{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:41:05Z","timestamp":1765546865170,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T00:00:00Z","timestamp":1642032000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T00:00:00Z","timestamp":1642032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s12083-021-01237-9","type":"journal-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T07:09:13Z","timestamp":1642057753000},"page":"1126-1138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Performance analysis of PoUW consensus mechanism: Fork probability and throughput"],"prefix":"10.1007","volume":"15","author":[{"given":"Qinglin","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Xianqing","family":"Tai","sequence":"additional","affiliation":[]},{"given":"Jianwen","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Li","family":"Feng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0463-3414","authenticated-orcid":false,"given":"Zhijie","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,13]]},"reference":[{"unstructured":"Satoshi N (2008) Bitcoin: A peer-to-peer electronic cash system","key":"1237_CR1"},{"unstructured":"Zhang F, Eyal I, Escriva R, Juels A, Renesse R (2017) REM: Resource-efficient mining for blockchains, In: 26th USENIX security symposium, pp. 1427\u20131444","key":"1237_CR2"},{"issue":"3","key":"1237_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/3152481","volume":"61","author":"S Yonatan","year":"2018","unstructured":"Yonatan S, Zohar A (2018) Bitcoin\u2019s underlying incentives. Commun ACM 61(3):46\u201353","journal-title":"Commun ACM"},{"doi-asserted-by":"crossref","unstructured":"Decker C, Wattenhofer R (2013) Information propagation in the bitcoin network, In: IEEE 13th international conference on peer-to-peer computing, IEEE, pp. 1\u201310","key":"1237_CR4","DOI":"10.1109\/P2P.2013.6688704"},{"doi-asserted-by":"crossref","unstructured":"Biais B, Bisiere C, Bouvard M, Casamatta C (2018) The blockchain folk theorem, In: Swiss Finance Institute Research Paper, pp. 17\u201375","key":"1237_CR5","DOI":"10.2139\/ssrn.3108601"},{"doi-asserted-by":"crossref","unstructured":"Neudecker T, Hartenstein H (2019) Short paper: an empirical analysis of blockchain forks in bitcoin. Accessed Mar 04 2019. [Online]. Available: https:\/\/dsn.tm.kit.edu\/bitcoin\/forks","key":"1237_CR6","DOI":"10.1007\/978-3-030-32101-7_6"},{"issue":"1","key":"1237_CR7","first-page":"101","volume":"14","author":"GT Nguyen","year":"2018","unstructured":"Nguyen GT, Kim K (2018) A survey about consensus algorithms used in blockchain. J Info Process Syst 14(1):101\u2013128","journal-title":"J Info Process Syst"},{"doi-asserted-by":"crossref","unstructured":"Shahsavari Y, Zhang K, Talhi C (2019) Performance modeling and analysis of the bitcoin inventory protocol, In: 2019 IEEE international conference on Decentralized Applications and Infrastructures (DAPPCON), USA","key":"1237_CR8","DOI":"10.1109\/DAPPCON.2019.00019"},{"doi-asserted-by":"crossref","unstructured":"Shahsavari Y, Zhang K, Talhi C (2019) A theoretical model for fork analysis in the bitcoin network, In: 2019 IEEE international conference on Blockchain (Blockchain), Atlanta, GA, USA, pp. 237\u2013244","key":"1237_CR9","DOI":"10.1109\/Blockchain.2019.00038"},{"unstructured":"\u201cOrphan probability approximation,\u201d http:\/\/gist.github.com\/gavinandresen\/5044482","key":"1237_CR10"},{"doi-asserted-by":"crossref","unstructured":"Xiong Z, Feng S, Niyato D, Wang P, Han Z (2018) Cloud\/fog computing resource management and pricing for blockchain networks. IEEE Internet Things J\u00a06(3): 4585\u20134600","key":"1237_CR11","DOI":"10.1109\/JIOT.2018.2871706"},{"doi-asserted-by":"crossref","unstructured":"Xiong Z, Feng S, Niyato D, Wang P, Han Z (2018) Optimal pricing-based edge computing resource management in mobile blockchain. In: ICC, pp. 1\u20136. IEEE","key":"1237_CR12","DOI":"10.1109\/ICC.2018.8422517"},{"unstructured":"Lucianna K, Rajaraman R (2018) A better method to analyze blockchain consistency. In: Proceedings of the ACM SIGSAC conference on computer and communications security, pp. 729\u2013744. ACM","key":"1237_CR13"},{"doi-asserted-by":"crossref","unstructured":"Ma Z, Zhao Q, Yuan J, Zhou X, Feng L (2020) Fork probability analysis of PoUW consensus mechanism. In 2020 IEEE international conference on smart internet of things, Beijing, China, pp.333\u2013337","key":"1237_CR14","DOI":"10.1109\/SmartIoT49966.2020.00060"},{"issue":"10","key":"1237_CR15","doi-asserted-by":"publisher","first-page":"e0163477","DOI":"10.1371\/journal.pone.0163477","volume":"11","author":"J Yli-Huumo","year":"2016","unstructured":"Yli-Huumo J, Ko D, Choi S, Park S, Smolander K (2016) Where is current research on blockchain technology?\u2014a systematic review. PLoS One 11(10):e0163477","journal-title":"PLoS ONE"},{"doi-asserted-by":"crossref","unstructured":"Croman K, Decker C, Eyal I, Gencer AE et al (2016) On scaling decentralized blockchains, In: International conference on financial cryptography and data security. Springer, Berlin, Heidelberg","key":"1237_CR16","DOI":"10.1007\/978-3-662-53357-4_8"},{"doi-asserted-by":"crossref","unstructured":"Dinh T, Wang J, Chen G, Liu R, Ooi B, Tan K (2017) Blockbench: a framework for analyzing private blockchains, In: Proceedings of the 2017 ACM international conference on management of data","key":"1237_CR17","DOI":"10.1145\/3035918.3064033"},{"doi-asserted-by":"crossref","unstructured":"SPongnumkul S, Siripanpornchana C, Thajchayapong S, Performance analysis of private blockchain platforms in varying workloads. In: 2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE","key":"1237_CR18","DOI":"10.1109\/ICCCN.2017.8038517"},{"doi-asserted-by":"crossref","unstructured":"Garay J, Kiayias A, Leonardos N (2015) The bitcoin backbone protocol: analysis and applications, In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg","key":"1237_CR19","DOI":"10.1007\/978-3-662-46803-6_10"},{"doi-asserted-by":"crossref","unstructured":"Pass R, Seeman L, Shelat A (2017) Analysis of the blockchain protocol in asynchronous networks. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, Cham","key":"1237_CR20","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"1237_CR21","first-page":"1","volume":"2016","author":"F McKeen","year":"2016","unstructured":"McKeen F, Alexandrovich I, Anati I, Caspi D, Johnson S, Leslie-Hurd R, Rozas C (2016) Intel\u00ae software guard extensions (intel\u00ae sgx) support for dynamic memory management inside an enclave. Proceedings of the Hardware and Architectural Support for Security and Privacy 2016:1\u20139","journal-title":"Proceedings of the Hardware and Architectural Support for Security and Privacy"},{"unstructured":"King S, Nadal S (2012) Ppcoin: Peer-to-peer crypto-currency with proof-of-stake.\u00a0Self-published paper 19(1):1\u20136","key":"1237_CR22"},{"unstructured":"King S (2013) Primecoin: Cryptocurrency with prime number proof-of-work. 1(6):1\u20136. [online: https:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.694.5890&rep=rep1&type=pd]","key":"1237_CR23"},{"doi-asserted-by":"crossref","unstructured":"Chatterjee K, Goharshady AK, Pourdamghani A (2019) Hybrid mining: exploiting blockchain's computational power for distributed problem solving. In: Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing, pp. 374\u2013381","key":"1237_CR24","DOI":"10.1145\/3297280.3297319"},{"unstructured":"Zheng W, Chen X, Zheng Z, Luo X, Cui J (2020) AxeChain: a Secure and Decentralized blockchain for solving Easily-Verifiable problems.\"\u00a0https:\/\/arxiv.org\/abs\/2003.13999","key":"1237_CR25"},{"unstructured":"Dotan M, Tochner S (2020) Proofs of useless work-positive and negative results for wasteless mining systems.\"\u00a0https:\/\/arxiv.org\/abs\/2007.01046","key":"1237_CR26"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01237-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01237-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01237-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,16]],"date-time":"2022-03-16T08:20:39Z","timestamp":1647418839000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01237-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,13]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["1237"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01237-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2022,1,13]]},"assertion":[{"value":"7 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}