{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T09:01:47Z","timestamp":1773824507126,"version":"3.50.1"},"reference-count":184,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100011512","name":"National Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100011512","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Prime Minister&#x0027;s Office, Singapore"},{"name":"National Cybersecurity R&amp;D Program","award":["NRF2016NCR-NCR002-028"],"award-info":[{"award-number":["NRF2016NCR-NCR002-028"]}]},{"name":"National Cybersecurity R&amp;D Directorate"},{"DOI":"10.13039\/501100007040","name":"Singapore University of Technology and Design","doi-asserted-by":"publisher","award":["2015 097"],"award-info":[{"award-number":["2015 097"]}],"id":[{"id":"10.13039\/501100007040","id-type":"DOI","asserted-by":"publisher"}]},{"name":"MOE AcRF Tier 2","award":["2016-T2-1-170"],"award-info":[{"award-number":["2016-T2-1-170"]}]},{"name":"NRF 2018 Fellowship","award":["NRF-NRFF2018-07"],"award-info":[{"award-number":["NRF-NRFF2018-07"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Eng. Manage."],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1109\/tem.2020.2981286","type":"journal-article","created":{"date-parts":[[2020,4,29]],"date-time":"2020-04-29T21:13:22Z","timestamp":1588194802000},"page":"1028-1044","source":"Crossref","is-referenced-by-count":39,"title":["PREStO: A Systematic Framework for Blockchain Consensus Protocols"],"prefix":"10.1109","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1498-1490","authenticated-orcid":false,"given":"Stefanos","family":"Leonardos","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Reijsbergen","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Piliouras","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","author":"neumann","year":"1944","journal-title":"Theory of Games and Economic Behavior"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02786-9_14"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39028-4_9"},{"key":"ref174","article-title":"On sharding blockchains","author":"wiki","year":"2019"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896108"},{"key":"ref176","first-page":"45","article-title":"Do you need a blockchain","author":"w\u00fcst","year":"0","journal-title":"Proc Crypto Valley Conf Blockchain Techno"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0483(89)90021-2"},{"key":"ref178","author":"zamfir","year":"2017","journal-title":"Personal communication"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0163477"},{"key":"ref168","author":"vazirani","year":"2013","journal-title":"Approximation Algorithms"},{"key":"ref169","article-title":"The real blockchain trilemma","author":"vazz","year":"2019"},{"key":"ref39","article-title":"Banks have a big appetite to join JPMorgan's blockchain party","author":"chaparro","year":"2018","journal-title":"Business Insider"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3386\/w22952"},{"key":"ref33","first-page":"1","article-title":"Architecture of the hyperledger blockchain fabric","volume":"310","author":"cachin","year":"0","journal-title":"Proc Workshop on Distributed Cryptocurrencies and Consensus Ledgers"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751241"},{"key":"ref31","article-title":"Casper the friendly finality gadget","author":"buterin","year":"2017","journal-title":"arXiv 1710 09437"},{"key":"ref30","article-title":"A next-generation smart contract and decentralized application platform","author":"buterin","year":"2014"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.11.006"},{"key":"ref36","article-title":"Bitcoin cash: Peer-to-peer electronic cash","author":"cash","year":"2019"},{"key":"ref35","year":"0"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.DISC.2017.1"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00086"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/742"},{"key":"ref183","article-title":"The Zilliqa technical whitepaper","year":"2017"},{"key":"ref182","article-title":"Zilliqa","year":"0"},{"key":"ref28","article-title":"Discouragement attacks","author":"buterin","year":"2018"},{"key":"ref27","article-title":"The triangle of harm","author":"buterin","year":"2017"},{"key":"ref179","first-page":"415","article-title":"Flux: Revisiting near blocks for proof-of-work blockchains","volume":"2018","author":"zamyatin","year":"2018","journal-title":"IACR Cryptology ePrint"},{"key":"ref29","article-title":"Ethereum 2.0 spec&#x2014;Casper and sharding","author":"buterin","year":"2018"},{"key":"ref20","article-title":"The blockchain folk theorem","author":"biais","year":"2017","journal-title":"Institut d&#x2019;&#x00C9;conomie Industrielle"},{"key":"ref22","first-page":"19","article-title":"Why buy when you can rent? Bribery attacks on bitcoin-style consensus","author":"bonneau","year":"0","journal-title":"Financial Cryptography Workshops"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58820-8_7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329567"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_6"},{"key":"ref26","article-title":"Algorand secures $62m in funding and announces appointment of executive team","year":"2018"},{"key":"ref100","article-title":"Op Ed: The many faces of sharding for blockchain scalability","author":"jia","year":"2018","journal-title":"Bitcoin Magazine"},{"key":"ref25","article-title":"Reward sharing schemes for stake pools","author":"br\u00fcnjes","year":"2018","journal-title":"arXiv 1807 11218"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05171-6_24"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1132516.1132527"},{"key":"ref154","article-title":"JPMorgan Chase to create digital coins using blockchain for payments","author":"saxena","year":"2019","journal-title":"Reuters"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_30"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_28"},{"key":"ref155","doi-asserted-by":"crossref","first-page":"817","DOI":"10.1162\/003355399556151","article-title":"A theory of fairness, competition, and cooperation","volume":"114","author":"schmidt","year":"1999","journal-title":"Quart J Econ"},{"key":"ref150","article-title":"Analysis of bitcoin pooled mining reward systems","author":"rosenfeld","year":"2011","journal-title":"arXiv 1112 4980"},{"key":"ref152","article-title":"Blockchain without waste: Proof-of-stake","author":"saleh","year":"2017"},{"key":"ref151","first-page":"513","article-title":"Intrinsic robustness of the price of anarchy","author":"roughgarden","year":"0","journal-title":"Proc 41st Annu ACM Symp Theory Comput"},{"key":"ref146","article-title":"Proof of stake velocity: Building the social currency of the digital age","author":"ren","year":"2014"},{"key":"ref147","first-page":"188","article-title":"The Herfindahl-Hirschman index","volume":"79","author":"rhoades","year":"1993","journal-title":"Federal Reserve Bulletin"},{"key":"ref148","first-page":"552","article-title":"How to leak a secret","author":"rivest","year":"0","journal-title":"Proc Int Conf Theory Appl Cryptol Inf Secur"},{"key":"ref149","article-title":"Bitcoin spinoff hacked in rare &#x2018;51% attack&#x2019;","author":"roberts","year":"2018","journal-title":"Fortune"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064033"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2781227"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.5195\/LEDGER.2017.96"},{"key":"ref56","article-title":"Bitcoin energy consumption index","year":"0"},{"key":"ref55","article-title":"A stochastic game framework for analyzing computational investment strategies in distributed computing with application to blockchain mining","author":"dhamal","year":"2018","journal-title":"arXiv 1809 03143"},{"key":"ref54","article-title":"Nasdaq leads $20 million investment in enterprise blockchain startup Symbiont","author":"del castillo","year":"2019","journal-title":"Forbes"},{"key":"ref53","article-title":"Despite crypto depression, M&A deals set new record","author":"del castillo","year":"2019","journal-title":"Forbes"},{"key":"ref52","article-title":"Fidelity launches institutional platform for bitcoin and Ethereum","author":"del castillo","year":"2018","journal-title":"Forbes"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355470"},{"key":"ref167","article-title":"The Hitchhiker's guide to blockchains: A trust based taxonomy","author":"thurimella","year":"2018"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.5555\/3361338.3361395"},{"key":"ref165","first-page":"400","article-title":"Agreement with Satoshi&#x2014;On the formalization of Nakamoto consensus","volume":"2018","author":"stifter","year":"2018","journal-title":"IACR Cryptology ePrint"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2016.04.006"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1145\/3152481"},{"key":"ref162","article-title":"In wake of Romaine E. coli scare, Walmart deploys blockchain to track leafy greens","author":"smith","year":"2018","journal-title":"CNN Business"},{"key":"ref161","volume":"118","author":"smith","year":"2011","journal-title":"Dynamical systems and population persistence"},{"key":"ref160","article-title":"Bitcoin guarantees strong, not eventual, consistency","author":"sirer","year":"2016"},{"key":"ref4","first-page":"375","article-title":"Hijacking bitcoin: Large-scale network attacks on cryptocurrencies","author":"apostolaki","year":"0","journal-title":"Proc 38th IEEE Symp Secur Privacy"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095816"},{"key":"ref6","first-page":"5:1","article-title":"Bitcoin: A natural oligopoly","author":"arnosti","year":"0","journal-title":"Proc Innov Theor Comput Sci Conf"},{"key":"ref5","first-page":"5:1","article-title":"Bitcoin: A natural oligopoly","volume":"124","author":"arnosti","year":"2018","journal-title":"10th Innovations in Theoretical Computer Science"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904181"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvcm4gdk"},{"key":"ref49","first-page":"106","article-title":"On scaling decentralized blockchains (position paper)","author":"croman","year":"2016","journal-title":"Financial Cryptography and Data Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-015-9212-6"},{"key":"ref157","article-title":"Proof of work and proof of stake consensus protocols: A blockchain application for local complementary currencies","author":"seang","year":"2018"},{"key":"ref158","article-title":"Scilla: A smart contract intermediate-level language","author":"sergey","year":"2018","journal-title":"arXiv 1801 00687"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3386\/w24399"},{"key":"ref45","article-title":"Coin MarketCap","year":"0"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2842460"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3339255"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00222"},{"key":"ref41","article-title":"A systematic approach to cryptocurrency fees","author":"chepurnoy","year":"2018"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060600"},{"key":"ref43","article-title":"The economics of cryptocurrencies&#x2014;bitcoin and beyond","author":"chiu","year":"2017","journal-title":"School Econ Finance Victoria Univ Wellington"},{"key":"ref127","article-title":"Feather-forks: Enforcing a blacklist with sub-50% hash power","author":"miller","year":"2013"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2016.7749510"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58820-8_1"},{"key":"ref124","first-page":"1409","article-title":"SMARTPOOL: Practical decentralized pooled mining","author":"luu","year":"0","journal-title":"Proc 26th USENIX Security Symp"},{"key":"ref73","first-page":"291","article-title":"The bitcoin backbone protocol with chains of variable difficulty","author":"garay","year":"2017","journal-title":"Advances in Cryptology"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"ref129","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2008"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71924-5_15"},{"key":"ref128","author":"myerson","year":"2007","journal-title":"Game Theory"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329630"},{"key":"ref76","article-title":"IBM is betting big on blockchain technology. Is it worth the risk?","author":"garcia","year":"2018","journal-title":"CNN Business"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1515\/9781400884087-007"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2011.57"},{"key":"ref74","first-page":"284","article-title":"SoK: A consensus taxonomy in the blockchain era","volume":"2018","author":"garay","year":"2018","journal-title":"IACR Cryptology ePrint"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76581-5_16"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01177-2_81"},{"key":"ref134","article-title":"JPMorgan widens blockchain payments to more than 75 banks","author":"noonan","year":"2018","journal-title":"Financial Times"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00015"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481"},{"key":"ref79","article-title":"Proof-of-stake sidechains","author":"gazi","year":"2018"},{"key":"ref136","first-page":"305","article-title":"In search of an understandable consensus algorithm","author":"ongaro","year":"0","journal-title":"Proc USENIX Annu Techn Conf"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2014.0699"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"ref137","author":"papadimitriou","year":"2003","journal-title":"Computational Complexity"},{"key":"ref60","article-title":"EOSIO strategic vision","year":"2019"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087809"},{"key":"ref62","article-title":"Sharding roadmap","year":"0"},{"key":"ref61","article-title":"Sharding FAQ","year":"0"},{"key":"ref63","first-page":"45","article-title":"Bitcoin-NG: A scalable blockchain protocol","author":"eyal","year":"0","journal-title":"Proc 10th USENIX Symp Netw Syst Des Implementation"},{"key":"ref64","first-page":"436","article-title":"Majority is not enough: Bitcoin mining is vulnerable","author":"eyal","year":"2014","journal-title":"Financial Cryptography and Data Security"},{"key":"ref140","first-page":"181","article-title":"Persistent patterns: Multi-agent learning beyond equilibrium and utility","author":"piliouras","year":"0","journal-title":"Proc Int Conf Auton Agents Multi-Agent Syst"},{"key":"ref65","first-page":"42","article-title":"Compounding of wealth in proof-of-stake cryptocurrencies","author":"fanti","year":"2018"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/2930956"},{"key":"ref66","article-title":"Bitcoin pool GHash.io commits to 40% hashrate limit after its 51% breach","author":"farivar","year":"2014"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973402.64"},{"key":"ref67","doi-asserted-by":"crossref","DOI":"10.4337\/9781840647761","author":"felsenthal","year":"1998","journal-title":"The Measurement of Voting Power Theory and Practice Problems and Paradoxes"},{"key":"ref143","article-title":"Blockchain trilemma: Explained","year":"2019"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2876846"},{"key":"ref144","article-title":"Researchers link realism to blockchain's promise","year":"2018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1146381.1146393"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2882794"},{"key":"ref145","article-title":"Quorum","year":"0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3386\/w25407"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.12.005"},{"key":"ref95","article-title":"Walmart turns to blockchain (and Hyperledger) to take on food traceability and safety","year":"2018"},{"key":"ref108","first-page":"11","article-title":"The economics of bitcoin mining, or bitcoin in the presence of adversaries","author":"kroll","year":"2013","journal-title":"Proc Workshop Econ Inform Secur"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2018.2858754"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49116-3_38"},{"key":"ref93","article-title":"Ethereum cofounder says blockchain presents &#x2018;Governance Crisis&#x2019;","author":"hoskinson","year":"2019"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139173179"},{"key":"ref105","article-title":"PPCoin: Peer-to-peer crypto-currency with proof-of-stake","author":"king","year":"2012"},{"key":"ref91","article-title":"Blockchain's once-feared 51% attack is now becoming regular","author":"hertig","year":"2018"},{"key":"ref104","first-page":"357","article-title":"Ouroboros: A provably secure proof-of-stake blockchain protocol","author":"kiayias","year":"0","journal-title":"Proc Annu Int Cryptol Conf"},{"key":"ref90","first-page":"129","article-title":"Eclipse attacks on bitcoin's peer-to-peer network","author":"heilman","year":"0","journal-title":"24th USENIX Security Symp"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT.2017.8256979"},{"key":"ref102","first-page":"463","article-title":"An empirical analysis of anonymity in Zcash","author":"kappos","year":"0","journal-title":"Proc 27th USENIX Conf Secur Symp"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref110","article-title":"Tendermint: Consensus without mining","author":"kwon","year":"2014"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/3107182"},{"key":"ref99","article-title":"Ethereum classic 51% attack&#x2014;The reality of proof-of-work","author":"jenkinson","year":"2019","journal-title":"Cointelegraph com"},{"key":"ref96","article-title":"Hyyperledger","year":"2019"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17572-5_22"},{"key":"ref10","article-title":"SoK: Tools for game theoretic models of security for cryptocurrencies","author":"azouvi","year":"2019","journal-title":"arXiv 1905 08595"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03251-7_15"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426061"},{"key":"ref13","article-title":"Proofs of useful work","author":"ball","year":"2017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022083416605"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355458"},{"key":"ref118","article-title":"Litecoin","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_36"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"ref117","first-page":"919","article-title":"Bitcoin mining pools: A cooperative game theoretic analysis","author":"lewenberg","year":"0","journal-title":"Proc 1st Int Conf Autonomous Agents Multiagent Syst"},{"key":"ref17","author":"baumol","year":"1952","journal-title":"Welfare Economics and The Theory of the State"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898718829"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2820009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_10"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37110-4_13"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_5"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511754258"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.49"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751290"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-015-9296-2"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.100"},{"key":"ref121","article-title":"Blockchain: Enigma, paradox, opportunity","year":"2019"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.34"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329566"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2013.06.007"},{"key":"ref87","article-title":"On the unfairness of blockchain","author":"guerraoui","year":"2018"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25280-8_1"}],"container-title":["IEEE Transactions on Engineering Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/17\/9226631\/09082016.pdf?arnumber=9082016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T13:19:48Z","timestamp":1696079988000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9082016\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11]]},"references-count":184,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tem.2020.2981286","relation":{},"ISSN":["0018-9391","1558-0040"],"issn-type":[{"value":"0018-9391","type":"print"},{"value":"1558-0040","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11]]}}}