author":"S Saberi","year":"2019","unstructured":"Saberi S, Kouhizadeh M, Sarkis J, Shen L (2019) Blockchain technology and its relationships to sustainable supply chain management. Int J Prod Res 57(7):2117\u20132135. https:\/\/doi.org\/10.1080\/00207543.2018.1533261","journal-title":"Int J Prod Res"},{"key":"984_CR41","doi-asserted-by":"crossref","unstructured":"Thakkar P, Nathan S, Viswanathan B (2018) Performance benchmarking and optimizing hyperledger fabric blockchain platform. In: 2018 IEEE 26th international symposium on modeling, analysis, and simulation of computer and telecommunication systems (MASCOTS). IEEE, pp 264\u2013276","DOI":"10.1109\/MASCOTS.2018.00034"},{"key":"984_CR42","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151:1\u201332","journal-title":"Ethereum Project Yellow Paper"},{"key":"984_CR43","doi-asserted-by":"crossref","unstructured":"Yang W, Garg S, Raza A, Herbert D, Kang B (2018) Blockchain: trends and future. In: Yoshida K, Lee M (eds) Knowledge management and acquisition for intelligent systems. Springer International Publishing, Cham, pp 201\u2013210","DOI":"10.1007\/978-3-319-97289-3_15"},{"key":"984_CR44","doi-asserted-by":"crossref","unstructured":"Yang X, Yi X, Nepal S, Han F (2018) Decentralized voting: a self-tallying voting system using a smart contract on the ethereum blockchain. In: Hacid H, Cellary W, Wang H, Paik H Y, Zhou R (eds) Web information systems engineering\u2014WISE 2018. Springer International Publishing, Cham, pp 18\u201335","DOI":"10.1007\/978-3-030-02922-7_2"},{"key":"984_CR45","doi-asserted-by":"crossref","unstructured":"Youssef J R, Zacharewicz G, Chen D (2016) Developing an enterprise operating system (eos)-requirements and architecture. In: 2016 IEEE 25th international conference on enabling technologies: infrastructure for collaborative enterprises (WETICE). IEEE, pp 130\u2013135","DOI":"10.1109\/WETICE.2016.36"},{"issue":"9","key":"984_CR46","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MCOM.2018.1701204","volume":"56","author":"S Yu","year":"2018","unstructured":"Yu S, Wang G, Liu X, Niu J (2018) Security and privacy in the age of the smart internet of things: an overview from a networking perspective. IEEE Commun Mag 56(9):14\u201318","journal-title":"IEEE Commun Mag"},{"key":"984_CR47","first-page":"262","volume":"2018","author":"J Zahnentferner","year":"2018","unstructured":"Zahnentferner J (2018) Chimeric ledgers: translating and unifying utxo-based and account-based cryptocurrencies. IACR Cryptology ePrint Archive 2018:262","journal-title":"IACR Cryptology ePrint Archive"},{"issue":"2","key":"984_CR48","first-page":"216","volume":"13","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Xu C, Cheng N, Li H, Yang H, Shen X (2020) Chronos++: an accurate blockchain-based time-stamping scheme for cloud storage. IEEE Trans Serv Comput 13 (2):216\u2013229","journal-title":"IEEE Trans Serv Comput"},{"key":"984_CR49","doi-asserted-by":"publisher","unstructured":"Zhang Y, Xu C, Ni J, Li H, Shen X Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Trans Cloud Comput 1\u20131 (accepted 2019, to appear). https:\/\/doi.org\/10.1109\/TCC.2019.2923222","DOI":"10.1109\/TCC.2019.2923222"},{"key":"984_CR50","doi-asserted-by":"publisher","unstructured":"Zhao W, Wang D (2010) Study on internet advertising placement problem. In: 2010 International conference on logistics systems and intelligent management (ICLSIM), vol 3, pp 1798\u20131801. https:\/\/doi.org\/10.1109\/ICLSIM.2010.5461317","DOI":"10.1109\/ICLSIM.2010.5461317"},{"key":"984_CR51","doi-asserted-by":"publisher","unstructured":"Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International congress on big data (BigData Congress), pp 557\u2013564. https:\/\/doi.org\/10.1109\/BigDataCongress.2017.85","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"984_CR52","doi-asserted-by":"crossref","unstructured":"Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International congress on big data (BigData Congress). IEEE, pp 557\u2013564","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"984_CR53","doi-asserted-by":"crossref","unstructured":"Zheng Q, Li Y, Chen P, Dong X (2018) An innovative ipfs-based storage model for blockchain. In: 2018 IEEE\/WIC\/ ACM international conference on web intelligence (WI). IEEE, pp 704\u2013708","DOI":"10.1109\/WI.2018.000-8"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00984-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-020-00984-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00984-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T15:30:59Z","timestamp":1723563059000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-020-00984-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,10]]},"references-count":53,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["984"],"URL":"https:\/\/doi.org\/10.1007\/s12083-020-00984-5","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,10]]},"assertion":[{"value":"26 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}