{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T16:58:33Z","timestamp":1771952313428,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T00:00:00Z","timestamp":1605052800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T00:00:00Z","timestamp":1605052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s12243-020-00814-y","type":"journal-article","created":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T06:03:42Z","timestamp":1605074622000},"page":"131-144","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A decision tree for building IT applications"],"prefix":"10.1007","volume":"76","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7742-7748","authenticated-orcid":false,"given":"Nour","family":"El Madhoun","sequence":"first","affiliation":[]},{"given":"Julien","family":"Hatin","sequence":"additional","affiliation":[]},{"given":"Emmanuel","family":"Bertin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,11]]},"reference":[{"key":"814_CR1","unstructured":"Nakamoto S (2008) Bitcoin a peer-to-peer electronic cash system. Working Paper"},{"key":"814_CR2","unstructured":"Lin I-C, Liao T-C (2017) A survey of blockchain security issues and challenges. IJ Network Security"},{"key":"814_CR3","doi-asserted-by":"crossref","unstructured":"Wan Z, Deng RH, Lee D (2015) Electronic contract signing without using trusted third party. International Conference on Network and System Security","DOI":"10.1007\/978-3-319-25645-0_27"},{"key":"814_CR4","unstructured":"Zaid S, Linscott G, Becevello A, Zaid T, Lem P (2015) System and method for anonymous addressing of content on network peers and for private peer-to-peer file sharing. US Patent 9,112,875"},{"key":"814_CR5","unstructured":"Li X, Jiang P, Chen T, Luo X, Wen Q (2017) A survey on the security of blockchain systems. Future Generation Computer Systems"},{"key":"814_CR6","unstructured":"Caseau Y, Soudoplatoff S (2016) La blockchain, ou la confiance distribu\u00e9e. Fondation pour l\u2019innovation politique"},{"key":"814_CR7","doi-asserted-by":"crossref","unstructured":"Haddi FL, Bencha\u00efba M (2015) A survey of incentive mechanisms in static and mobile p2p systems. Journal of Network and Computer Applications","DOI":"10.1016\/j.jnca.2015.09.004"},{"key":"814_CR8","doi-asserted-by":"crossref","unstructured":"Luu L, Chu D-H, Olickel H, Saxena P, Hobor A (2016) Making smart contracts smarter. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","DOI":"10.1145\/2976749.2978309"},{"key":"814_CR9","doi-asserted-by":"crossref","unstructured":"Miller JA, Bowman C, Harish VG, Quinn S (2016) Open source big data analytics frameworks written in scala","DOI":"10.1109\/BigDataCongress.2016.61"},{"key":"814_CR10","unstructured":"Dorri A, Kanhere SS, Jurdak R (2016) Blockchain in internet of things: challenges and solutions. arXiv:1608.05187"},{"key":"814_CR11","doi-asserted-by":"crossref","unstructured":"Hildenbrandt E, Saxena M, Zhu X, Rodrigues N, Daian P, Guth D, Rosu G (2017) Kevm: a complete semantics of the ethereum virtual machine. Technical Report","DOI":"10.1109\/CSF.2018.00022"},{"key":"814_CR12","doi-asserted-by":"crossref","unstructured":"Khan K, Goodridge W (2019) Dynamic adaptive streaming over HTTP (DASH) within P2P systems: a survey. International Journal of Advanced Networking and Applications","DOI":"10.35444\/IJANA.2019.11014"},{"key":"814_CR13","unstructured":"Esnault A (2019) Syst\u00e8mes pair-\u00e0-pair pour l\u2019informatique opportuniste, Ph.D. Thesis, Universit\u00e9 de Bretagne Sud"},{"issue":"2","key":"814_CR14","first-page":"1","volume":"16","author":"A Bachmann","year":"2011","unstructured":"Bachmann A, Becker A, Buerckner D, Hilker M, Kock F, Lehmann M, Tiburtius P, Funk B (2011) Online peer-to-peer lending-a literature review. Journal of Internet Banking and Commerce 16(2):1","journal-title":"Journal of Internet Banking and Commerce"},{"key":"814_CR15","unstructured":"Zhang Q, Zhu W, Zhang X, Xiong Y (2010) Peer-to-peer method of quality of service (qos) probing and analysis and infrastructure employing same. US Patent 7,698,460"},{"key":"814_CR16","doi-asserted-by":"crossref","unstructured":"El Madhoun N, Hatin J, Bertin E (2019) Going beyond the blockchain hype: in which cases are blockchains useful for it applications?. In: The 3rd IEEE cyber security in networking international conference (CSNet 2019)","DOI":"10.1109\/CSNet47905.2019.9108966"},{"key":"814_CR17","unstructured":"What Is Ether Mining ? [Online]. Available: https:\/\/blockspoint.com\/guides\/ethereum\/what-is-ether-mining"},{"key":"814_CR18","doi-asserted-by":"crossref","unstructured":"Pilkington M (2016) 11 blockchain technology: principles and applications. Research handbook on digital transformations","DOI":"10.4337\/9781784717766.00019"},{"key":"814_CR19","doi-asserted-by":"crossref","unstructured":"Belotti M, Bozic N, Pujolle G, Secci S (2018) A vademecum on blockchain technologies: when which and how","DOI":"10.1109\/COMST.2019.2928178"},{"key":"814_CR20","unstructured":"Delahaye J-P (2014) Le bitcoin une monnaie r\u00e9volutionnaire? UMR"},{"key":"814_CR21","unstructured":"Norton S (2016) Cio explainer: what is blockchain? The Wall Street Journal"},{"key":"814_CR22","unstructured":"Antonopoulos AM (2014) Mastering bitcoin: unlocking digital cryptocurrencies, O\u2019Reilly Media, Inc."},{"key":"814_CR23","doi-asserted-by":"crossref","unstructured":"Gervais A, Karame GO, W\u00fcst K, Glykantzis V, Ritzdorf H, Capkun S (2016) On the security and performance of proof of work blockchains. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","DOI":"10.1145\/2976749.2978341"},{"key":"814_CR24","doi-asserted-by":"crossref","unstructured":"Mingxiao D, Xiaofeng M, Zhe Z, Xiangwei W, Qijun C (2017) A review on consensus algorithm of blockchain. In: 2017 IEEE international conference on systems, man, and cybernetics (SMC), pp 2567\u20132572","DOI":"10.1109\/SMC.2017.8123011"},{"key":"814_CR25","doi-asserted-by":"crossref","unstructured":"Bach L, Mihaljevic B, Zagar M (2018) Comparative analysis of blockchain consensus algorithms. In: 2018 41st international convention on information and communication technology, electronics and microelectronics (MIPRO), pp 1545\u20131550","DOI":"10.23919\/MIPRO.2018.8400278"},{"key":"814_CR26","unstructured":"Scott A (2018) Vitalik buterin: I quite regret adopting the term smart contracts for ethereum. [Online]. Available: https:\/\/bitcoinist.com\/vitalik-buterin-ethereum-regret-smart-contracts"},{"key":"814_CR27","unstructured":"Buterin V (2013) The Ethereum white paper: a next-generation smart contract and decentralized application platform. [Online]. Available: https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper"},{"key":"814_CR28","doi-asserted-by":"crossref","unstructured":"Delmolino K, Arnett M, Kosba A, Miller A, Shi E (2016) Step by step towards creating a safe smart contract: lessons and insights from a cryptocurrency lab. In: International conference on financial cryptography and data security. Springer, pp 79\u201394","DOI":"10.1007\/978-3-662-53357-4_6"},{"key":"814_CR29","doi-asserted-by":"crossref","unstructured":"Yermack D (2017) Corporate governance and blockchains. Review of Finance","DOI":"10.1093\/rof\/rfw074"},{"key":"814_CR30","unstructured":"Khalilov MCK, Levi A (2018) A survey on anonymity and privacy in bitcoin-like digital cash systems. IEEE Communications Surveys & Tutorials"},{"key":"814_CR31","doi-asserted-by":"crossref","unstructured":"Ron D, Shamir A (2013) Quantitative analysis of the full bitcoin transaction graph","DOI":"10.1007\/978-3-642-39884-1_2"},{"key":"814_CR32","doi-asserted-by":"crossref","unstructured":"Pons J (2017) La mise en oeuvre de la blockchain et des smart contracts par les industries culturelles. Annales des mines-r\u00e9alit\u00e9s industrielles","DOI":"10.3917\/rindu1.173.0081"},{"key":"814_CR33","unstructured":"Grigg I (2017) Eos-an introduction, White paper. https:\/\/whitepaperdatabase.com\/eos-whitepaper"},{"key":"814_CR34","doi-asserted-by":"crossref","unstructured":"W\u00fcst K, Gervais A (2017) Do you need a blockchain? IACR Cryptology ePrint Archive","DOI":"10.1109\/CVCBT.2018.00011"},{"key":"814_CR35","unstructured":"Ellervee A, Matulevicius R, Mayer N (2017) A comprehensive reference model for blockchain-based distributed ledger technology. ER Forum"},{"key":"814_CR36","doi-asserted-by":"crossref","unstructured":"Birch D, Brown RG, Parulava S (2016) Towards ambient accountability in financial services: shared ledgers, translucent transactions and the technological legacy of the great financial crisis. Journal of Payments Strategy & Systems","DOI":"10.69554\/PGAD8626"},{"key":"814_CR37","unstructured":"Suichies B (2015) Why blockchain must die in 2016. [Online].Available: https:\/\/medium.com\/block-chain\/why-blockchain-must-die-in-2016-e992774c03b4"},{"key":"814_CR38","unstructured":"Peck ME (2017) Do you need a blockchain? [Online].Available: https:\/\/spectrum.ieee.org\/computing\/networks\/do-you-need-a-blockchain"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-020-00814-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-020-00814-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-020-00814-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,17]],"date-time":"2024-08-17T07:07:39Z","timestamp":1723878459000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-020-00814-y"}},"subtitle":["What to choose: blockchain or classical systems?"],"short-title":[],"issued":{"date-parts":[[2020,11,11]]},"references-count":38,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["814"],"URL":"https:\/\/doi.org\/10.1007\/s12243-020-00814-y","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,11]]},"assertion":[{"value":"29 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}