{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T00:54:12Z","timestamp":1775091252294,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T00:00:00Z","timestamp":1621296000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T00:00:00Z","timestamp":1621296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s12083-021-01173-8","type":"journal-article","created":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T04:16:29Z","timestamp":1621311389000},"page":"3110-3123","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":117,"title":["An effective blockchain evaluation system based on entropy-CRITIC weight method and MCDM techniques"],"prefix":"10.1007","volume":"14","author":[{"given":"Shakeel","family":"Zafar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2831-6483","authenticated-orcid":false,"given":"Zareen","family":"Alamgir","sequence":"additional","affiliation":[]},{"given":"M. H.","family":"Rehman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,18]]},"reference":[{"key":"1173_CR1","doi-asserted-by":"publisher","unstructured":"Shi N, Tan L, Li W, Qi X, Yu K (2020) A blockchain-empowered AAA scheme in the large-scale hetnet. Digit Commun Netw. https:\/\/doi.org\/10.1016\/j.dcan.2020.10.002","DOI":"10.1016\/j.dcan.2020.10.002"},{"key":"1173_CR2","doi-asserted-by":"publisher","unstructured":"Yu KP, Tan L, Aloqaily M, Yang H, Jararweh Y (2021) Blockchain-enhanced data sharing with traceable and direct revocation in IIoT. IEEE Trans Indust Inf, pp 1\u20131. https:\/\/doi.org\/10.1109\/TII.2021.304914","DOI":"10.1109\/TII.2021.304914"},{"key":"1173_CR3","first-page":"55","volume":"8","author":"A Ouaguid","year":"2018","unstructured":"Ouaguid A, Abghour N, Ouzzif M (2018) A novel security framework for managing android permissions using blockchain technology. Int J Cloud Appl Comput 8:55\u201379","journal-title":"Int J Cloud Appl Comput"},{"issue":"2","key":"1173_CR4","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/MCE.2020.3035520","volume":"10","author":"K Yu","year":"2021","unstructured":"Yu K, Tan L, Shang X, Huang J, Srivastava G, Chatterjee P (2021) Efficient and privacy-preserving medical research support platform against covid-19: a blockchain-based approach. IEEE Consum Elect Mag 10(2):111\u2013120","journal-title":"IEEE Consum Elect Mag"},{"key":"1173_CR5","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.ins.2018.02.060","volume":"479","author":"D Li","year":"2019","unstructured":"Li D, Deng L, Gupta BB, Wang H, Choi C (2019) A novel cnn based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci 479:432\u2013 447","journal-title":"Inf Sci"},{"key":"1173_CR6","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1016\/j.ins.2017.12.038","volume":"479","author":"N Nedjah","year":"2019","unstructured":"Nedjah N, Wyant RS, Mourelle LM, Gupta BB (2019) Efficient fingerprint matching on smart cards for high security and privacy in smart systems. Inf Sci 479:622\u2013639","journal-title":"Inf Sci"},{"key":"1173_CR7","doi-asserted-by":"publisher","first-page":"03","DOI":"10.1093\/jamia\/ocy134","volume":"26","author":"T-T Kuo","year":"2019","unstructured":"Kuo T-T, Rojas H, Ohno-Machado L (2019) Comparison of blockchain platforms: a systematic review and healthcare examples. J Amer Med Inf Assoc JAMIA 26:03","journal-title":"J Amer Med Inf Assoc JAMIA"},{"key":"1173_CR8","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.eswa.2018.09.048","volume":"117","author":"H Tang","year":"2019","unstructured":"Tang H, Shi Y, Dong P (2019) Public blockchain evaluation using entropy and topsis. Expert Sys Appl 117:204\u2013210","journal-title":"Expert Sys Appl"},{"key":"1173_CR9","unstructured":"Macdonald M, Liu-Thorrold L, Julien R (2017) The blockchain: a comparison of platforms and their uses beyond Bitcoin. COMS4507-Advanced Computer and Network Security. [Online]"},{"issue":"2","key":"1173_CR10","first-page":"56","volume":"10","author":"M Velasquez","year":"2013","unstructured":"Velasquez M, Hester P (2013) An analysis of multi-criteria decision making methods. Int J Oper Res 10(2):56\u201366","journal-title":"Int J Oper Res"},{"issue":"7","key":"1173_CR11","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/0305-0548(94)00059-H","volume":"22","author":"D Diakoulaki","year":"1995","unstructured":"Diakoulaki D, Mavrotas G, Papayannakis L (1995) Determining objective weights in multiple criteria problems: the critic method. Comput Oper Res 22(7):763\u2013770","journal-title":"Comput Oper Res"},{"issue":"01","key":"1173_CR12","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1142\/S0219622012500095","volume":"11","author":"G Kou","year":"2012","unstructured":"Kou G, Lu Y, Peng Y, Shi Y (2012) Evaluation of classification algorithms using mcdm and rank correlation. Int J Inf Tech Decis Making 11(01):197\u2013225","journal-title":"Int J Inf Tech Decis Making"},{"key":"1173_CR13","unstructured":"BitcoinExchangeGuide. https:\/\/bitcoinexchangeguide.com. Accessed 30 Sep 2010"},{"issue":"4","key":"1173_CR14","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TEM.2019.2956897","volume":"67","author":"S Farshidi","year":"2020","unstructured":"Farshidi S, Jansen S, Espa\u00f1a S, Verkleij J (2020) Decision support for blockchain platform selection: three industry case studies. IEEE Trans Eng Manag 67(4):1109\u20131128","journal-title":"IEEE Trans Eng Manag"},{"key":"1173_CR15","doi-asserted-by":"publisher","first-page":"269","DOI":"10.3390\/e21030269","volume":"21","author":"P Chen","year":"2019","unstructured":"Chen P (2019) On the diversity-based weighting method for risk assessment and decision-making about natural hazards. Entropy 21:269","journal-title":"Entropy"},{"issue":"2","key":"1173_CR16","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/S0377-2217(03)00020-1","volume":"156","author":"S Opricovic","year":"2004","unstructured":"Opricovic S, Tzeng G-H (2004) Compromise solution by mcdm methods: a comparative analysis of VIKOR and TOPSIS. European J Oper Res 156(2):445\u2013455","journal-title":"European J Oper Res"},{"key":"1173_CR17","unstructured":"BitInfoCharts. https:\/\/bitinfocharts.com. Accessed 30 Sep 2010"},{"key":"1173_CR18","unstructured":"Coincheckup. https:\/\/coincheckup.com\/analysis\/github. Accessed 30 Sep 2010"},{"key":"1173_CR19","unstructured":"CoinMetrics. https:\/\/coinmetrics.io\/data-downloads\/. Accessed 30 Sep 2010"},{"key":"1173_CR20","volume-title":"Intelligent systems, technologies and applications: proceedings of ISTA 2018, vol 910","author":"SM Thampi","year":"2019","unstructured":"Thampi SM (2019) Intelligent systems, technologies and applications: proceedings of ISTA 2018, vol 910. Springer, Berlin"},{"issue":"3","key":"1173_CR21","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1016\/j.ipm.2018.12.002","volume":"56","author":"JH Yu","year":"2019","unstructured":"Yu JH, Kang J, Park S (2019) Information availability and return volatility in the bitcoin market: analyzing differences of user opinion and interest. Inf Process Manag 56(3):721\u2013732","journal-title":"Inf Process Manag"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01173-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01173-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01173-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T11:37:47Z","timestamp":1629373067000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01173-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,18]]},"references-count":21,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["1173"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01173-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,18]]},"assertion":[{"value":"13 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}