{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:44:03Z","timestamp":1768524243500,"version":"3.49.0"},"reference-count":99,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tsc.2022.3189667","type":"journal-article","created":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T19:42:44Z","timestamp":1657568564000},"page":"1-14","source":"Crossref","is-referenced-by-count":12,"title":["A Geography-Based P2P Overlay Network for Fast and Robust Blockchain Systems"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8071-1130","authenticated-orcid":false,"given":"Haoran","family":"Qiu","sequence":"first","affiliation":[{"name":"University of Hong Kong, Hong Kong"}]},{"given":"Tao","family":"Ji","sequence":"additional","affiliation":[{"name":"University of Hong Kong, Hong Kong"}]},{"given":"Shixiong","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Hong Kong, Hong Kong"}]},{"given":"Xusheng","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Hong Kong, Hong Kong"}]},{"given":"Ji","family":"Qi","sequence":"additional","affiliation":[{"name":"University of Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7746-440X","authenticated-orcid":false,"given":"Heming","family":"Cui","sequence":"additional","affiliation":[{"name":"University of Hong Kong, Hong Kong"}]},{"given":"Sen","family":"Wang","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co. Ltd, China"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/507693.507695"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/JPROC.2007.909921","article-title":"Opportunities and challenges of peer-to-peer internet video broadcast","volume":"96","author":"liu","year":"2008","journal-title":"Proc IEEE"},{"key":"ref59","first-page":"1","article-title":"Innovative technology for CPU based attestation and sealing","author":"anati","year":"2013","journal-title":"Proc 2nd Int Workshop Hardware Architectural Support Secur Privacy"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498486"},{"key":"ref53","year":"2019"},{"key":"ref52","year":"2019"},{"key":"ref55","article-title":"Tendermint: Consensus without mining","volume":"1","author":"kwon","year":"2014"},{"key":"ref54","article-title":"BitShares 2.0: General overview","author":"schuh","year":"2015"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72905-1_1"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1002\/qre.473"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45518-3_18"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383071"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1297243"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818784"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3382734.3405704"},{"key":"ref41","article-title":"Bitcoin developer guide","year":"2019"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_5"},{"key":"ref43","year":"2019"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2009.5174285"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3007788.3007790"},{"key":"ref7","first-page":"357","article-title":"Ouroboros: A provably secure proof-of-stake blockchain protocol","author":"kiayias","year":"2017","journal-title":"Proc Annu Int Cryptol Conf"},{"key":"ref9","first-page":"1","article-title":"Architecture of the hyperledger blockchain fabric","author":"cachin","year":"2016","journal-title":"Proc Workshop Distrib Cryptocurrencies Consensus Ledgers"},{"key":"ref4","article-title":"Introduction to hyperledger sawtooth, v1.1.2","year":"2019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref6","first-page":"14","article-title":"Understanding blockchain consensus models","volume":"4","author":"baliga","year":"2017"},{"key":"ref5","article-title":"Eos.io technical white paper version no. 2","year":"2019"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642636"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945473"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945474"},{"key":"ref37","article-title":"An analysis of the skype peer-to-peer internet telephony protocol","author":"baset","year":"2004"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/11558989_12"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72606-7_49"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2005.248586"},{"key":"ref33","article-title":"Give-to-get: Free-riding resilient video-on-demand in P2P systems","author":"mol","year":"2008","journal-title":"Proc Int Soc Opt Photon Multimedia Comput Netw"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2007.27"},{"key":"ref39","first-page":"99","article-title":"Peer-to-peer architecture case study: Gnutella network","author":"ripeanu","year":"2001","journal-title":"Proc 1st Int Conf Peer-to-Peer Comput"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-003-0088-1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.26417\/ejfe.v1i2.p29-32"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800290"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2018.8400278"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"ref20","first-page":"1","article-title":"Intel SGX explained","volume":"2016","author":"costan","year":"2016","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2967218"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3390566.3391665"},{"key":"ref28","article-title":"Consensus in the age of blockchains","author":"bano","year":"2017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2018.00034"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483574"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09751-0_29"},{"key":"ref12","first-page":"279","article-title":"Enhancing bitcoin security and performance with strong consistency via collective signing","author":"kogias","year":"2016","journal-title":"Proc 25th USENIX Secur Symp"},{"key":"ref15","article-title":"Scaling nakamoto consensus to thousands of transactions per second","author":"li","year":"2018"},{"key":"ref14","article-title":"EOS: An architectural, performance, and economic analysis","author":"xu","year":"2018"},{"key":"ref97","article-title":"CCF: A framework for building confidential verifiable replicated services","volume":"1","author":"russinovich","year":"2019"},{"key":"ref96","first-page":"1427","article-title":"REM: Resource-efficient mining for blockchains","author":"zhang","year":"2017","journal-title":"Proc 26th USENIX Secur Symp"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-005-3368-5"},{"key":"ref99","article-title":"State machine replication in the libra blockchain","volume":"1","author":"baudet","year":"2019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2007.27"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.221"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48254-7_25"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.56"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_28"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85257-5_1"},{"key":"ref93","author":"chappell","year":"2010","journal-title":"Wireshark Network Analysis The Offcial Wireshark Certified Network Analyst Study Guide"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018477"},{"key":"ref95","first-page":"374","article-title":"Validity threats in empirical software engineering research: An initial survey","author":"feldt","year":"2010","journal-title":"Proc Int Conf Softw Eng Knowl Eng"},{"key":"ref94","author":"sanders","year":"2017","journal-title":"Practical Packet Analysis Using Wireshark to Solve Real-World Network Problems"},{"key":"ref91","year":"2019"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.171"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/1466443.1466448"},{"key":"ref86","year":"2019"},{"key":"ref85","article-title":"Blockchain challenges and opportunities: A survey","volume":"1","author":"zheng","year":"2016"},{"key":"ref88","year":"2019"},{"key":"ref87","year":"2019"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17348-6_7"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNS.2015.7292385"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2008.36"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/1142351.1142395"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159945"},{"key":"ref79","article-title":"A survey of solutions to the sybil attack","volume":"7","author":"levine","year":"2006"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.328"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834100"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_7"},{"key":"ref77","year":"2019"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3529113.3529134"},{"key":"ref2","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref1","article-title":"Bitcoin: A peer-to-peer electronic cash system","volume":"1","author":"nakamoto","year":"2008","journal-title":"Decentralized Bus Rev"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00027"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/C-CODE.2019.8680982"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844156"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.231"},{"key":"ref68","article-title":"Efficient and DoS-resistant consensus for permissioned blockchains","volume":"153","author":"chen","year":"2021","journal-title":"Perform Eval"},{"key":"ref67","article-title":"GEEC: Scalable, efficient, and consistent consensus for blockchains","author":"chen","year":"2018"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3214292.3214301"},{"key":"ref64","article-title":"Analysis of Intel's ivy bridge digital random number generator","author":"hamburg","year":"2012"},{"key":"ref63","article-title":"SGX secure enclaves in practice","volume":"1","author":"aumasson","year":"2016"},{"key":"ref66","first-page":"282","article-title":"On security analysis of proof-of-elapsed-time (PoET)","author":"chen","year":"2017","journal-title":"Proc Int Symp Stabilization Safety Secur Distrib Syst"},{"key":"ref65","article-title":"Leveraging Intel SGX to create a nondisclosure cryptographic library","author":"mofrad","year":"2017"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2948618.2954331"},{"key":"ref62","year":"2019"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502018"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/4629387\/09826458.pdf?arnumber=9826458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,13]],"date-time":"2023-06-13T21:19:45Z","timestamp":1686691185000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9826458\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":99,"URL":"https:\/\/doi.org\/10.1109\/tsc.2022.3189667","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}