{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T16:51:51Z","timestamp":1758905511879,"version":"3.28.0"},"reference-count":52,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,5]]},"DOI":"10.1109\/comsnets51098.2021.9352944","type":"proceedings-article","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T10:11:22Z","timestamp":1613729482000},"page":"254-262","source":"Crossref","is-referenced-by-count":18,"title":["Sketches for Blockchains"],"prefix":"10.1109","author":[{"given":"Ori","family":"Rottenstreich","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Anomaly detection in Bitcoin network using unsupervised learning methods","volume":"abs 1611 3941","author":"pham","year":"2016","journal-title":"CoRR"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1109\/COMSNETS51098.2021.9352820","article-title":"Optimizing Merkle proof size for blockchain transactions","author":"mizrahi","year":"2021","journal-title":"International Conference on Communication Systems and Networks (COMSNETS)"},{"article-title":"BIP152: Compact block relay","year":"2016","author":"corallo","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21969-6_23"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85893-5_8"},{"journal-title":"The tangle","year":"2016","author":"popov","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_16"},{"key":"ref36","article-title":"FairLedger: A Fair Blockchain Protocol for Financial Institutions","author":"lev-ari","year":"2019","journal-title":"International Conference on Principles of Distributed Systems (OPODIS)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2018.00016"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2306060"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292537"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2019.00012"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3080008"},{"journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System","year":"2009","author":"nakamoto","key":"ref1"},{"article-title":"BIP37: Connection Bloom filtering","year":"2012","author":"hearn","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342082"},{"key":"ref21","article-title":"ABACUS: Address-partitioned Bloom filter on address checking for uniqueness in IoT blockchain","author":"wang","year":"2020","journal-title":"IEEE\/ACM International Conference on Computer Aided Design (ICCAD)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2922710"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751349"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664267"},{"article-title":"The KECCAK SHA-3 submission","year":"2011","author":"bertoni","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3373360.3380845"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196909"},{"key":"ref52","article-title":"A model for learned Bloom filters and optimizing by sandwiching","author":"mitzenmacher","year":"2018","journal-title":"NeurIPS"},{"journal-title":"Secrecy Authentication and Public Key Systems","year":"1979","author":"merkle","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.215"},{"key":"ref40","article-title":"Anomaly detection in the Bitcoin system - A network perspective","volume":"abs 1611 3942","author":"pham","year":"2016","journal-title":"CoRR"},{"key":"ref12","article-title":"On the resemblance and containment of documents","author":"broder","year":"1997","journal-title":"Compression and Complexity of Sequences"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39658-1_55"},{"key":"ref14","article-title":"HyperLogLog: The analysis of a near-optimal cardinality estimation algorithm","author":"flajolet","year":"2007","journal-title":"Conference on analysis of algorithm (AofA)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2452376.2452456"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref17","article-title":"Efficient computation of frequent and top-k elements in data streams","author":"metwally","year":"2005","journal-title":"ICDT"},{"article-title":"Ethereum: A secure decentralised generalised transaction ledger","year":"2014","author":"wood","key":"ref18"},{"article-title":"Adaptive enhanced Bloom filters for identifying transactions of interest in a blockchain","year":"2017","author":"rush","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129096"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1109\/90.851975","article-title":"Summary cache: A scalable wide-area web cache sharing protocol","volume":"8","author":"fan","year":"2000","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2889329"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737454"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674994"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486415"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2011.6120248"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766765"},{"key":"ref45","article-title":"Detecting bot activity in the Ethereum blockchain network","volume":"abs 1810 1591","author":"zwang","year":"2018","journal-title":"CoRR"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34223-4_2"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2016.7802939"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3390\/s20010147"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766765"}],"event":{"name":"2021 International Conference on COMmunication Systems & NETworkS (COMSNETS)","start":{"date-parts":[[2021,1,5]]},"location":"Bangalore, India","end":{"date-parts":[[2021,1,9]]}},"container-title":["2021 International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9352735\/9352808\/09352944.pdf?arnumber=9352944","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,18]],"date-time":"2022-12-18T05:14:40Z","timestamp":1671340480000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9352944\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,5]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/comsnets51098.2021.9352944","relation":{},"subject":[],"published":{"date-parts":[[2021,1,5]]}}}