{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:44:19Z","timestamp":1730342659880,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.23919\/cisti.2019.8760885","type":"proceedings-article","created":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T00:40:48Z","timestamp":1563237648000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Performance of Hash Functions in Blockchain Applied to IoT Devices"],"prefix":"10.23919","author":[{"given":"Jessica","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Mario","family":"Antunes","sequence":"additional","affiliation":[]},{"given":"Mykyta","family":"Zhygulskyy","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Frazao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/AIEEE.2018.8592253"},{"key":"ref11","article-title":"Preventing the 51%-Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin","author":"martijn","year":"2015","journal-title":"Twente Student Conference on IT"},{"key":"ref12","first-page":"731","article-title":"Classification of security risks in the IoT environment","author":"ivan","year":"2015","journal-title":"Proc Ann DAAAM"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2842685"},{"journal-title":"Blockchain and the Internet of Things The IoT Blockchain Opportunity and Challenge","year":"2018","author":"gowri","key":"ref14"},{"key":"ref15","article-title":"IoT and Blockchain Convergence: Benefits and Challenges","author":"banafa","year":"2017","journal-title":"Internet of the Things"},{"key":"ref16","first-page":"461","article-title":"Cryptographic Hash Functions: A Review","volume":"9","author":"rajeev","year":"2012","journal-title":"International Journal of Computer Science issues (IJCSI)"},{"journal-title":"Cryptography and Network Security 7th Edition","year":"2006","author":"stallings","key":"ref4"},{"key":"ref3","article-title":"A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications","author":"schollmeier","year":"2001","journal-title":"Proceedings First International Conference on Peer-to-Peer Computing"},{"journal-title":"Digitale Transformation","year":"2016","author":"olleros","key":"ref6"},{"key":"ref5","article-title":"Blockchain challenges and opportunities: A survey.","author":"zheng","year":"2016","journal-title":"Working Pap"},{"journal-title":"BP Statistical Review of World Energy 2018","year":"2018","author":"dudley","key":"ref8"},{"key":"ref7","article-title":"Understanding Blockchain Consensus Models","author":"arati","year":"2017","journal-title":"White Paper"},{"key":"ref2","first-page":"153","article-title":"BLOCKCHAIN-THE GATEWAY TO TRUSTFREE CRYPTOGRAPHIC TRANSACTIONS","author":"beck","year":"2016","journal-title":"Research Paper"},{"journal-title":"Blockchain for Dummies","year":"0","author":"gupta","key":"ref1"},{"journal-title":"Digiconomist","article-title":"Bitcoin Energy Consumption Index-Digiconomist","year":"2018","key":"ref9"}],"event":{"name":"2019 14th Iberian Conference on Information Systems and Technologies (CISTI)","start":{"date-parts":[[2019,6,19]]},"location":"Coimbra, Portugal","end":{"date-parts":[[2019,6,22]]}},"container-title":["2019 14th Iberian Conference on Information Systems and Technologies (CISTI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8755443\/8760589\/08760885.pdf?arnumber=8760885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,6]],"date-time":"2020-02-06T17:46:37Z","timestamp":1581011197000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8760885\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/cisti.2019.8760885","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}