{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:34:35Z","timestamp":1775018075517,"version":"3.50.1"},"reference-count":22,"publisher":"Pleiades Publishing Ltd","issue":"5","license":[{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1134\/s0361768823050043","type":"journal-article","created":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T04:55:24Z","timestamp":1696827324000},"page":"448-454","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Automated Verification of Multi-Party Agreements and Scheduling of Sending Messages in Distributed Ledger Systems"],"prefix":"10.1134","volume":"49","author":[{"given":"I. A.","family":"Fedotov","sequence":"first","affiliation":[]},{"given":"A. S.","family":"Khritankov","sequence":"additional","affiliation":[]},{"given":"M. D.","family":"Obidare","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2023,10,9]]},"reference":[{"key":"3759_CR1","doi-asserted-by":"publisher","first-page":"45360","DOI":"10.1109\/ACCESS.2019.2902501","volume":"7","author":"J.A. Jaoude","year":"2019","unstructured":"Jaoude, J.A. and Saade, R.G., Blockchain applications \u2013 usage in different domains, IEEE Access, 2019, vol. 7, pp. 45360\u201345381.","journal-title":"IEEE Access"},{"key":"3759_CR2","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2018.8400278","volume-title":"Comparative analysis of blockchain consensus algorithms","author":"L. Bach","year":"2018","unstructured":"Bach, L., Branko, M., and Zagar, M., Comparative analysis of blockchain consensus algorithms, MIPRO, 2018, pp. 1545\u20131550."},{"key":"3759_CR3","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538","volume-title":"Hyperledger fabric: a distributed operating system for permissioned blockchains","author":"E. Androulaki","year":"2018","unstructured":"Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., and Manevich, Y., Hyperledger fabric: a distributed operating system for permissioned blockchains, EuroSys, 2018, pp. 1\u201315."},{"key":"3759_CR4","doi-asserted-by":"crossref","unstructured":"Saad, M., Spaulding, J., Njilla, L., Kamhoua, C., Shetty, S., Nyang, D., and Mohaisen, A., Exploring the attack surface of blockchain: a systematic overview, IEEE, 2020, vol. 22, no. 3, pp. 1977\u20132008.","DOI":"10.1109\/COMST.2020.2975999"},{"key":"3759_CR5","volume-title":"Ripping the fabric: attacks and mitigations on hyperledger fabric","author":"A. Dabholkar","year":"2019","unstructured":"Dabholkar, A. and Saraswat, V., Ripping the fabric: attacks and mitigations on hyperledger fabric, Springer, 2019, pp. 300\u2013311."},{"key":"3759_CR6","volume-title":"Principles of model checking","author":"C. Baier","year":"2008","unstructured":"Baier, C. and Katoen, J., Principles of model checking, MIT press, 2008, pp. 300\u2013311."},{"key":"3759_CR7","volume-title":"Statistical model checking: an overview","author":"A. Legay","year":"2010","unstructured":"Legay, A., Delahaye, B., and Bensalem, S., Statistical model checking: an overview, Springer, 2010, pp. 122\u2013135."},{"key":"3759_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.17587\/prin.11.3-13","volume":"11","author":"I.A. Fedotov","year":"2020","unstructured":"Fedotov, I.A. and Khritankov, A.S., Systematic review of automatic verification of smart-contracts, Programmnaya Ingeneria, 2020, vol. 11, no. 1, pp. 3\u201313.","journal-title":"Programmnaya Ingeneria"},{"key":"3759_CR9","first-page":"1","volume":"28","author":"G. Agha","year":"2018","unstructured":"Agha, G. and Palmskog, K., A survey of statistical model checking, ACM Trans, 2018, vol. 28, no. 1, pp.\u00a01\u201339.","journal-title":"ACM Trans"},{"key":"3759_CR10","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.342.6","volume-title":"Statistical model checking of common attack scenarios on blockchain","author":"I. Fedotov","year":"2021","unstructured":"Fedotov, I. and Khritankov, A., Statistical model checking of common attack scenarios on blockchain, EPTCS, 2021, pp. 65\u201377."},{"key":"3759_CR11","volume-title":"Smart contract modeling and verification techniques: a survey","author":"A. Imeri","year":"2020","unstructured":"Imeri, A., Agoulmine, N., and Khadraoui, D., Smart contract modeling and verification techniques: a survey, ADVANCE, 2020, pp. 1\u20138."},{"key":"3759_CR12","doi-asserted-by":"crossref","unstructured":"Fedotov I., Khritankov A., and Barger A. Towards automated verification of multi-party consensus protocols, arXiv preprint, 2021.","DOI":"10.1145\/3520084.3520100"},{"key":"3759_CR13","volume-title":"An overview of blockchain technology: architecture, consensus, and future trends","author":"Z. Zheng","year":"2017","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen, X., and Wang, H., An overview of blockchain technology: architecture, consensus, and future trends, IEEE, 2017, pp. 557\u2013564."},{"key":"3759_CR14","unstructured":"Cachin, C., Architecture of the hyperledger blockchain fabric, Workshop on distributed cryptocurrencies and consensus ledgers, 2016, vol. 310, no. 4, pp. 1\u20134."},{"key":"3759_CR15","unstructured":"Duda, J., Exploiting statistical dependencies of time series with hierarchical correlation reconstruction, CoRR, 2018, abs\/1807.04119, pp. 11\u201324."},{"key":"3759_CR16","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10994-015-5486-z","volume":"100","author":"G. Corani","year":"2015","unstructured":"Corani, G. and Benavoli, A., A bayesian approach for comparing cross-validated algorithms on multiple data sets, Mach. Learn, 2015, vol. 100, no. 2-3, pp. 285\u2013304.","journal-title":"Mach. Learn"},{"key":"3759_CR17","volume-title":"Statistical model checking","author":"A. Legay","year":"2016","unstructured":"Legay, A., Statistical model checking, Springer, 2016, vol. 10000, pp. 478\u2013504."},{"key":"3759_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45657-0_17","volume-title":"Probabilistic verification of discrete event systems using acceptance sampling","author":"H. Younes","year":"2002","unstructured":"Younes, H. and Simmons, R., Probabilistic verification of discrete event systems using acceptance sampling, Springer, 2002, vol. 2404, pp. 223\u2013235."},{"key":"3759_CR19","volume-title":"PRISM 4.0: verification of probabilistic real-time systems","author":"M. Kwiatkowska","year":"2011","unstructured":"Kwiatkowska, M., Norman, G., and Parker, D., PRISM 4.0: verification of probabilistic real-time systems, Springer, 2011, pp. 585\u2013591."},{"key":"3759_CR20","unstructured":"Fedotov, I. and Morounfoluwa, D.O., \nhttps:\/\/github.com\/1vanan\/consensus-analyzer (accessed February 25, 2022)."},{"key":"3759_CR21","unstructured":"Fedotov, I. and Morounfoluwa, D.O., \nhttps:\/\/github.com\/1vanan\/consensus-scheduler (accessed February 25, 2022)."},{"key":"3759_CR22","unstructured":"Gronau Q., Akash Raj N., Wagenmakers E. Informed Bayesian inference for the A\/B Test, arXiv preprint, 2019."}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768823050043.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0361768823050043","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768823050043.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:49:50Z","timestamp":1775011790000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0361768823050043"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10]]},"references-count":22,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["3759"],"URL":"https:\/\/doi.org\/10.1134\/s0361768823050043","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10]]},"assertion":[{"value":"9 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}