{"id":"https://openalex.org/W4413077015","doi":"https://doi.org/10.1007/s10207-025-01100-5","title":"StorjChain: overcoming the blockchain trilemma via decentralized storage and erasure-coded sharding","display_name":"StorjChain: overcoming the blockchain trilemma via decentralized storage and erasure-coded sharding","publication_year":2025,"publication_date":"2025-07-17","ids":{"openalex":"https://openalex.org/W4413077015","doi":"https://doi.org/10.1007/s10207-025-01100-5"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-025-01100-5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-025-01100-5","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086962915","display_name":"Saha Reno","orcid":"https://orcid.org/0000-0003-1897-9002"},"institutions":[{"id":"https://openalex.org/I135564639","display_name":"Ahsanullah University of Science and Technology","ror":"https://ror.org/04wfbp123","country_code":"BD","type":"education","lineage":["https://openalex.org/I135564639"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Saha Reno","raw_affiliation_strings":["Department of CSE, Ahsanullah University of Science and Technology (AUST), Dhaka, 1208, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Ahsanullah University of Science and Technology (AUST), Dhaka, 1208, Bangladesh","institution_ids":["https://openalex.org/I135564639"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080237062","display_name":"Koushik Roy","orcid":"https://orcid.org/0000-0002-9525-7196"},"institutions":[{"id":"https://openalex.org/I102782458","display_name":"Chittagong University of Engineering & Technology","ror":"https://ror.org/052qsay17","country_code":"BD","type":"education","lineage":["https://openalex.org/I102782458"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Koushik Roy","raw_affiliation_strings":["Department of CSE, Chittagong University of Engineering and Technology (CUET), Chattogram, 4349, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Chittagong University of Engineering and Technology (CUET), Chattogram, 4349, Bangladesh","institution_ids":["https://openalex.org/I102782458"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5086962915"],"corresponding_institution_ids":["https://openalex.org/I135564639"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":null,"fwci":3.1665,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.9278367,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"24","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9344000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9186000227928162,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9537754058837891},{"id":"https://openalex.org/keywords/erasure","display_name":"Erasure","score":0.8346681594848633},{"id":"https://openalex.org/keywords/trilemma","display_name":"Trilemma","score":0.8261761665344238},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7386544942855835},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5430397987365723},{"id":"https://openalex.org/keywords/erasure-code","display_name":"Erasure code","score":0.46828457713127136},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46490466594696045},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.2073170244693756},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.13339394330978394},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08880367875099182},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.08156484365463257}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9537754058837891},{"id":"https://openalex.org/C2778790127","wikidata":"https://www.wikidata.org/wiki/Q484885","display_name":"Erasure","level":2,"score":0.8346681594848633},{"id":"https://openalex.org/C2780676692","wikidata":"https://www.wikidata.org/wiki/Q1073549","display_name":"Trilemma","level":3,"score":0.8261761665344238},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7386544942855835},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5430397987365723},{"id":"https://openalex.org/C137529215","wikidata":"https://www.wikidata.org/wiki/Q5385031","display_name":"Erasure code","level":3,"score":0.46828457713127136},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46490466594696045},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.2073170244693756},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.13339394330978394},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08880367875099182},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.08156484365463257},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C2776988154","wikidata":"https://www.wikidata.org/wiki/Q66100","display_name":"Exchange rate","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-025-01100-5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10207-025-01100-5","pdf_url":null,"source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W3085903699","https://openalex.org/W4384823749","https://openalex.org/W4390655980","https://openalex.org/W4391811663","https://openalex.org/W4391845290","https://openalex.org/W4394910903","https://openalex.org/W4396844112","https://openalex.org/W4396949448","https://openalex.org/W4399074950","https://openalex.org/W4399117280","https://openalex.org/W4399452211","https://openalex.org/W4400883790","https://openalex.org/W4401508175","https://openalex.org/W4401508686","https://openalex.org/W4402673502","https://openalex.org/W4403135627","https://openalex.org/W4403299942","https://openalex.org/W4404102264","https://openalex.org/W4404180513","https://openalex.org/W4404469365","https://openalex.org/W4404627707","https://openalex.org/W4406728382","https://openalex.org/W4411072261"],"related_works":["https://openalex.org/W4367021266","https://openalex.org/W2982181605","https://openalex.org/W2130518071","https://openalex.org/W2137028263","https://openalex.org/W2115768470","https://openalex.org/W1694938350","https://openalex.org/W2744779861","https://openalex.org/W3184492641","https://openalex.org/W2031335939","https://openalex.org/W2951344115"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
