{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:26:38Z","timestamp":1775067998684,"version":"3.50.1"},"reference-count":209,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100010801","name":"Xunta de Galicia","doi-asserted-by":"publisher","award":["ED431C 2016-045"],"award-info":[{"award-number":["ED431C 2016-045"]}],"id":[{"id":"10.13039\/501100010801","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010801","name":"Xunta de Galicia","doi-asserted-by":"publisher","award":["ED341D R2016\/012"],"award-info":[{"award-number":["ED341D R2016\/012"]}],"id":[{"id":"10.13039\/501100010801","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010801","name":"Xunta de Galicia","doi-asserted-by":"publisher","award":["ED431G\/01"],"award-info":[{"award-number":["ED431G\/01"]}],"id":[{"id":"10.13039\/501100010801","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Agencia Estatal de Investigaci\u00f3n of Spain","award":["TEC2015-69648-REDC"],"award-info":[{"award-number":["TEC2015-69648-REDC"]}]},{"name":"Agencia Estatal de Investigaci\u00f3n of Spain","award":["TEC2016-75067-C4-1-R"],"award-info":[{"award-number":["TEC2016-75067-C4-1-R"]}]},{"name":"ERDF funds of EU, UE","award":["AEI\/FEDER"],"award-info":[{"award-number":["AEI\/FEDER"]}]},{"DOI":"10.13039\/501100005142","name":"BBVA","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100005142","id-type":"DOI","asserted-by":"crossref"}]},{"name":"BritishSpanish Society Grant"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2842685","type":"journal-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T18:48:45Z","timestamp":1527792525000},"page":"32979-33001","source":"Crossref","is-referenced-by-count":877,"title":["A Review on the Use of Blockchain for the Internet of Things"],"prefix":"10.1109","volume":"6","author":[{"given":"Tiago M.","family":"Fernandez-Carames","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4991-6808","authenticated-orcid":false,"given":"Paula","family":"Fraga-Lamas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","first-page":"293","article-title":"Statistical disclosure or intersection attacks on anonymity systems","author":"danezis","year":"2004","journal-title":"Proc 6th Int Workshop Inf Hiding"},{"key":"ref172","first-page":"112","article-title":"Blindcoin: Blinded, accountable mixes for Bitcoin","author":"valenta","year":"2015","journal-title":"Proc Int Workshops BITCOIN WAHC Wearable"},{"key":"ref171","first-page":"486","article-title":"Mixcoin: Anonymity for Bitcoin with accountable mixes","author":"bonneau","year":"2014","journal-title":"Proc 18th Int Conf Financial Cryptogr Data Secur"},{"key":"ref174","year":"2018","journal-title":"ZeroC"},{"key":"ref173","year":"2018","journal-title":"ZeroC"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2014.0697"},{"key":"ref175","year":"2018","journal-title":"ZCash"},{"key":"ref178","year":"2018","journal-title":"Bytecoin&#x2019;s"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2011.0290"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2550452"},{"key":"ref169","year":"2018","journal-title":"Multichain White Paper"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.207"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2016.7475064"},{"key":"ref33","author":"ferguson","year":"2003","journal-title":"Practical Cryptography"},{"key":"ref32","author":"mel","year":"2001","journal-title":"Cryptography Decrypted"},{"key":"ref31","author":"raval","year":"2016","journal-title":"Decentralized Applications Harnessing Bitcoin&#x2019;s Blockchain Technology"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0163477"},{"key":"ref37","year":"2018","journal-title":"IOTA&#x2019;s"},{"key":"ref36","year":"2018","journal-title":"Ripple&#x2019;s"},{"key":"ref35","year":"2018","journal-title":"Hyperledger fabric"},{"key":"ref34","year":"2018","journal-title":"Litecoin"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865753"},{"key":"ref180","year":"2018","journal-title":"CryptoNote&#x2019;s"},{"key":"ref185","article-title":"Analysis of cloud computing attacks and countermeasures","author":"jabir","year":"2016","journal-title":"Proc 18th Int Conf Adv Commun Technol (ICACT)"},{"key":"ref184","author":"lukianov","year":"2015","journal-title":"Compact Confidential Transactions for Bitcoin"},{"key":"ref183","author":"fran\u00e7a","year":"2015","journal-title":"The mini-blockchain scheme"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2016.7479039"},{"key":"ref189","year":"2018","journal-title":"Google Certificate transparency"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.115"},{"key":"ref187","year":"2018","journal-title":"CONIKS"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8056951"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TEMSCON.2017.7998367"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/EUROCON.2017.8011213"},{"key":"ref179","year":"2018","journal-title":"Monero&#x2019;s"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2016.7945805"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I.2016.7918009"},{"key":"ref22","year":"2018","journal-title":"Ethereum"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2535718"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref23","year":"2018","journal-title":"Counterparty"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2638786"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2015.7073830"},{"key":"ref154","first-page":"20","article-title":"Maritime freight container management system using RFID","author":"barro-torres","year":"2010","journal-title":"Proc 3rd Int EURASIP Workshop RFID Technol"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/FITCE.2017.8093002"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS.2016.7496570"},{"key":"ref155","doi-asserted-by":"crossref","first-page":"57","DOI":"10.3390\/s18010057","article-title":"Design and practical evaluation of a family of lightweight protocols for heterogeneous sensing through BLE beacons in IoT telemetry applications","volume":"18","author":"hern\u00e1ndez-rojas","year":"2017","journal-title":"SENSORS"},{"key":"ref150","author":"meher","year":"2018","journal-title":"The Internet of Money"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2017.7945603"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.3390\/s16122186"},{"key":"ref146","year":"2018","journal-title":"POINT Project"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170867"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2016.7581459"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.50"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2017.3051335"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2017.7916500"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2740569"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2017.8190886"},{"key":"ref55","first-page":"1","article-title":"Decentralized trusted timestamping using the crypto currency Bitcoin","author":"gipp","year":"2015","journal-title":"Proc of ICON"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/978-3-319-25645-0_25","article-title":"From pretty good to great: Enhancing PGP using Bitcoin and the blockchain","author":"wilson","year":"2015","journal-title":"Proc 5th Int Conf Netw Syst Secur"},{"key":"ref53","first-page":"623","article-title":"Accountable storage","author":"ateniese","year":"2017","journal-title":"Proc IEEE Int Conf Netw"},{"key":"ref52","author":"wilkinson","year":"2018","journal-title":"Storj A Peer-to-Peer Cloud Storage Network"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2746598"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.5772\/64844"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.3390\/s17010028"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2017.7945583"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI.2015.39"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016280"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/IoTGC.2017.8008970"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/eCRS.2013.6805780"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/s17061457","article-title":"Towards the Internet of smart trains: A review on industrial IoT-connected railways","volume":"17","author":"fraga-lamas","year":"2017","journal-title":"SENSORS"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/s16101595","article-title":"Home automation system based on intelligent transducer enablers","volume":"16","author":"su\u00e1rez-albela","year":"2016","journal-title":"SENSORS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.01.005"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s16101644"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2808326"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/2896384"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2802699"},{"key":"ref49","author":"swanson","year":"2018","journal-title":"Consensus-as-a-service a brief report on the emergence of permissioned distributed ledger systems"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17765-6_14"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PTP.2003.1231502"},{"key":"ref158","article-title":"Enabling technologies and cyber-physical systems for mission-critical scenarios","author":"fraga-lamas","year":"2017"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2689040"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2619369"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"465","DOI":"10.3390\/s17030465","article-title":"VineSens: An eco-smart decision-support viticulture system","volume":"17","author":"p\u00e9rez-exp\u00f3sito","year":"2017","journal-title":"SENSORS"},{"key":"ref47","author":"back","year":"2018","journal-title":"Enabling blockchain innovations with pegged sidechains"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6122545"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"1978","DOI":"10.3390\/s17091978","article-title":"A practical evaluation of a high-security energy-efficient gateway for IoT fog computing applications","volume":"17","author":"su\u00e1rez-albela","year":"2017","journal-title":"SENSORS"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2017.17"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2704613"},{"key":"ref73","year":"2018","journal-title":"Tor Project"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016213"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.195"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.61"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0198"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2017.36"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917640"},{"key":"ref75","year":"2018","journal-title":"Arm Trustzone"},{"key":"ref78","author":"vukoli?","year":"2018","journal-title":"The quest for scalable blockchain Fabric Proof-of-Work vs BFT replication"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.MOBIQUITOUS2009.7056"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/978-3-319-29883-2_6","article-title":"An integrated reward and reputation mechanism for MCS preserving users&#x2019; privacy","volume":"9481","author":"tanas","year":"2016","journal-title":"Proc 10th Int Workshop Data Privacy Manage Secur Assurance"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2017.09.003"},{"key":"ref61","author":"wright","year":"2015","journal-title":"Decentralized Blockchain Technology and the Rise of Lex Cryptographia"},{"key":"ref63","first-page":"1","article-title":"An agri-food supply chain traceability system for China based on RFID & blockchain technology","author":"tian","year":"2016","journal-title":"Proc 13th Int Conf Service Syst Service Manage (ICSSSM)"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"ref65","first-page":"1","article-title":"Towards an internet of energy","author":"kafle","year":"2016","journal-title":"Proc IEEE Int Conf Power Syst Technol (PowerCon)"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"643","DOI":"10.3390\/s17030643","article-title":"An electricity-price aware open-source smart socket for the internet of energy","volume":"17","author":"blanco-novoa","year":"2017","journal-title":"SENSORS"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/214805"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016254"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987376"},{"key":"ref197","year":"2018","journal-title":"Gridcoin&#x2019;s"},{"key":"ref198","year":"2018","journal-title":"Primecoin&#x2019;s"},{"key":"ref199","first-page":"585","article-title":"Proofs of space","author":"dziembowski","year":"2015","journal-title":"Proc 35th Annu Cryptol Conf Adv"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2012.6266934"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2013.92"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2017.8108292"},{"key":"ref196","author":"ball","year":"2018","journal-title":"Proofs of useful work"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.102"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE.ICIOT.2017.34"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.54"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996641"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/IGCC.2014.7039171"},{"key":"ref92","first-page":"173","article-title":"Towards an Optimized BlockChain for IoT","author":"ali dorri","year":"2017","journal-title":"2017 IEEE\/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI)"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2014.137"},{"key":"ref91","author":"dorri","year":"2016","journal-title":"Blockchain in internet of things Challenges and solutions"},{"key":"ref90","year":"2018","journal-title":"BitTorrent"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2017.102"},{"key":"ref99","year":"2018","journal-title":"International Standard IEC 61499"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2016.71"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE.ICCC.2017.9"},{"key":"ref82","first-page":"159","article-title":"An IoT data communication framework for authenticity and integrity","author":"li","year":"2017","journal-title":"Proc IEEE\/ACM 2nd Int Conf Internet-Things Design Implement (IoTDI)"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2575863"},{"key":"ref84","year":"2018","journal-title":"Raspberry Pi"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2756025"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCSP.2017.7944057"},{"key":"ref89","year":"2018","journal-title":"Telehash"},{"key":"ref85","year":"2018","journal-title":"BeagleBoards"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2779263"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-China.2017.7991140"},{"key":"ref88","first-page":"1","author":"panikkar","year":"2015","journal-title":"ADEPT An IoT Practitioner Perspective"},{"key":"ref200","year":"2018","journal-title":"Burst-Coin"},{"key":"ref101","year":"2018","journal-title":"Kubernetes"},{"key":"ref100","year":"2018","journal-title":"ET Docker"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.114"},{"key":"ref203","year":"2018","journal-title":"X11 Official Documentation for Dash"},{"key":"ref204","author":"aumasson","year":"2018","journal-title":"SHA-3 Proposal BLAKE"},{"key":"ref201","author":"bruce","year":"2018","journal-title":"The mini-blockchain scheme"},{"key":"ref202","year":"2018","journal-title":"Original Scrypt Function for Tarsnap"},{"key":"ref207","year":"2018","journal-title":"VISA Claims About the Number of Transactions Handled by VisaNet"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3571056"},{"key":"ref205","year":"2018","journal-title":"MyriadStore"},{"key":"ref206","first-page":"1","article-title":"Could Bitcoin transactions be \n$100 \\times$\n faster?","author":"courtois","year":"2014","journal-title":"Proc Int Conf Sec Cryptogr (SECRYPT)"},{"key":"ref127","first-page":"42","article-title":"Long-term public blockchain: Resilience against compromise of underlying cryptography","author":"sato","year":"2017","journal-title":"Proc IEEE Symp Sec Privacy Workshops"},{"key":"ref126","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","article-title":"The Sybil attack","author":"douceur","year":"2002","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196791"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2017.7945584"},{"key":"ref129","year":"2018","journal-title":"Peercoin"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/IWS.1999.810997"},{"key":"ref130","year":"2018","journal-title":"DPOS Description on Bitshares"},{"key":"ref133","author":"ren","year":"2018","journal-title":"Proof of Stake Velocity Building the Social Currency of the Digital Age"},{"key":"ref134","year":"2018","journal-title":"Reddcoin"},{"key":"ref131","author":"larimer","year":"2018","journal-title":"Transactions as proof-of-stake"},{"key":"ref132","first-page":"34","article-title":"Proof of activity: Extending Bitcoin&#x2019;s proof of work via proof of stake [extended abstract]","author":"bentov","year":"2014","journal-title":"Proc 9th Workshop Economics Netw Syst Comput"},{"key":"ref136","author":"schwartz","year":"2014","journal-title":"The Ripple protocol consensus algorithm"},{"key":"ref135","first-page":"1","article-title":"Practical Byzantine fault tolerance","author":"castro","year":"1999","journal-title":"Proc 3rd Symp Operating Syst Design Implementation"},{"key":"ref138","author":"copeland","year":"2018","journal-title":"Tangaroa A Byzantine Fault Tolerant Raft"},{"key":"ref137","author":"mazieres","year":"2018","journal-title":"The Stellar Consensus Protocol A Federated Model for Internet-level Consensus"},{"key":"ref139","first-page":"305","article-title":"In search of an understandable consensus algorithm","author":"ongaro","year":"2014","journal-title":"Proc USENIX Annu Techn Conf"},{"key":"ref140","first-page":"24:1","article-title":"Non-determinism in Byzantine fault-tolerant replication","author":"cachin","year":"2016","journal-title":"Proc 8th Int Conf on Principles of Dist Sys (OPODIS)"},{"key":"ref141","author":"kwon","year":"0","journal-title":"Tendermint Consensus Without Mining (v0 6)"},{"key":"ref142","first-page":"45","article-title":"Bitcoin-NG: A scalable blockchain protocol","author":"eyal","year":"2016","journal-title":"Proc USENIX\/ACM Symp Netw Syst Design Implement"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.46"},{"key":"ref2","year":"2017","journal-title":"Cisco Visual Networking Index Global Mobile Data Traffic Data Forecast Update Cisco White Paper"},{"key":"ref144","first-page":"552","article-title":"How to leak a secret","author":"rivest","year":"2001","journal-title":"Proc 7th Int Conf Theory Appl Cryptol Inf Secur"},{"key":"ref1","year":"2013","journal-title":"Forecast The Internet of Things Worldwide 2013"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.38"},{"key":"ref109","first-page":"333","article-title":"Factorization of a 768-bit RSA modulus","author":"kleinjung","year":"2010","journal-title":"Proc 30th Annu Conf Adv Cryptol"},{"key":"ref108","article-title":"Elliptic curve cryptography in practice","volume":"8437","author":"bos","year":"2014","journal-title":"Financial Cryptography and Data Security"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref106","first-page":"1","article-title":"Guidelines for the selection and use of transport layer security (TLS) implementations","volume":"1","author":"polk","year":"2005","journal-title":"Proceedings of NIST"},{"key":"ref105","year":"2018","journal-title":"NIST"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2017.2716953"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700041"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2757955"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2003.1214285"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTD.2009.192"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2010.5456933"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DNSR.2004.1344725"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.483"},{"key":"ref12","year":"2015","journal-title":"Device Democracy Saving the Future of the Internet of Things"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.90"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.161"},{"key":"ref15","year":"2018","journal-title":"Market for Blockchain Technology Worldwide"},{"key":"ref16","year":"2018","journal-title":"Blockchain Technology Report to the U S Federal Advisory Committee on Insurance"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2014.6894012"},{"key":"ref17","year":"2018","journal-title":"Crypto-Currency Market Capitalizations"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEE.2010.5558401"},{"key":"ref18","author":"nakamoto","year":"2018","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref19","author":"swan","year":"2015","journal-title":"Blockchain Blueprint for a New Economy"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732296"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246121"},{"key":"ref113","first-page":"119","article-title":"Comparing elliptic curve cryptography and RSA on 8-bit CPUs","author":"gura","year":"2004","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2013.6717816"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.120"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25937-4_24"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457161"},{"key":"ref123","first-page":"372","article-title":"A case against currently used hash functions in RFID protocols","author":"feldhofer","year":"2006","journal-title":"Proc Move Meaningful Internet Syst"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08370027.pdf?arnumber=8370027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T12:58:04Z","timestamp":1643201884000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8370027\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":209,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2842685","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}