{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:03:55Z","timestamp":1769040235707,"version":"3.49.0"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T00:00:00Z","timestamp":1663286400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T00:00:00Z","timestamp":1663286400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["71671158"],"award-info":[{"award-number":["71671158"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["71932002"],"award-info":[{"award-number":["71932002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s12083-022-01380-x","type":"journal-article","created":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T07:34:04Z","timestamp":1663313644000},"page":"2516-2528","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Stochastic performance modeling for practical byzantine fault tolerance consensus in the blockchain"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8680-1279","authenticated-orcid":false,"given":"Fan-Qi","family":"Ma","sequence":"first","affiliation":[]},{"given":"Quan-Lin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yi-Han","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yan-Xia","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,16]]},"reference":[{"key":"1380_CR1","volume-title":"Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction","author":"A Narayanan","year":"2015","unstructured":"Narayanan A, Bonneau J, Felten E, Miller A, Goldfeder S (2015) Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. University Press, Princeton"},{"key":"1380_CR2","unstructured":"Imran B (2017) Mastering Blockchain: Distributed Ledger Technology, Decentralization, and Smart Contracts Explained. Packt Publishing, Birmingham"},{"key":"1380_CR3","unstructured":"Raj K (2019) Foundations of Blockchain: The Pathway to Cryptocurrencies and Decentralized Blockchain Applications. Packt Publishing, Birmingham"},{"key":"1380_CR4","doi-asserted-by":"publisher","DOI":"10.1201\/9780429324932","volume-title":"Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications","author":"Y Maleh","year":"2020","unstructured":"Maleh Y, Shojafar M, Alazab M, Romdhani I (2020) Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. CRC Press, New York"},{"key":"1380_CR5","doi-asserted-by":"publisher","DOI":"10.1201\/9781003034087","volume-title":"Blockchain-Enabled Fog and Edge Computing: Concepts","author":"MM Rehan","year":"2020","unstructured":"Rehan MM, Rehmani MH (2020) Blockchain-Enabled Fog and Edge Computing: Concepts. CRC Press, New York, Architectures and Applications"},{"key":"1380_CR6","volume-title":"Bitcoin, Blockchain, and Cryptoassets: A Comprehensive Introduction","author":"F Schar","year":"2020","unstructured":"Schar F, Berentsen A (2020) Bitcoin, Blockchain, and Cryptoassets: A Comprehensive Introduction. MIT Press, Cambridge"},{"issue":"2","key":"1380_CR7","doi-asserted-by":"publisher","first-page":"160","DOI":"10.34306\/att.v2i2.97","volume":"2","author":"Z Fauziah","year":"2020","unstructured":"Fauziah Z, Latifah H, Omar X, Khoirunisa A, Millah S (2020) Application of blockchain technology in smart contracts: A systematic literature review. Aptisi Transactions on Technopreneurship 2(2):160\u2013166","journal-title":"Aptisi Transactions on Technopreneurship"},{"issue":"4","key":"1380_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3403954","volume":"53","author":"P Sharma","year":"2020","unstructured":"Sharma P, Jindal R, Borah MD (2020) Blockchain technology for cloud storage: A systematic literature review. ACM Comput Surv 53(4):1\u201332","journal-title":"ACM Comput Surv"},{"key":"1380_CR9","doi-asserted-by":"crossref","unstructured":"Ekramifard A, Amintoosi H, Seno AH (2020) A systematic literature review of integration of blockchain and artificial intelligence. In: KK C (ed) Blockchain Cybersecurity, Trust and Privacy, Springer, Cham, vol\u00a079, pp 147\u2013160","DOI":"10.1007\/978-3-030-38181-3_8"},{"issue":"5","key":"1380_CR10","doi-asserted-by":"publisher","first-page":"8076","DOI":"10.1109\/JIOT.2019.2920987","volume":"6","author":"HN Dai","year":"2019","unstructured":"Dai HN, Zheng Z, Zhang Y (2019) Blockchain for internet of things: A survey. IEEE Internet Things 6(5):8076\u20138094","journal-title":"IEEE Internet Things"},{"issue":"2","key":"1380_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3441692","volume":"54","author":"H Huang","year":"2021","unstructured":"Huang H, Kong W, Zhou S, Zheng Z, Guo S (2021) A survey of state-of-theart on blockchains: Theories, modelings, and tools. ACM Comput Surv 54(2):1\u201342","journal-title":"ACM Comput Surv"},{"key":"1380_CR12","doi-asserted-by":"crossref","unstructured":"Cachin C, Vukoli\u0107 M (2017) Blockchain consensus protocols in the wild. Preprint at https:\/\/arxiv.org\/abs\/1707.01873","DOI":"10.1109\/EDCC.2017.36"},{"key":"1380_CR13","unstructured":"Bano S, Sonnino A, Al-Bassam M (2017) Consensus in the age of blockchains. Preprint at https:\/\/arxiv.org\/abs\/1711.03936"},{"key":"1380_CR14","unstructured":"Natoli C, Yu J, Gramoli V (2019) Deconstructing blockchains: A comprehensive survey on consensus, membership and structure. Preprint at https:\/\/arxiv.org\/abs\/1908.08316"},{"key":"1380_CR15","doi-asserted-by":"crossref","unstructured":"Chaudhry N, Yousaf MM (2018) Consensus algorithms in blockchain: Comparative analysis, challenges and opportunities. Paper presented at Proceedings of the 12th International Conference on Open Source Systems and Technologies,Lahore, Pakistan, 19\u201321 December 2018","DOI":"10.1109\/ICOSST.2018.8632190"},{"issue":"1","key":"1380_CR16","first-page":"101","volume":"14","author":"GT Nguyen","year":"2018","unstructured":"Nguyen GT, Kim K (2018) A survey about consensus algorithms used in blockchain. J Inf Process Syst 14(1):101\u2013128","journal-title":"J Inf Process Syst"},{"key":"1380_CR17","unstructured":"Salimitari M, Chatterjee M (2018) A survey on consensus protocols in blockchain for iot networks. Preprint at https:\/\/arxiv.org\/abs\/1809.05613"},{"key":"1380_CR18","doi-asserted-by":"publisher","first-page":"22328","DOI":"10.1109\/ACCESS.2019.2896108","volume":"7","author":"W Wang","year":"2019","unstructured":"Wang W, Hoang DT, Hu P (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7:22328\u201322370","journal-title":"IEEE Access"},{"key":"1380_CR19","doi-asserted-by":"crossref","unstructured":"Pahlajani S, Kshirsagar A, Pachghare V (2019) Survey on private blockchain consensus algorithms. Paper presented at Proceedings of the 1st International Conference on Innovations in Information and Communication Technology, Chennai, India, 25\u201326 April 2019","DOI":"10.1109\/ICIICT1.2019.8741353"},{"issue":"3","key":"1380_CR20","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s12243-020-00751-w","volume":"75","author":"GR Carrara","year":"2020","unstructured":"Carrara GR, Burle LM, Medeiros DS (2020) Consistency, availability, and partition tolerance in blockchain: a survey on the consensus mechanism over peer-to-peer networking. Ann Telecommun 75(3):163\u2013174","journal-title":"Ann Telecommun"},{"issue":"8","key":"1380_CR21","doi-asserted-by":"publisher","first-page":"5579","DOI":"10.1007\/s11276-019-02195-0","volume":"26","author":"S Wan","year":"2020","unstructured":"Wan S, Li M, Liu G, Wang C (2020) Recent advances in consensus protocols for blockchain: a survey. Wirel Netw 26(8):5579\u20135593","journal-title":"Wirel Netw"},{"issue":"2","key":"1380_CR22","doi-asserted-by":"publisher","first-page":"1432","DOI":"10.1109\/COMST.2020.2969706","volume":"22","author":"Y Xiao","year":"2020","unstructured":"Xiao Y, Zhang N, Lou W, Hou YT (2020) A survey of distributed consensus protocols for blockchain networks. IEEE Commun Surv Tut 22(2):1432\u20131465","journal-title":"IEEE Commun Surv Tut"},{"key":"1380_CR23","unstructured":"Ferdous MS, Chowdhury MJM, Hoque MA (2020) Blockchain consensuses algorithms: A survey. Preprint at https:\/\/arxiv.org\/abs\/2001.07091"},{"issue":"4","key":"1380_CR24","doi-asserted-by":"publisher","first-page":"32","DOI":"10.3390\/cryptography4040032","volume":"4","author":"J Nijsse","year":"2020","unstructured":"Nijsse J, Litchfield A (2020) A taxonomy of blockchain consensus methods. Cryptography 4(4):32","journal-title":"Cryptography"},{"key":"1380_CR25","unstructured":"Yao W, Ye J, Murimi R, Wang G (2021) A survey on consortium blockchain consensus mechanisms. Preprint at https:\/\/arxiv.org\/abs\/2102.12058"},{"key":"1380_CR26","doi-asserted-by":"crossref","unstructured":"Khamar J, Patel H (2021) An extensive survey on consensus mechanisms for blockchain technology. In: Kotecha K (ed) Data Science and Intelligent Applications, Springer, Singapore, vol\u00a052, pp 363\u2013374","DOI":"10.1007\/978-981-15-4474-3_40"},{"issue":"3","key":"1380_CR27","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport L, Shostak R, Pease M (1982) The byzantine generals problem. ACM T Progr Lang Sys 4(3):382\u2013401","journal-title":"ACM T Progr Lang Sys"},{"issue":"3","key":"1380_CR28","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1145\/2402.322398","volume":"30","author":"L Lamport","year":"1983","unstructured":"Lamport L (1983) The weak byzantine generals problem. J ACM 30(3):668\u2013676","journal-title":"J ACM"},{"issue":"3","key":"1380_CR29","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1109\/TDSC.2006.35","volume":"3","author":"JP Martin","year":"2006","unstructured":"Martin JP, Alvisi L (2006) Fast byzantine consensus. IEEE T Depend Secure 3(3):202\u2013215","journal-title":"IEEE T Depend Secure"},{"issue":"2","key":"1380_CR30","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M Pease","year":"1980","unstructured":"Pease M, Shostak R, Lamport L (1980) Reaching agreement in the presence of faults. J ACM 27(2):228\u2013234","journal-title":"J ACM"},{"key":"1380_CR31","unstructured":"Castro M, Liskov B (1999) Practical byzantine fault tolerance. Paper presented at Proceedings of the Third Symposium on Operating Systems Design and Implementation, New Orleans, USA, 22 February 1999"},{"issue":"4","key":"1380_CR32","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1145\/571637.571640","volume":"20","author":"M Castro","year":"2002","unstructured":"Castro M, Liskov B (2002) Practical byzantine fault tolerance and proactive recovery. ACM T Comput Syst 20(4):398\u2013461","journal-title":"ACM T Comput Syst"},{"key":"1380_CR33","doi-asserted-by":"crossref","unstructured":"Li QL, Ma JY, Chang YX (2019a) Blockchain queue theory. In: Chen X (ed) Computational Data and Social Networks, Springer, Cham, vol 11280, pp 25\u201340","DOI":"10.1007\/978-3-030-04648-4_3"},{"issue":"1","key":"1380_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40649-019-0066-1","volume":"6","author":"QL Li","year":"2019","unstructured":"Li QL, Ma JY, Chang YX, Ma FQ (2019) Markov processes in blockchain systems. Computational Social Networks 6(1):1\u201328","journal-title":"Computational Social Networks"},{"issue":"1","key":"1380_CR35","first-page":"16","volume":"62","author":"GS Veronese","year":"2011","unstructured":"Veronese GS, Correia M, Bessani AN (2011) Efficient byzantine fault-tolerance. IEEE T Comput 62(1):16\u201330","journal-title":"Efficient byzantine fault-tolerance. IEEE T Comput"},{"key":"1380_CR36","unstructured":"Abraham I, Gueta G, Malkhi D (2017) Revisiting fast practical byzantine fault tolerance. Preprint at https:\/\/arxiv.org\/abs\/1712.01367"},{"key":"1380_CR37","unstructured":"Kiayias A, Russell A (2018) Ouroboros-bft: A simple byzantine fault tolerant consensus protocol. Preprint at https:\/\/ia.cr\/2018\/1049"},{"key":"1380_CR38","doi-asserted-by":"crossref","unstructured":"Hao X, Yu L, Liu Z, Zhen L (2018) Dynamic practical byzantine fault tolerance. Paper presented at Proceedings of The 2018 IEEE Conference on Communications and Network Security, Beijing, China, 30 May-1 June 2018","DOI":"10.1109\/CNS.2018.8433150"},{"key":"1380_CR39","unstructured":"Gueta GG, Abraham I, Grossman S (2019) Sbft: a scalable and decentralized trust infrastructure. Paper presented at Proceedings of The 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, Portland, USA, 24-27 June 2019"},{"key":"1380_CR40","doi-asserted-by":"crossref","unstructured":"Malkhi D, Nayak K, Ren L (2019) Flexible byzantine fault tolerance. Paper presented at Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, United Kingdom, 06 November 2019","DOI":"10.1145\/3319535.3354225"},{"key":"1380_CR41","unstructured":"Bravo M, Istv\u00e1n Z, Sit MK (2020) Towards improving the performance of bft consensus for future permissioned blockchains. Preprint at https:\/\/arxiv.org\/abs\/2007.12637"},{"key":"1380_CR42","doi-asserted-by":"crossref","unstructured":"Sakho S, Zhang J, Essaf F (2020) Research on an improved practical byzantine fault tolerance algorithm. Paper presented at Proceedings of The 2nd International Conference on Advances in Computer Technology, Information Science and Communications, Suzhou, China, 20-22 March 2020","DOI":"10.1109\/CTISC49998.2020.00035"},{"key":"1380_CR43","unstructured":"Meshcheryakov Y, Melman A, Evsutin O (2021) On performance of pbft for iot-applications with constrained devices. Preprint at https:\/\/arxiv.org\/abs\/2104.05026"},{"key":"1380_CR44","doi-asserted-by":"crossref","unstructured":"Alqahtani S, Demirbas M (2021) Bottlenecks in blockchain consensus protocols. Preprint at https:\/\/arxiv.org\/abs\/2103.04234","DOI":"10.1109\/COINS51742.2021.9524210"},{"key":"1380_CR45","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-3-030-25312-7_17","volume-title":"Security and Quality in Cyber-Physical Systems Engineering","author":"N Stifter","year":"2019","unstructured":"Stifter N, Judmayer A, Weippl E (2019) Revisiting practical byzantine fault tolerance through blockchain technologies. In: Biffl S (ed) Security and Quality in Cyber-Physical Systems Engineering. Springer, Cham, pp 471\u2013495"},{"issue":"12","key":"1380_CR46","doi-asserted-by":"publisher","first-page":"3358","DOI":"10.3390\/s20123358","volume":"20","author":"S Smetanin","year":"2020","unstructured":"Smetanin S, Ometov A, Komarov M (2020) Blockchain evaluation approaches: State-of-the-art and future perspective. Sensors-Basel 20(12):3358","journal-title":"Sensors-Basel"},{"key":"1380_CR47","doi-asserted-by":"publisher","first-page":"126927","DOI":"10.1109\/ACCESS.2020.3006078","volume":"8","author":"C Fan","year":"2020","unstructured":"Fan C, Ghaemi S, Khazaei H (2020) Performance evaluation of blockchain systems: A systematic survey. IEEE Access 8:126927\u2013126950","journal-title":"IEEE Access"},{"key":"1380_CR48","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.peva.2016.07.001","volume":"104","author":"J Gobel","year":"2016","unstructured":"Gobel J, Keeler HP, Krzesinski AE (2016) Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay. Perform Evaluation 104:23\u201341","journal-title":"Perform Evaluation"},{"issue":"2","key":"1380_CR49","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1080\/15326349.2020.1761390","volume":"36","author":"K Javier","year":"2020","unstructured":"Javier K, Fralix BA et al (2020) further study of some markovian bitcoin models from gobel. Stoch Models 36(2):223\u2013250","journal-title":"Stoch Models"},{"key":"1380_CR50","unstructured":"Li QL, Chang YX, Wu X (2020a) A new theoretical framework of pyramid markov processes for blockchain selfish mining. Preprint at https:\/\/arxiv.org\/abs\/2007.01459"},{"key":"1380_CR51","doi-asserted-by":"crossref","unstructured":"Nayak K, Kumar S, Miller A (2016) Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. Paper presented at Proceedings of The 2016 IEEE European Symposium on Security and Privacy, Saarbruecken, Germany, 21-24 March 2016","DOI":"10.1109\/EuroSP.2016.32"},{"key":"1380_CR52","doi-asserted-by":"crossref","unstructured":"Kiffer L, Rajaraman R, Shelat A (2016) A better method to analyze blockchain consistency. Paper presented at Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, Canada, 15 October 2018","DOI":"10.1145\/3243734.3243814"},{"issue":"1","key":"1380_CR53","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/TSMC.2019.2895471","volume":"50","author":"D Huang","year":"2019","unstructured":"Huang D, Ma X, Zhang S (2019) Performance analysis of the raft consensus algorithm for private blockchains. IEEE T Syst Man Cy A 50(1):172\u2013181","journal-title":"IEEE T Syst Man Cy A"},{"key":"1380_CR54","volume-title":"The impact of transaction fees on bitcoin mining strategies","author":"M Carlsten","year":"2016","unstructured":"Carlsten M (2016) The impact of transaction fees on bitcoin mining strategies. University Press, Princeton"},{"key":"1380_CR55","doi-asserted-by":"crossref","unstructured":"Bai Q, Zhou X, Wang X, Xu Y (2019) A deep dive into blockchain selfish mining. Paper presented at Proceedings of The 2019 IEEE International Conference on Communications, Shanghai, China, 20-24 May 2019","DOI":"10.1109\/ICC.2019.8761240"},{"issue":"4","key":"1380_CR56","doi-asserted-by":"publisher","first-page":"1643","DOI":"10.1109\/TNET.2020.2991994","volume":"28","author":"Y Li","year":"2020","unstructured":"Li Y, Cao B, Peng M, Zhang L, Feng D, Yu J (2020) Direct acyclic graph-based ledger for internet of things: Performance and security analysis. IEEE ACM T Network 28(4):1643\u20131656","journal-title":"IEEE ACM T Network"},{"issue":"70","key":"1380_CR57","doi-asserted-by":"publisher","first-page":"9258","DOI":"10.1109\/TVT.2021.3088912","volume":"9","author":"Y Li","year":"2021","unstructured":"Li Y, Cao B, Liang D, Zhang L (2021) Block access control in wireless blockchain network: Design, modeling and analysis. IEEE T Veh Technol 9(70):9258\u20139272","journal-title":"IEEE T Veh Technol"},{"issue":"2","key":"1380_CR58","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3392153","volume":"4","author":"A Gopalan","year":"2020","unstructured":"Gopalan A, Sankararaman A, Walid A (2020) Stability and scalability of blockchain systems. Proc ACM Meas Anal Comput Syst 4(2):1\u201335","journal-title":"Proc ACM Meas Anal Comput Syst"},{"key":"1380_CR59","doi-asserted-by":"crossref","unstructured":"Papadis N, Borst S, Walid A (2018) Stochastic models and wide-area network measurements for blockchain design and analysis. Paper presented at IEEE INFOCOM 2018-IEEE Conference on Computer Communications, Honolulu, USA, 16-19 April 2018","DOI":"10.1109\/INFOCOM.2018.8485982"},{"key":"1380_CR60","doi-asserted-by":"crossref","unstructured":"Geissler S, Prantl T, Lange S (2019) Discrete-time analysis of the blockchain distributed ledger technology. Paper presented at the 31st International Teletraffic Congress, Budapest, Hungary, 27-29 August 2019","DOI":"10.1109\/ITC31.2019.00029"},{"issue":"4","key":"1380_CR61","doi-asserted-by":"publisher","first-page":"3135","DOI":"10.1109\/TNSE.2020.3017453","volume":"7","author":"J Mi\u0161i\u0107","year":"2020","unstructured":"Mi\u0161i\u0107 J, Mi\u0161i\u0107 V, Chang XL (2020) Performance of bitcoin network with synchronizing nodes and a mix of regular and compact blocks. IEEE T Netw Sci Eng 7(4):3135\u20133147","journal-title":"IEEE T Netw Sci Eng"},{"key":"1380_CR62","doi-asserted-by":"crossref","unstructured":"Fang M, Liu J (2020) Toward low-cost and stable blockchain networks. Paper presented at the 2020 IEEE International Conference on Communications, Dublin, Ireland, 7-11 June 2020","DOI":"10.1109\/ICC40277.2020.9148615"},{"key":"1380_CR63","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s11134-019-09643-w","volume":"95","author":"B Fralix","year":"2020","unstructured":"Fralix B (2020) On classes of bitcoin-inspired infinite-server queueing systems. Queueing Syst 95:29\u201352","journal-title":"Queueing Syst"},{"issue":"8","key":"1380_CR64","doi-asserted-by":"publisher","first-page":"1859","DOI":"10.1109\/TCNS.2021.3088799","volume":"4","author":"SM Varma","year":"2021","unstructured":"Varma SM, Maguluri ST (2021) Throughput optimal routing in blockchain based payment systemsor nonlinear systems of partial differential equations. IEEE T Control Netw 4(8):1859\u20131868","journal-title":"IEEE T Control Netw"},{"key":"1380_CR65","unstructured":"Wilhelmi F, Giupponi L (2002) Discrete-time analysis of wireless blockchain networks. Preprint at https:\/\/arxiv.org\/abs\/2104.05586"},{"key":"1380_CR66","volume-title":"Matrix-Geometric Solutions in Stochastic Models: An Algorithmic Approach","author":"MF Neuts","year":"1981","unstructured":"Neuts MF (1981) Matrix-Geometric Solutions in Stochastic Models: An Algorithmic Approach. Library of Congress Cataloging in Publication data, Baltimore"},{"key":"1380_CR67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11492-2","volume-title":"Constructive Computation in Stochastic Models with Applications: The RG-Factorizations","author":"QL Li","year":"2010","unstructured":"Li QL (2010) Constructive Computation in Stochastic Models with Applications: The RG-Factorizations. Springer, New York"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01380-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01380-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01380-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T09:42:43Z","timestamp":1667900563000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01380-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,16]]},"references-count":67,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["1380"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01380-x","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,16]]},"assertion":[{"value":"12 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}