{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T08:55:12Z","timestamp":1769244912600,"version":"3.49.0"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T00:00:00Z","timestamp":1552262400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Federal State of Salzburg"},{"name":"Austrian Research Promotion Agency","award":["865082"],"award-info":[{"award-number":["865082"]}]},{"name":"Salzburg AG"},{"name":"Salzburg Netz GmbH"},{"name":"Verbund AG"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13635-019-0085-3","type":"journal-article","created":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T17:13:43Z","timestamp":1552497223000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":83,"title":["Implementing a blockchain from scratch: why, how, and what we learned"],"prefix":"10.1186","volume":"2019","author":[{"given":"Fabian","family":"Knirsch","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3374-1636","authenticated-orcid":false,"given":"Andreas","family":"Unterweger","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dominik","family":"Engel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,3,11]]},"reference":[{"key":"85_CR1","unstructured":"S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System. Technical report (2008). https:\/\/bitcoin.org\/bitcoin.pdf ."},{"issue":"3","key":"85_CR2","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/COMST.2016.2535718","volume":"18","author":"F. Tschorsch","year":"2016","unstructured":"F. Tschorsch, B. Scheuermann, Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor.18(3), 2084\u20132123 (2016).","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"85_CR3","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K. Christidis","year":"2016","unstructured":"K. Christidis, M. Devetsikiotis, Blockchains and smart contracts for the Internet of Things. IEEE Access. 4:, 2292\u20132303 (2016).","journal-title":"IEEE Access"},{"key":"85_CR4","first-page":"85","volume-title":"Sustainable Cloud and Energy Services: Principles and Practices. Chap. 4","author":"F. Knirsch","year":"2017","unstructured":"F. Knirsch, A. Unterweger, G. Eibl, D. Engel, in Sustainable Cloud and Energy Services: Principles and Practices. Chap. 4, ed. by W. Rivera. Privacy-Preserving Smart Grid Tariff Decisions with Blockchain-Based Smart Contracts (SpringerCham, 2017), pp. 85\u2013116."},{"issue":"1","key":"85_CR5","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s00450-017-0348-5","volume":"33","author":"F. Knirsch","year":"2018","unstructured":"F. Knirsch, A. Unterweger, D. Engel, Privacy-preserving blockchain-based electric vehicle charging with dynamic tariff decisions. J. Comput. Sci. Res. Dev. (CSRD).33(1), 71\u201379 (2018).","journal-title":"J. Comput. Sci. Res. Dev. (CSRD)."},{"key":"85_CR6","doi-asserted-by":"publisher","first-page":"2164","DOI":"10.1109\/CCTA.2017.8062773","volume-title":"2017 IEEE Conference on Control Technology and Applications (CCTA)","author":"E. Munsing","year":"2017","unstructured":"E. Munsing, J. Mather, S. Moura, in 2017 IEEE Conference on Control Technology and Applications (CCTA). Blockchains for decentralized optimization of energy resources in microgrid networks (IEEEMauna Lani, 2017), pp. 2164\u20132171."},{"issue":"1","key":"85_CR7","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s00450-017-0360-9","volume":"33","author":"E. Mengelkamp","year":"2018","unstructured":"E. Mengelkamp, B. Notheisen, C. Beer, D. Dauer, C. Weinhardt, A blockchain-based smart grid: towards sustainable local energy markets. Comput. Sci. Res. Dev.33(1), 207\u2013214 (2018).","journal-title":"Comput. Sci. Res. Dev."},{"key":"85_CR8","unstructured":"G. Greenspan, MultiChain Private Blockchain - White Paper. Technical report, Coin Sciences Ltd (2015). http:\/\/www.multichain.com\/download\/MultiChain-White-Paper.pdf ."},{"key":"85_CR9","unstructured":"G. Wood, Ethereum: A Secure Decentralised Generalised Transaction Ledger. Technical report, Ethereum (2017). arXiv:1011.1669v3. https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf ."},{"key":"85_CR10","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-662-53357-4_8","volume-title":"International Conference on Financial Cryptography and Data Security","author":"K. Croman","year":"2016","unstructured":"K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba, A. Miller, P. Saxena, E. Shi, E. G\u00fcn Sirer, D. Song, R. Wattenhofer, in International Conference on Financial Cryptography and Data Security. On Scaling Decentralized Blockchains (SpringerChrist Church, 2016), pp. 106\u2013125."},{"key":"85_CR11","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1007\/978-3-662-45472-5_28","volume-title":"Financial Cryptography and Data Security, 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers","author":"I. Eyal","year":"2014","unstructured":"I. Eyal, E. G. Sirer, in Financial Cryptography and Data Security, 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers, ed. by N. Christin, R. Safavi-Naini. Majority Is Not Enough: Bitcoin Mining Is Vulnerable (SpringerBerlin Heidelberg, 2014), pp. 436\u2013454. arXiv:1311.0243."},{"key":"85_CR12","first-page":"1271","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"K. Nikitin","year":"2017","unstructured":"K. Nikitin, E. Kokoris-Kogias, P. Jovanovic, L. Gasser, N. Gailly, I. Khoffi, J. Cappos, B. Ford, in 26th USENIX Security Symposium (USENIX Security 17). CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds (USENIX AssociationVancouver, 2017), pp. 1271\u20131287."},{"key":"85_CR13","first-page":"459","volume-title":"Proceedings \u2013 IEEE Symposium on Security and Privacy","author":"E. Ben-Sasson","year":"2014","unstructured":"E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, M. Virza, in Proceedings \u2013 IEEE Symposium on Security and Privacy. Zerocash: Decentralized Anonymous Payments from Bitcoin (IEEESan Jose, 2014), pp. 459\u2013474."},{"key":"85_CR14","volume-title":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","author":"A. Unterweger","year":"2018","unstructured":"A. Unterweger, F. Knirsch, C. Leixnering, D. Engel, in 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). Lessons Learned from Implementing a Privacy-Preserving Smart Contract in Ethereum (IEEEParis, 2018)."},{"issue":"3","key":"85_CR15","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"L. Lamport, R. Shostak, M. Pease, The Byzantine Generals Problem. ACM Trans. Program. Lang. Syst.4(3), 382\u2013401 (1982). arXiv:1011.1669v3.","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"85_CR16","first-page":"42","volume-title":"Proceedings of the Twenty-fifth Annual ACM Symposium on Theory of Computing","author":"R. Canetti","year":"1993","unstructured":"R. Canetti, T. Rabin, in Proceedings of the Twenty-fifth Annual ACM Symposium on Theory of Computing. Fast Asynchronous Byzantine Agreement with Optimal Resilience 1 Introduction (ACMSan Diego, 1993), pp. 42\u201351."},{"key":"85_CR17","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-319-39028-4_9","volume-title":"Open Problems in Network Security","author":"M. Vukoli\u0107","year":"2016","unstructured":"M. Vukoli\u0107, in Open Problems in Network Security. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication (SpringerCham, 2016), pp. 112\u2013125."},{"key":"85_CR18","doi-asserted-by":"publisher","DOI":"10.1201\/9781420010756","volume-title":"Introduction to Modern Cryptography, 1st edn","author":"J. Katz","year":"2007","unstructured":"J. Katz, Y. Lindell, Introduction to Modern Cryptography, 1st edn (Chapman and Hall\/CRC, New York, 2007)."},{"key":"85_CR19","unstructured":"I. Abraham, D. Malkhi, K. Nayak, L. Ren, A. Spiegelman, in The 21st International Conference on Principles of Distributed Systems. Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus (Lisbon, 2017), pp. 1\u201317. http:\/\/arxiv.org\/abs\/1612.02916. Accessed 24 Jan 2019."},{"issue":"3","key":"85_CR20","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1016\/j.enpol.2007.11.007","volume":"36","author":"J. A. Lesser","year":"2008","unstructured":"J. A. Lesser, X. Su, Design of an economically efficient feed-in tariff structure for renewable energy development. Energy Pol.36(3), 981\u2013990 (2008).","journal-title":"Energy Pol."},{"key":"85_CR21","unstructured":"L. Krampe, M. W\u00fcnsch, Schlussbericht Mieterstrom \u2013 Rechtliche Einordnung, Organisationsformen, Potenziale und Wirtschaftlichkeit von Mieterstrommodellen (MSM). Technical report (2017). https: \/\/www.bmwi.de\/Redaktion\/DE\/Publikationen\/Studien\/schlussbericht-mieterstrom.pdf?__blob=publicationFile&v=10 ."},{"key":"85_CR22","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1016\/j.apenergy.2017.06.054","volume":"210","author":"E. Mengelkamp","year":"2018","unstructured":"E. Mengelkamp, J. G\u00e4rttner, K. Rock, S. Kessler, L. Orsini, C. Weinhardt, Designing microgrid energy markets: A case study: The Brooklyn Microgrid. Appl. Energy.210:, 870\u2013880 (2018).","journal-title":"Appl. Energy."},{"key":"85_CR23","unstructured":"Bundeskanzleramt, Kleine \u00d6kostromnovelle \u2013Erl\u00e4uterungen (2017). https:\/\/www.ris.bka.gv.at\/Dokumente\/RegV\/REGV_COO_2026_100_2_1346954\/COO_2026_100_2_1347360.pdf . Accessed 24 Jan 2019."},{"key":"85_CR24","unstructured":"Nationalrat, \u00c4nderung des \u00d6kostromgesetzes 2012, des Elektrizit\u00e4tswirtschafts- und -organisationsgesetzes 2010, des Gaswirtschaftsgesetzes 2011, des KWK-Punkte-Gesetzes und des Energie-Control-Gesetzes sowie Bundesgesetz, mit dem zus\u00e4tzliche Mittel aus von der..BGBl. I Nr. 108\/2017 (NR: GP XXV RV 1519 AB 1527 S. 190. BR: 9831 AB 9873 S. 870.) (2017). https:\/\/www.ris.bka.gv.at\/eli\/bgbl\/I\/2017\/108 . Accessed 24 Jan 2019."},{"issue":"49","key":"85_CR25","first-page":"2532","volume":"2017","author":"Bundestag","year":"2017","unstructured":"Bundestag, Gesetz zur F\u00f6rderung von Mieterstrom und zur \u00c4nderung weiterer Vorschriften des Erneuerbare-Energien-Gesetzes. Bundesgesetzblatt Teil I. 2017(49), 2532\u20132539 (2017).","journal-title":"Bundesgesetzblatt Teil I"},{"key":"85_CR26","unstructured":"Nationalrat, Bundesgesetz, mit dem die Organisation auf dem Gebiet der Elektrizit\u00e4tswirtschaft neu geregelt wird (Elektrizit\u00e4tswirtschafts- und -organisationsgesetz 2010 \u2013 ElWOG 2010). BGBl. I Nr. 110\/2010 (NR: GP XXIV RV 994 AB 997 S. 86. BR: 8420 AB 8421 S. 791.) (2010). https:\/\/www.ris.bka.gv.at\/eli\/bgbl\/I\/2010\/110 . Accessed 24 Jan 2019."},{"key":"85_CR27","unstructured":"Nationalrat, Bundesrecht konsolidiert: Gesamte Rechtsvorschrift f\u00fcr Elektrizit\u00e4tswirtschafts- und -organisationsgesetz 2010, Fassung vom 14.02.2018 (2018). https:\/\/www.ris.bka.gv.at\/GeltendeFassung.wxe?Abfrage=Bundesnormen&Gesetzesnummer=20007045 . Accessed 24 Jan 2019."},{"issue":"33","key":"85_CR28","first-page":"1066","volume":"2014","author":"Bundestag","year":"2014","unstructured":"Bundestag, Gesetz zur grundlegenden Reform des Erneuerbare-Energien-Gesetzes und zur \u00c4nderung weiterer Bestimmungen des Energiewirtschaftsrechts. Bundesgesetzblatt Teil I. 2014(33), 1066\u20131132 (2014).","journal-title":"Bundesgesetzblatt Teil I"},{"key":"85_CR29","unstructured":"Bundestag, Erneuerbare-Energien-Gesetz vom 21. Juli 2014 (BGBl. I S. 1066), das zuletzt durch Artikel 1 des Gesetzes vom 17. Juli 2017 (BGBl. I S. 2532) ge\u00e4ndert worden ist (2017). https:\/\/www.gesetze-im-internet.de\/eeg_2014\/BJNR106610014.html . Accessed 24 Jan 2019."},{"key":"85_CR30","doi-asserted-by":"crossref","unstructured":"K. W\u00fcst, A. Gervais, Do you need a Blockchain. https:\/\/eprint.iacr.org\/2017\/375.pdf .","DOI":"10.1109\/CVCBT.2018.00011"},{"key":"85_CR31","unstructured":"European Parliament and Council of the European Union, Directive 2009\/72\/EC of the European Parliament and of the Council of 13 July 2009 concerning common rules for the internal market in electricity and repealing Directive 2003\/54\/EC (2009). http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:32009L0072 . Accessed 24 Jan 2019."},{"key":"85_CR32","unstructured":"M. Hearn, Corda: A distributed ledger, Version 0.5. Technical report. Corda. Accessed September 2018 (2016). https:\/\/www.corda.net\/content\/corda-technical-whitepaper.pdf ."},{"issue":"5","key":"85_CR33","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1109\/TDSC.2016.2616861","volume":"15","author":"N. Zhumabekuly Aitzhan","year":"2016","unstructured":"N. Zhumabekuly Aitzhan, D. Svetinovic, Security and Privacy in Decentralized Energy Trading through Multi-signatures, Blockchain and Anonymous Messaging Streams. IEEE Trans. Dependable Secure Comput.15(5), 840\u2013852 (2016).","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"85_CR34","volume-title":"11th International Conference on the European Energy Market, EEM","author":"M. Mihaylov","year":"2014","unstructured":"M. Mihaylov, S. Jurado, N. Avellana, K. Van Moffaert, I. M. De Abril, A. Now\u00e9, in 11th International Conference on the European Energy Market, EEM. NRGcoin: Virtual currency for trading of renewable energy in smart grids (IEEEKrakow, 2014)."},{"key":"85_CR35","first-page":"101","volume-title":"Proceedings of the 3rd International Conference on Smart Grids and Green IT Systems","author":"M. Mihaylov","year":"2014","unstructured":"M. Mihaylov, S. Jurado, K. V. Moffaert, A. Now, in Proceedings of the 3rd International Conference on Smart Grids and Green IT Systems. NRG-X-Change - A Novel Mechanism for Trading of Renewable Energy in Smart Grids (SciTePressBarcelona, 2014), pp. 101\u2013106. arXiv:1011.1669v3."},{"key":"85_CR36","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.apenergy.2017.03.039","volume":"195","author":"J. J. Sikorski","year":"2017","unstructured":"J. J. Sikorski, J. Haughton, M. Kraft, Blockchain technology in the chemical industry: Machine-to-machine electricity market. Appl. Energy.195:, 234\u2013246 (2017).","journal-title":"Appl. Energy."},{"key":"85_CR37","first-page":"1","volume-title":"IEEE International Conference on Digital Ecosystems and Technologies","author":"D. Ilic","year":"2012","unstructured":"D. Ilic, P. G. Da Silva, S. Karnouskos, M. Griesemer, in IEEE International Conference on Digital Ecosystems and Technologies. An energy market for trading electricity in smart grid neighbourhoods (IEEEAtlanta, 2012), pp. 1\u20136."},{"issue":"3","key":"85_CR38","doi-asserted-by":"publisher","first-page":"1439","DOI":"10.1109\/TSG.2013.2284664","volume":"5","author":"Y. Wang","year":"2014","unstructured":"Y. Wang, W. Saad, Z. Han, H. V. Poor, T. Ba\u015far, A game-theoretic approach to energy trading in the smart grid. IEEE Trans. Smart Grid. 5(3), 1439\u20131450 (2014). http:\/\/arxiv.org\/abs\/1310.1814.","journal-title":"IEEE Trans. Smart Grid"},{"key":"85_CR39","first-page":"279","volume-title":"25th USENIX Security Symposium (USENIX 2016)","author":"E. Kokoris-Kogias","year":"2016","unstructured":"E. Kokoris-Kogias, P. Jovanovic, N. Gailly, I. Khoffi, L. Gasser, B. Ford, in 25th USENIX Security Symposium (USENIX 2016). Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing (USENIX AssociationAustin, 2016), pp. 279\u2013296."},{"key":"85_CR40","first-page":"14","volume-title":"Central European Conference In Finance And Economics","author":"J. Bucko","year":"2015","unstructured":"J. Bucko, D. Pa\u013eov\u00e1, M. Veja\u010dka, in Central European Conference In Finance And Economics. Security and Trust in Cryptocurrencies (Technical University of Ko\u0161iceHerlany, 2015), pp. 14\u201324."},{"key":"85_CR41","doi-asserted-by":"crossref","unstructured":"A. Unterweger, F. Knirsch, C. Leixnering, D. Engel, Update: Lessons Learned from Implementing a Privacy-Preserving Smart Contract in Ethereum. Technical report, Center for Secure Energy Informatics, Salzburg University of Applied Sciences, Austria (nov 2017). http:\/\/www.en-trust.at\/papers\/Unterweger18a-t.pdf .","DOI":"10.1109\/NTMS.2018.8328739"},{"key":"85_CR42","unstructured":"F. Knirsch, A. Unterweger, K. Karlsson, D. Engel, S. B. Wicker, Evaluation of a Blockchain-based Proof-of-Possession Implementation. Technical report, Center for Secure Energy Informatics, Salzburg University of Applied Sciences, Austria (2018). http:\/\/www.en-trust.at\/papers\/Knirsch18a-t.pdf ."},{"key":"85_CR43","first-page":"0","volume-title":"9th IFIP Conference on New Technologies, Mobility & Security (NTMS 2018)","author":"R. Han","year":"2018","unstructured":"R. Han, V. Gramoli, X. Xu, in 9th IFIP Conference on New Technologies, Mobility & Security (NTMS 2018). Evaluating Blockchains for IoT (IEEE\/IFIPParis, 2018), pp. 0\u20134."},{"key":"85_CR44","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1109\/SP.2016.55","volume-title":"2016 IEEE Symposium on Security and Privacy (SP)","author":"A. Kosba","year":"2016","unstructured":"A. Kosba, A. Miller, E. Shi, Z. Wen, C. Papamanthou, in 2016 IEEE Symposium on Security and Privacy (SP). Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts (IEEESan Jose, 2016), pp. 839\u2013858."},{"key":"85_CR45","unstructured":"D. Mazi\u00e8res, The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus. Technical report, Stellar Development Foundation (2016). https:\/\/www.stellar.org\/papers\/stellar-consensus-protocol.pdf ."},{"key":"85_CR46","unstructured":"E. Kokoris-Kogias, P. Jovanovic, L. Gasser, N. Gailly, E. Syta, B. Ford, OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding. IEEE Symp. Secur. Priv., 583\u2013598 (2018)."},{"issue":"4","key":"85_CR47","doi-asserted-by":"publisher","first-page":"1710","DOI":"10.1109\/TSG.2015.2504395","volume":"8","author":"D. Engel","year":"2017","unstructured":"D. Engel, G. Eibl, Wavelet-Based Multiresolution Smart Meter Privacy. IEEE Trans. Smart Grid. 8(4), 1710\u20131721 (2017).","journal-title":"IEEE Trans. Smart Grid"},{"issue":"8","key":"85_CR48","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1007\/s11623-011-0134-7","volume":"35","author":"D. Laupichler","year":"2011","unstructured":"D. Laupichler, S. Vollmer, H. Bast, M. Intemann, Das BSI-Schutzprofil: Anforderungen an den Datenschutz und die Datensicherheit f\u00fcr Smart Metering Systeme. Datenschutz und Datensicherheit - DuD. 35(8), 542\u2013546 (2011).","journal-title":"Datenschutz und Datensicherheit - DuD"},{"key":"85_CR49","volume-title":"The Art of Multiprocessor Programming, rev. 1st edn","author":"M. Herlihy","year":"2012","unstructured":"M. Herlihy, N. Shavit, The Art of Multiprocessor Programming, rev. 1st edn (Morgan Kaufmann, Waltham, 2012)."},{"key":"85_CR50","unstructured":"E. Barker, W. Barker, W. Burr, W. Polk, M. Smid, C. S. Division, NIST 800-57: Computer Security. NIST (2012). National Institute of Standards & Technology. https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-57-part-1\/revised\/archive\/2007-03-01 ."},{"key":"85_CR51","unstructured":"T. Dierks, E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (2008). https:\/\/tools.ietf.org\/html\/rfc5246 . Accessed 24 Jan 2019."},{"key":"85_CR52","doi-asserted-by":"crossref","unstructured":"C. Decker, R. Wattenhofer, Information propagation in the Bitcoin network Information Propagation in the Bitcoin Network (IEEE P2P 2013 Proceedings, Trento, 2013).","DOI":"10.1109\/P2P.2013.6688704"},{"key":"85_CR53","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-0-387-35568-9_18","volume-title":"Secure Information Networks: Communications and Multimedia Security IFIP TC6\/TC11 Joint Working Conference on Communications and Multimedia Security (CMS\u201999) September 20\u201321, 1999, Leuven, Belgium","author":"M. Jakobsson","year":"1999","unstructured":"M. Jakobsson, A. Juels, in Secure Information Networks: Communications and Multimedia Security IFIP TC6\/TC11 Joint Working Conference on Communications and Multimedia Security (CMS\u201999) September 20\u201321, 1999, Leuven, Belgium, ed. by B Preneel. Proofs of Work and Bread Pudding Protocols (Extended Abstract) (SpringerDordrecht, 1999), pp. 258\u2013272."},{"key":"85_CR54","first-page":"45","volume-title":"Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation. NSDI\u201916","author":"I. Eyal","year":"2016","unstructured":"I. Eyal, A. E. Gencer, E. G. Sirer, R. van Renesse, in Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation. NSDI\u201916. Bitcoin-NG: A Scalable Blockchain Protocol (USENIX AssociationSanta Clara, 2016), pp. 45\u201359. http:\/\/arxiv.org\/abs\/1510.02037."},{"key":"85_CR55","first-page":"154","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS\u201916","author":"M. Carlsten","year":"2016","unstructured":"M. Carlsten, H. Kalodner, S. M. Weinberg, A. Narayanan, in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS\u201916. On the Instability of Bitcoin Without the Block Reward (ACMVienna, 2016), pp. 154\u2013167."}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-019-0085-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13635-019-0085-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-019-0085-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T13:17:16Z","timestamp":1694697436000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-019-0085-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,11]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["85"],"URL":"https:\/\/doi.org\/10.1186\/s13635-019-0085-3","relation":{},"ISSN":["2510-523X"],"issn-type":[{"value":"2510-523X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,11]]},"assertion":[{"value":"7 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"2"}}