{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T21:52:45Z","timestamp":1775598765113,"version":"3.50.1"},"reference-count":302,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/comst.2019.2928178","type":"journal-article","created":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T20:00:47Z","timestamp":1562961647000},"page":"3796-3838","source":"Crossref","is-referenced-by-count":417,"title":["A Vademecum on Blockchain Technologies: When, Which, and How"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7175-3665","authenticated-orcid":false,"given":"Marianna","family":"Belotti","sequence":"first","affiliation":[]},{"given":"Nikola","family":"Bozic","sequence":"additional","affiliation":[]},{"given":"Guy","family":"Pujolle","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6129-0676","authenticated-orcid":false,"given":"Stefano","family":"Secci","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref275","first-page":"919","article-title":"Snow white: Provably secure proofs of stake","author":"bentov","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref274","article-title":"Proof of activity: Extending bitcoin&#x2019;s proof of work via proof of stake","author":"bentov","year":"2014"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1109\/ADCONS.2013.42"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"ref271","article-title":"NooShare: A decentralized ledger of shared computational resources","author":"coventry","year":"2012"},{"key":"ref270","author":"andersen","year":"2019","journal-title":"Cunningham Chain From Mathworld&#x2014;A Wolfram Web Resource"},{"key":"ref273","article-title":"Proofs of work from worst-case assumptions","author":"marshall","year":"2018"},{"key":"ref170","year":"2019","journal-title":"Hyperledger Grid Source Code"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2017.8171383"},{"key":"ref172","year":"2018","journal-title":"Hyperledger Blockchain Performance Metrics (White Paper)"},{"key":"ref171","year":"2019","journal-title":"White Paper Library"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1145\/1456455.1456460"},{"key":"ref173","first-page":"447","article-title":"M2R: Enabling stronger privacy in mapreduce computation","author":"dinh","year":"2015","journal-title":"Proc Usenix Security Symp"},{"key":"ref176","year":"2019","journal-title":"IBM BaaS"},{"key":"ref175","article-title":"Chain of trust: Can trusted hardware help scaling blockchains?","author":"dang","year":"2018","journal-title":"arXiv preprint arXiv 1804 00209"},{"key":"ref178","year":"2019","journal-title":"HPE BaaS"},{"key":"ref177","year":"2019","journal-title":"SAP BaaS"},{"key":"ref168","year":"2019","journal-title":"Hyperledger Indy Source Code"},{"key":"ref169","year":"2019","journal-title":"Hyperledger Iroha Source Code"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8202"},{"key":"ref38","first-page":"113","article-title":"What blockchain alternative do you need?","author":"koens","year":"0","journal-title":"Data Privacy Management Cryptocurrencies and Blockchain Technology"},{"key":"ref33","first-page":"653","article-title":"A survey of blockchain security issues and challenges","volume":"19","author":"lin","year":"2017","journal-title":"Int J Netw Security"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"ref31","article-title":"A survey on consensus mechanisms and mining management in blockchain networks","author":"wang","year":"2018","journal-title":"arXiv preprint arXiv 1805 02707"},{"key":"ref30","article-title":"Consensus in the age of blockchains","author":"bano","year":"2017","journal-title":"arXiv preprint arXiv 1711 03890"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597110"},{"key":"ref37","first-page":"2","article-title":"A blockchain tutorial","volume":"20","author":"stallings","year":"2017","journal-title":"Internet Protocol J"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3571056"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SCNS.2016.7870552"},{"key":"ref269","author":"king","year":"2013","journal-title":"Primecoin Cryptocurrency with Prime Number Proof-of-work"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2882794"},{"key":"ref34","article-title":"Survey on blockchain technologies and related services","year":"2019"},{"key":"ref288","author":"haleem","year":"2019","journal-title":"Helium A decentralized machine network"},{"key":"ref287","article-title":"SpaceMint: A cryptocurrency based on proofs of space","author":"park","year":"2019"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.37"},{"key":"ref285","year":"2019"},{"key":"ref284","author":"buterin","year":"2019","journal-title":"Understanding Serenity part I Abstraction"},{"key":"ref181","year":"2019","journal-title":"Huawei Blockchain Whitepaper"},{"key":"ref283","article-title":"Casper the friendly finality gadget","author":"buterin","year":"2017","journal-title":"arXiv preprint arXiv 1710 09437"},{"key":"ref180","year":"2019","journal-title":"Amazon BaaS"},{"key":"ref282","year":"2019"},{"key":"ref281","author":"vasin","year":"2019","journal-title":"BlackCoin&#x2019;s proof-of-stake protocol v2"},{"key":"ref280","article-title":"Proof of stake velocity: Building the social currency of the digital age","author":"ren","year":"2014"},{"key":"ref185","author":"benet","year":"2019","journal-title":"IPFS&#x2014;Content Addressed Versioned P2P File System (DRAFT3)"},{"key":"ref184","year":"2019","journal-title":"Baidu"},{"key":"ref183","year":"2019","journal-title":"BLOCKO"},{"key":"ref182","year":"2019","journal-title":"Vechain Whitepaper"},{"key":"ref189","year":"2019","journal-title":"IRTF Decentralized Internet Infrastructure Research Group"},{"key":"ref188","year":"2019","journal-title":"ISO\/TC 307 Blockchain and distributed ledger technologies"},{"key":"ref187","year":"2019","journal-title":"IBM Food Trust"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.3920\/JCNS2008.x086"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"ref179","year":"2018","journal-title":"Oracle Blockchain Cloud Service"},{"key":"ref29","article-title":"Blockchains consensus protocols in the wild","author":"cachin","year":"2017","journal-title":"Proc 31st Int Symp Distrib Comput"},{"key":"ref20","year":"2019","journal-title":"Hyperledger architecture volume 1 Introduction to Hyperledger business blockchain design philosophy and consensus"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2535718"},{"key":"ref21","article-title":"Distributed ledger technology: Beyond blockchain","author":"walport","year":"2016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906988"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2852480"},{"key":"ref278","author":"king","year":"2019","journal-title":"Peercoin&#x2014;Secure & Sustainable Cryptocoin"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"ref279","author":"penzl","year":"2019","journal-title":"SNAPSHOT-Nxt unsurpassable blockchain solutions"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2017.8014672"},{"key":"ref293","year":"2019"},{"key":"ref50","year":"2014","journal-title":"A Next Generation Smart Contract and Decentralized Application Platform Ethereum white Paper"},{"key":"ref292","year":"2019"},{"key":"ref51","article-title":"Architecture of the hyperledger blockchain fabric","author":"cachin","year":"2006","journal-title":"Proc DCC"},{"key":"ref295","year":"2019"},{"key":"ref294","year":"2019"},{"key":"ref297","first-page":"279","article-title":"Enhancing bitcoin security and performance with strong consistency via collective signing","author":"kogias","year":"2016","journal-title":"Proc Usenix Security"},{"key":"ref296","article-title":"A blockchain consensus protocol with horizontal scalability","author":"cong","year":"2017"},{"key":"ref299","article-title":"Solidus: An incentive-compatible cryptocurrency based on permissionless Byzantine consensus","author":"abraham","year":"2016","journal-title":"arXiv preprint arXiv 1612 02916"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1145\/2833312.2833321"},{"key":"ref154","article-title":"Corda performance to infinity and beyond","author":"carlyle","year":"2019"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.43"},{"key":"ref156","article-title":"Tendermint: Consensus without mining","author":"kwon","year":"2019"},{"key":"ref155","year":"2019","journal-title":"Corda Source Code"},{"key":"ref150","year":"2019","journal-title":"Hyperledger URSA"},{"key":"ref291","first-page":"485","article-title":"XFT: Practical fault tolerance beyond crashes","author":"liu","year":"2016","journal-title":"Proc OSDI"},{"key":"ref152","article-title":"On hashing graphs","author":"kundu","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref290","article-title":"Non-determinism in Byzantine fault-tolerant replication","author":"cachin","year":"2016","journal-title":"arXiv preprint arXiv 1603 04307"},{"key":"ref151","year":"2019","journal-title":"Transact Hyperledger Project"},{"key":"ref146","year":"2019","journal-title":"Hyperledger Caliper"},{"key":"ref147","year":"2019","journal-title":"Hyperledger Quilt"},{"key":"ref148","year":"2019","journal-title":"Interledger Protocol (ILP)"},{"key":"ref149","year":"2019","journal-title":"Hyperledger Aries"},{"key":"ref289","article-title":"Yet another visit to Paxos","author":"cachin","year":"2009"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-08755-9_9"},{"key":"ref57","author":"lynch","year":"1996","journal-title":"Distributed Algorithms"},{"key":"ref56","first-page":"1859","article-title":"A survey of consensus problems in multi-agent coordination","volume":"3","author":"ren","year":"2005","journal-title":"Proc ACC"},{"key":"ref55","year":"2019","journal-title":"Quorum White Paper"},{"key":"ref54","year":"2019","journal-title":"Chain Protocol&#x2014;White Paper"},{"key":"ref53","year":"2019","journal-title":"Cosmos a network of distributed ledgers"},{"key":"ref52","author":"hearn","year":"2019","journal-title":"Corda A distributed ledger"},{"key":"ref40","first-page":"306","article-title":"A comprehensive reference model for blockchain-based distributed ledger technology","author":"ellervee","year":"2017","journal-title":"Proc ER Forum"},{"key":"ref167","year":"2019","journal-title":"Hyperledger Fabric Source Code"},{"key":"ref166","year":"2019","journal-title":"Quorum Source Code"},{"key":"ref165","year":"2019","journal-title":"Raft ETCD"},{"key":"ref164","author":"glickstein","year":"2019","journal-title":"A new design for blockchain transactions"},{"key":"ref163","year":"2019","journal-title":"Chain News&#x2014;Introducing Sequence"},{"key":"ref162","year":"2019","journal-title":"Chain Core Source Code"},{"key":"ref161","year":"2019","journal-title":"Tendermint Source Code"},{"key":"ref160","article-title":"Tendermint: Byzantine fault tolerance in the age of blockchains","author":"buchman","year":"2016"},{"key":"ref4","year":"2019","journal-title":"Codementor"},{"key":"ref3","author":"goyal","year":"2019","journal-title":"Centralized vs Decentralized vs Distributed"},{"key":"ref6","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref5","year":"2019","journal-title":"Appinventive"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70101-5"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945470"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2842460"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref157","article-title":"Correctness and fairness of tendermint-core blockchains","author":"amoussou-guenou","year":"2018","journal-title":"arXiv preprint arXiv 1805 08429"},{"key":"ref9","first-page":"45","article-title":"Bitcoin-NG: A scalable blockchain protocol","author":"eyal","year":"2016","journal-title":"Proc USENIX NSDI"},{"key":"ref158","first-page":"135","article-title":"Spin one&#x2019;s wheels? Byzantine fault tolerance with a spinning primary","author":"veronese","year":"2009","journal-title":"Proc IEEE SRDS"},{"key":"ref46","author":"baliga","year":"2017","journal-title":"Understanding blockchain consensus models"},{"key":"ref45","first-page":"112","article-title":"The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication","author":"vukoli?","year":"2015","journal-title":"Proc Int Workshop Open Problems Netw Security"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2017.7965711"},{"key":"ref47","article-title":"Consensus-as-a-service: A brief report on the emergence of permissioned, distributed ledger systems","author":"swanson","year":"2015"},{"key":"ref42","first-page":"1156","article-title":"Scripting smart contracts for distributed ledger technology","author":"seijas","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2781227"},{"key":"ref44","first-page":"1364","article-title":"Deanonymization in the bitcoin P2P network","author":"fanti","year":"2017","journal-title":"Proc NIPS"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0070"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00011"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2018.8400278"},{"key":"ref71","first-page":"173","article-title":"Practical Byzantine fault tolerance","author":"castro","year":"1999","journal-title":"Proc OSDI"},{"key":"ref70","author":"larimer","year":"2019","journal-title":"Delegated proof-of-stake white paper"},{"key":"ref76","article-title":"MultiChain","author":"greenspan","year":"2019","journal-title":"MultiChain Private Blockchain&#x2014;White Paper"},{"key":"ref77","author":"greenspan","year":"2019","journal-title":"Blockchains vs centralized databases"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3055518.3055526"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038517"},{"key":"ref78","author":"greenspan","year":"2019","journal-title":"Private Blockchains Are More Than Just Shared Databases"},{"key":"ref79","author":"ray","year":"2019","journal-title":"Blockchains Versus Traditional Databases"},{"key":"ref60","first-page":"18","article-title":"Paxos made simple","volume":"32","author":"lamport","year":"2001","journal-title":"ACM SIGACT News"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref61","first-page":"305","article-title":"In search of an understandable consensus algorithm","author":"ongaro","year":"2014","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-49823-0_5"},{"key":"ref65","year":"2019","journal-title":"Hashcash"},{"key":"ref66","article-title":"Exposing computationally-challenged byzantine impostors","author":"aspnes","year":"2005"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67816-0_17"},{"key":"ref300","article-title":"OmniLedger: A secure, scale-out, decentralized ledger via sharding","author":"kokoris-kogias","year":"2019"},{"key":"ref68","author":"olson","year":"2019","journal-title":"Sawtooth An Introduction&#x2014;White Paper"},{"key":"ref69","article-title":"NEM&#x2014;Technical reference, version 1.2.1","year":"2018"},{"key":"ref302","article-title":"Slimcoin: A peer-to-peer crypto-currency with proof-of-burn","year":"2014"},{"key":"ref197","year":"2019","journal-title":"TrustToken"},{"key":"ref198","year":"2019","journal-title":"HelloGold Foundation-Technical Whitepaper"},{"key":"ref199","year":"2019","journal-title":"The dai stablecoin system"},{"key":"ref193","year":"2019","journal-title":"AngelList"},{"key":"ref194","article-title":"Distributed ledger technologies\/blockchain: Challenges, opportunities and the prospects for standards","author":"deshpande","year":"2017"},{"key":"ref195","author":"securities","year":"2016","journal-title":"Discussion Paper The Distributed Ledger Applied to Securities Market"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.17016\/FEDS.2016.095"},{"key":"ref95","author":"broderson","year":"2016","journal-title":"Blockchain Securing a new health in teroperability experience"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2016.7749510"},{"key":"ref190","year":"2019","journal-title":"The World Wide Web Consortium (W3C) Blockchain Initiative"},{"key":"ref93","article-title":"A case study for blockchain in healthcare: &#x2018;MedRec&#x2019; prototype for electronic health records and medical research data","author":"ekblaw","year":"2016","journal-title":"Proceedings of IEEE Open & Big Data Conf 13"},{"key":"ref191","year":"2019","journal-title":"ISITC Europe Blockchain Working Group"},{"key":"ref92","article-title":"Blockchain for health data and its potential use in health it and health care related research","author":"linn","year":"2016","journal-title":"use of blockchain in healthcare and research workshop"},{"key":"ref192","year":"2019","journal-title":"Focus group on application of distributed ledger technology"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0574-6"},{"key":"ref90","article-title":"Healthcare transaction validation via blockchain proof-of-work, systems and methods","author":"witchey","year":"2015"},{"key":"ref98","author":"orcutt","year":"2019","journal-title":"Who Will Build the Health-Care Block&#x2013;Chain?"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"ref96","first-page":"1","article-title":"A blockchain-based approach to health information exchange networks","volume":"1","author":"peterson","year":"2016","journal-title":"Proc NIST Workshop Blockchain Healthcare"},{"key":"ref97","author":"sharma","year":"2019","journal-title":"Blockchain in Healthcare Patient Benefits and More"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1002\/jcaf.22179"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1186\/s40854-016-0034-9"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45848-9_19"},{"key":"ref83","first-page":"82","article-title":"Re-risking in realtime: On possible futures for finance after the blockchain","volume":"9","author":"maurer","year":"2016","journal-title":"BEHEMOTH J Civilisation"},{"key":"ref80","author":"narayanan","year":"2019","journal-title":"Private blockchain is just a confusing name for a shared database"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/CCTA.2017.8062773"},{"key":"ref85","article-title":"Blockchain: Digitally rebuilding the real estate industry","author":"spielman","year":"2016"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"ref87","author":"mattila","year":"2016","journal-title":"Industrial blockchain platforms An exercise in use case development in the energy industry"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/EEEIC.2017.7977613"},{"key":"ref200","author":"takagi","year":"2019","journal-title":"Discussion Paper No 6 (17-004) Blockchain-Based Digital Currencies for Community Building"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016280"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.102"},{"key":"ref209","author":"willet","year":"0","journal-title":"The Second Bitcoin Whitepaper V 0 5"},{"key":"ref203","article-title":"Digital signature system and method based on a conventional encryption function","author":"merkle","year":"1989"},{"key":"ref204","article-title":"Elliptic curve DSA (ECDSA): An enhanced DSA","volume":"7","author":"johnson","year":"1998","journal-title":"Proc Usenix Security Symp"},{"key":"ref201","author":"antonopoulos","year":"2014","journal-title":"Mastering Bitcoin Unlocking Digital Cryptocurrencies"},{"key":"ref202","first-page":"437","article-title":"How to time-stamp a digital document","author":"haber","year":"1990","journal-title":"Proc Conf Theory of Cryptography"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.4324\/9781315211909-8"},{"key":"ref208","year":"2019","journal-title":"Transaction"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1108\/APJIE-12-2017-034"},{"key":"ref211","article-title":"Method and apparatus for a compare and swap instruction","author":"macgregor","year":"1986"},{"key":"ref210","author":"bonneau","year":"2019","journal-title":"Perspectives on bitcoin and second-generation cryptocurrencies"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89722-6_9"},{"key":"ref213","author":"andresen","year":"2012","journal-title":"Pay to Script Hash BIP 16"},{"key":"ref214","year":"2019","journal-title":"Nonce"},{"key":"ref215","year":"2019","journal-title":"Scripta"},{"key":"ref216","author":"dai","year":"2019","journal-title":"Smart-Contract Value-Transfer Protocols on a Distributed Mobile Application Platform&#x2014;White Paper"},{"key":"ref217","author":"popejoy","year":"2019","journal-title":"The Pact Smart-Contract Language White paper"},{"key":"ref218","author":"lee","year":"2019","journal-title":"Litecoin-Open source P2P digital currency"},{"key":"ref219","author":"kuhnert","year":"2019","journal-title":"The Dogecoin Survival Guide"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134093"},{"key":"ref222","author":"schwartz","year":"2019","journal-title":"The Ripple protocol consensus algorithm"},{"key":"ref221","author":"goodman","year":"2019","journal-title":"Tezos-a self-amending crypto-ledger White paper"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/71.80156"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2016.07.001"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1145\/2229012.2229022"},{"key":"ref225","year":"2019","journal-title":"Weaknesses-Denial of Service (DoS)"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1145\/41840.41841"},{"key":"ref223","author":"mazieres","year":"2019","journal-title":"The Stellar Consensus Protocol A Federated Model for Internet-level Consensus"},{"key":"ref127","year":"2019","journal-title":"The RLPx Transport Protocol"},{"key":"ref126","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-11294-2","author":"charron-bost","year":"2010","journal-title":"Replication Theory and Practice"},{"key":"ref125","author":"buterin","year":"2019","journal-title":"Ethereum White Paper"},{"key":"ref124","article-title":"Ethereum: A secure decentralised generalised transaction ledger","author":"wood","year":"2019"},{"key":"ref129","year":"2019","journal-title":"Ethereum Source Code"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064033"},{"key":"ref130","year":"2019","journal-title":"Hyperledger Architecture Volume 2"},{"key":"ref133","year":"2019","journal-title":"LevelDB Key\/Value Database in Go"},{"key":"ref134","year":"2019","journal-title":"Apache CouchDB"},{"key":"ref131","author":"sousa","year":"2017","journal-title":"A byzantine fault-tolerant ordering service for the hyperledger fabric blockchain platform"},{"key":"ref132","year":"2019","journal-title":"What Is GRPC"},{"key":"ref232","author":"coulouris","year":"2005","journal-title":"Distributed Systems Concepts and Design"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1145\/1041680.1041682"},{"key":"ref230","first-page":"97","article-title":"Fault-tolerant broadcasts and related problems","author":"hadzilacos","year":"1993","journal-title":"Distributed Systems"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1145\/226643.226647"},{"key":"ref239","first-page":"103","article-title":"Consensus in the presence of partial synchrony (preliminary version)","author":"dwork","year":"1984","journal-title":"Proc ACM PODC"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1145\/102792.102801"},{"key":"ref235","first-page":"189","article-title":"BFT protocols under fire","volume":"8","author":"singh","year":"2008","journal-title":"Proc USENIX NSDI"},{"key":"ref234","article-title":"The blockchain consensus layer and BFT","volume":"3","author":"abraham","year":"2017","journal-title":"Bull EATCS"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref136","article-title":"YAC: BFT consensus algorithm for blockchain","author":"muratov","year":"2018","journal-title":"arXiv preprint arXiv 1809 00554"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-3081-7_10"},{"key":"ref138","year":"2018","journal-title":"Hyperledger Sawtooth Source Code"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/2948618.2954331"},{"key":"ref139","year":"2019","journal-title":"Sovrin A protocol and token for self-sovereign identity and decentralized trust version 1 0"},{"key":"ref140","year":"2019","journal-title":"Hyperledger Improvement Proposal&#x2014;Hyperledger Burrow"},{"key":"ref141","year":"2019","journal-title":"Hyperledger Burrow Source Code"},{"key":"ref142","year":"2019","journal-title":"Hyperledger Grid"},{"key":"ref143","year":"2019","journal-title":"Welcome to Hyperledger Cello"},{"key":"ref2","first-page":"101","article-title":"A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications","author":"schollmeier","year":"2001","journal-title":"Proc P2P"},{"key":"ref144","year":"2019","journal-title":"Hyperledger Explorer"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/0376-5075(78)90025-9"},{"key":"ref145","year":"2019","journal-title":"Hyperledger Composer&#x2014;An Overview"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-002-0081-5"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0318-0"},{"key":"ref244","article-title":"Towards robust distributed systems","author":"brewer","year":"2000","journal-title":"Proc ACM PODC"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(82)90776-8"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(82)90033-3"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.21236\/ADA113241"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"ref249","author":"askoxylakis","year":"2016","journal-title":"Computers and Security"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2016.7795984"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/IOT-TUSCANY.2018.8373021"},{"key":"ref107","first-page":"1","article-title":"An agri-food supply chain traceability system for China based on RFID & blockchain technology","author":"tian","year":"2016","journal-title":"Proc ICSSSM"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM.2017.8290114"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406249"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/CSNET.2017.8242003"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005771"},{"key":"ref102","first-page":"1","article-title":"Work-in-progress: Integrating low-power IoT devices to a blockchain-based infrastructure","author":"\u00f6zyilmaz","year":"2017","journal-title":"Proc EMSOFT"},{"key":"ref111","article-title":"Smart contract templates: Foundations, design landscape and research directions","author":"clack","year":"2016","journal-title":"arXiv preprint arXiv 1608 00771"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2017.33"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2777990"},{"key":"ref250","author":"buterin","year":"2019","journal-title":"Ethereum News On Stake"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1145\/1146381.1146393"},{"key":"ref254","author":"eastlake","year":"2001","journal-title":"U S secure hash algorithm 1 (SHA1)"},{"key":"ref255","author":"szabo","year":"2019","journal-title":"Bit Gold 2008"},{"key":"ref252","author":"dai","year":"2019","journal-title":"B-Money (Blockchain)"},{"key":"ref253","first-page":"139","article-title":"Pricing via processing or combatting junk mail","author":"dwork","year":"1992","journal-title":"Proc Crypto"},{"key":"ref257","first-page":"89","article-title":"The miner&#x2019;s dilemma","author":"eyal","year":"2015","journal-title":"Proc s of the IEEE"},{"key":"ref256","author":"finney","year":"2019","journal-title":"RPOW&#x2014;Reusable PoW"},{"key":"ref259","year":"2019","journal-title":"Testnet"},{"key":"ref10","year":"2019","journal-title":"What to Mine"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813659"},{"key":"ref11","author":"wisniewska","year":"2019","journal-title":"Altcoins"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3326823"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2818623"},{"key":"ref14","author":"popov","year":"2019","journal-title":"The tangle"},{"key":"ref15","year":"2016","journal-title":"BigchainDB A Scalable Blockchain Database (White Paper)"},{"key":"ref16","article-title":"Technology for secure partitioning and updating of a distributed digital ledger","author":"saur","year":"2016"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2016.21"},{"key":"ref17","author":"buterin","year":"2019","journal-title":"Public and private blockchains"},{"key":"ref117","year":"2019","journal-title":"Types of Tokens The Four Mistakes Beginner Crypto-Investors Make ICO Scoring"},{"key":"ref18","first-page":"375","article-title":"Do you need a blockchain?","author":"w\u00fcst","year":"2017","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref19","author":"brown","year":"2019","journal-title":"Corda An Introduction"},{"key":"ref119","author":"back","year":"2019","journal-title":"Enabling blockchain innovations with pegged sidechains"},{"key":"ref114","year":"2019","journal-title":"Swarm"},{"key":"ref113","year":"2019","journal-title":"MultiChain - Open Platform for Building Blockchains"},{"key":"ref116","year":"2019","journal-title":"Microsoft BaaS"},{"key":"ref115","year":"2016","journal-title":"Filecoin A Decentralized Storage Network (White Paper)"},{"key":"ref120","author":"valenta","year":"2017","journal-title":"Comparison of ethereum hyperledger fabric and corda"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_8"},{"key":"ref122","first-page":"129","article-title":"Eclipse attacks on bitcoin&#x2019;s peer-to-peer network","author":"heilman","year":"2015","journal-title":"Proc Usenix Security Symp"},{"key":"ref123","year":"2019","journal-title":"Bitcoin source code"},{"key":"ref260","author":"sompolinsky","year":"2019","journal-title":"Accelerating Bitcoin&#x2019;s Transaction Processing Fast Money Grows on Trees Not Chains"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890159"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1109\/RTSI.2018.8548376"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.49"},{"key":"ref264","year":"2019","journal-title":"Scrypt Proof of Work"},{"key":"ref265","author":"percival","year":"2009","journal-title":"Stronger key derivation via sequential memory-hard functions"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2010.5641778"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/8915915\/08760539.pdf?arnumber=8760539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:07:45Z","timestamp":1657746465000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8760539\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":302,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2019.2928178","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}