{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T23:47:21Z","timestamp":1770680841440,"version":"3.49.0"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000144","name":"NSF CPS","doi-asserted-by":"publisher","award":["#1932300"],"award-info":[{"award-number":["#1932300"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"NSF CPS","doi-asserted-by":"publisher","award":["#1931767"],"award-info":[{"award-number":["#1931767"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fidelity National Financial Distinguished Professorship in CIS","award":["#0583-5504-51"],"award-info":[{"award-number":["#0583-5504-51"]}]},{"DOI":"10.13039\/100014961","name":"Florida Center for Cybersecurity, University of South Florida","doi-asserted-by":"publisher","award":["#220408"],"award-info":[{"award-number":["#220408"]}],"id":[{"id":"10.13039\/100014961","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tnsm.2022.3219494","type":"journal-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T21:20:34Z","timestamp":1667596834000},"page":"3847-3857","source":"Crossref","is-referenced-by-count":30,"title":["Toward a Green Blockchain: Engineering Merkle Tree and Proof of Work for Energy Optimization"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2035-2914","authenticated-orcid":false,"given":"Cesar Castellon","family":"Escobar","sequence":"first","affiliation":[{"name":"School of Computing, University of North Florida, Jacksonville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1164-2757","authenticated-orcid":false,"given":"Swapnoneel","family":"Roy","sequence":"additional","affiliation":[{"name":"School of Computing, University of North Florida, Jacksonville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3915-3488","authenticated-orcid":false,"given":"O. Patrick","family":"Kreidl","sequence":"additional","affiliation":[{"name":"School of Engineering, University of North Florida, Jacksonville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4343-9999","authenticated-orcid":false,"given":"Ayan","family":"Dutta","sequence":"additional","affiliation":[{"name":"School of Computing, University of North Florida, Jacksonville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5336-9651","authenticated-orcid":false,"given":"Ladislau","family":"Boloni","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Central Florida, Orlando, FL, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006078"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2842460"},{"key":"ref3","volume-title":"Hands-on Blockchain with Hyperledger: Building Decentralized Applications with Hyperledger Fabric and Composer","author":"Gaur","year":"2018"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2020.05.012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.043221010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2905743"},{"key":"ref7","volume-title":"IoT and Blockchain Convergence: Benefits and Challenges","author":"Banafa","year":"2017"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.046"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.08.101"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00148"},{"key":"ref11","volume-title":"Evaluation of energy consumption in virtualization environments: Proof of concept using containers","author":"Westin","year":"2017"},{"key":"ref12","volume-title":"Towards designing energy-efficient secure hashes","author":"Harish","year":"2015"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2422436.2422470"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2014.47"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169427"},{"key":"ref16","first-page":"1","article-title":"Energy consumption measurement of C\/C++ programs using clang tooling","volume-title":"Proc. 6th Workshop Softw. Qual. Anal. Monit. Improvement Appl.","author":"Santos"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EEEIC.2017.7977613"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EI2.2017.8244418"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-017-0360-9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/EI247390.2019.9061928"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2018.07.012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/RWEEK.2017.8088642"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/iSES.2018.00058"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761539"},{"key":"ref25","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008","journal-title":"Decentralized Bus. Rev."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100212"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.joule.2018.04.016"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/s41558-019-0534-5"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3130900"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1038\/s41893-018-0152-7"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SSRR53300.2021.9597867"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA46639.2022.9812211"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3389\/frobt.2020.00054"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2022.3170519"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2022.3166104"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2022.100657"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00149"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3327960.3332386"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.048"},{"key":"ref40","volume-title":"Hashcash\u2014A denial of service counter-measure","author":"Back","year":"2002"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297319"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s42786-018-00002-6"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.14778\/3380750.3380759"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.33166\/AETiC.2020.01.002"},{"key":"ref45","volume-title":"Core Architecture Doubles Mem Data Rate","volume":"16","author":"Farrell","year":"2005"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/978\/1\/012116"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_8"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIP47207.2019.8985677"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3390\/fi11070149"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2020.10.361"},{"key":"ref51","first-page":"1427","article-title":"REM: Resource-efficient mining for blockchains","volume-title":"Proc. 26th USENIX Security Symp. (USENIX Security)","author":"Zhang"},{"key":"ref52","volume-title":"With Intel\u00ae Blockchain Technology","year":"2017"},{"key":"ref53","volume-title":"Explaining side chains, the next breakthrough in blockchain","author":"Lee","year":"2018"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107819"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.joule.2021.02.006"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2020.08.519"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2021.02.022"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03085-0"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2019.00066"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1733-0_2"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ADCOM.2017.00013"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2018.8400278"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.023"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.26756\/th.2020.154"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2925010"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/4275028\/10034788\/9939185-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10034788\/09939185.pdf?arnumber=9939185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T22:38:23Z","timestamp":1705963103000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9939185\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":65,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2022.3219494","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}