{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:02:46Z","timestamp":1743094966492,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242954"},{"type":"electronic","value":"9783030242961"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24296-1_49","type":"book-chapter","created":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T21:06:36Z","timestamp":1561755996000},"page":"606-617","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Blockchain Network Threats: The Case of PoW and Ethereum"],"prefix":"10.1007","author":[{"given":"Artem","family":"Shurov","sequence":"first","affiliation":[]},{"given":"Daniil","family":"Malevanniy","sequence":"additional","affiliation":[]},{"given":"Oleg","family":"Iakushkin","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Korkhov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"49_CR1","doi-asserted-by":"crossref","unstructured":"Pilkington, M.: Blockchain Technology: Principles and Applications. Research Handbook on Digital Transformations, pp. 225\u2013253. Edward Elgar Publishing, Northampton (2017)","DOI":"10.4337\/9781784717766.00019"},{"key":"49_CR2","doi-asserted-by":"crossref","unstructured":"Decker, C., Wattenhofer, R.: Information propagation in the Bitcoin network. In: IEEE P2P 2013 Proceedings","DOI":"10.1109\/P2P.2013.6688704"},{"key":"49_CR3","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"49_CR4","unstructured":"Natoli, C., Gramoli, V.: The Balance Attack Against Proof-Of-Work Blockchains: The R3 Testbed as an Example (2016)"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking Bitcoin: Routing Attacks on Cryptocurrencies (2017)","DOI":"10.1109\/SP.2017.29"},{"key":"49_CR6","unstructured":"Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse Attacks on Bitcoin\u2019s Peer-to-Peer Network (2015)"},{"key":"49_CR7","doi-asserted-by":"crossref","unstructured":"Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack (2015)","DOI":"10.1109\/EuroSP.2016.32"},{"key":"49_CR8","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.O., W\u00fcst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the Security and Performance of Proof of Work Blockchains (2016)","DOI":"10.1145\/2976749.2978341"},{"issue":"2","key":"49_CR9","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s12083-015-0347-x","volume":"9","author":"D Kraft","year":"2015","unstructured":"Kraft, D.: Difficulty control for blockchain-based consensus systems. Peer-To-Peer Netw. Appl. 9(2), 397\u2013413 (2015)","journal-title":"Peer-To-Peer Netw. Appl."},{"key":"49_CR10","doi-asserted-by":"crossref","unstructured":"Sompolinsky, Y., Zohar, A.: Secure High-Rate Transaction Processing in Bitcoin (2015)","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"49_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-662-54970-4_30","volume-title":"Financial Cryptography and Data Security","author":"A Sapirshtein","year":"2017","unstructured":"Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 515\u2013532. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54970-4_30"},{"key":"49_CR12","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-662-45472-5_28","volume-title":"FC 2014","author":"I Eyal","year":"2014","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436\u2013454. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_28"},{"key":"49_CR13","doi-asserted-by":"crossref","unstructured":"Ritz, F., Zugenmaier, A.: The impact of uncle rewards on selfish mining in Ethereum. In: 2018 IEEE European Symposium on Security and Privacy Workshops","DOI":"10.1109\/EuroSPW.2018.00013"},{"key":"49_CR14","doi-asserted-by":"crossref","unstructured":"Werner, S.M., Pritz, P.J., Zamyatin, A., Knottenbelt, W.J.: Uncle traps: harvesting rewards in a queue-based Ethereum mining pool (2019)","DOI":"10.1145\/3306309.3306328"},{"key":"49_CR15","unstructured":"A Next-Generation Smart Contract and Decentralized Application Platform. https:\/\/github.com\/Ethereum\/wiki\/wiki\/White-Paper"},{"key":"49_CR16","unstructured":"\u201cblockchain\u201d. https:\/\/www.blockchain.com\/en\/"},{"key":"49_CR17","doi-asserted-by":"crossref","unstructured":"Beikverdi, A., Song, J.: Trend of centralization in Bitcoin\u2019s distributed network. In: 2015 IEEE\/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","DOI":"10.1109\/SNPD.2015.7176229"},{"key":"49_CR18","doi-asserted-by":"crossref","unstructured":"Kim, S.K., Ma, Z., Murali, S., Mason, J., Miller, A., Bailey, M.: Measuring Ethereum Network Peers (2018)","DOI":"10.1145\/3278532.3278542"},{"key":"49_CR19","doi-asserted-by":"crossref","unstructured":"Malevanniy, D., Iakushkin, O., Korkhov, V.: Simulation of distributed applications based on containerization technology. In: Misra, S., et al. (eds.) ICCSA 2019. LNCS, vol. 11620, pp. 587\u2013595. Springer, Cham (2019)","DOI":"10.1007\/978-3-030-24296-1_47"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24296-1_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T09:34:54Z","timestamp":1575192894000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24296-1_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242954","9783030242961"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24296-1_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}