{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:03:23Z","timestamp":1743116603057,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030371098"},{"type":"electronic","value":"9783030371104"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-37110-4_3","type":"book-chapter","created":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T14:04:03Z","timestamp":1581602643000},"page":"31-44","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Collusion Attack from Hubs in The Blockchain Offline Channel Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6579-724X","authenticated-orcid":false,"given":"Subhasis","family":"Thakur","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5790-050X","authenticated-orcid":false,"given":"John G.","family":"Breslin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,14]]},"reference":[{"key":"3_CR1","unstructured":"Poon, J., Dryja, T.: The bitcoin lightning network: scalable off-chain instant payments. \nhttps:\/\/lightning.network\/lightning-network-paper.pdf"},{"key":"3_CR2","first-page":"1054","volume":"2016","author":"G Malavolta","year":"2016","unstructured":"Malavolta, G., Moreno-Sanchez, P., Kate, A., Maffei, M.: Silentwhispers: enforcing security and privacy in decentralized credit networks. IACR Cryptol. ePrint Arch. 2016, 1054 (2016)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Raiden Network. \nhttp:\/\/raiden.network\/\n\n. Accessed 1 Mar 2019","DOI":"10.1080\/0309877X.2019.1596232"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Aziz, H., Lachish, O., Paterson, M., Savani, R.: Power indices in spanning connectivity games. In: Goldberg, A.V., Zhou, Y. (eds.) Algorithmic Aspects in Information and Management, pp. 55\u201367. Springer, Berlin Heidelberg (2009)","DOI":"10.1007\/978-3-642-02158-9_7"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Bachrach, Y., Rosenschein, J.S.: Computing the Banzhaf power index in network flow games. In: AAMAS (2007)","DOI":"10.1145\/1329125.1329433"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Moreno-Sanchez, P., Kate, A., Maffei, M., Pecina, K.: Privacy preserving payments in credit networks: enabling trust with privacy in online marketplaces. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23284"},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Green, M., Miers, I.: Bolt: anonymous payment channels for decentralized currencies. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201917, pp. 473\u2013489. ACM, New York, NY, USA (2017). \nhttps:\/\/doi.org\/10.1145\/3133956.3134093","DOI":"10.1145\/3133956.3134093"},{"key":"3_CR8","unstructured":"Grunspan, C., P\u00e9rez-Marco, R.: Ant routing algorithm for the lightning network. CoRR (2018). \nArXiv:1807.00151"},{"key":"3_CR9","unstructured":"Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin\u2019s peer-to-peer network. In: Proceedings of the 24th USENIX Conference on Security Symposium, SEC\u201915, USENIX Association, pp. 129\u2013144. Berkeley, CA, USA (2015). \nhttp:\/\/dl.acm.org\/citation.cfm?id=2831143.2831152"},{"key":"3_CR10","doi-asserted-by":"publisher","unstructured":"Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev. 36(SI), 299\u2013314 (2002). \nhttps:\/\/doi.org\/10.1145\/844128.844156","DOI":"10.1145\/844128.844156"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Singh, A., Ngan, T.W., Druschel, P., Wallach, D.S.: Eclipse attacks on overlay networks: threats and defenses. In: 25th IEEE International Conference on Computer Communications on Proceedings IEEE INFOCOM 2006. pp. 1\u201312 (2006)","DOI":"10.1109\/INFOCOM.2006.231"},{"key":"3_CR12","doi-asserted-by":"publisher","unstructured":"Nayak, K., Kumar, S., Miller, A., Shi, E.: Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In: 2016 IEEE European Symposium on Security and Privacy (EuroS P), pp. 305\u2013320 (2016). \nhttps:\/\/doi.org\/10.1109\/EuroSP.2016.32","DOI":"10.1109\/EuroSP.2016.32"},{"key":"3_CR13","unstructured":"Bitcoin Lightning Network Graph. \nhttps:\/\/graph.lndexplorer.com\/api\/graph\n\n. Accessed 1 Mar 2019"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Werman, S., Zohar, A.: Avoiding deadlocks in payment channel networks. In: Garcia-Alfaro, J., Herrera-Joancomart\u00ed, J., Livraga, G., Rios, R. (eds.) Data Privacy Management, Cryptocurrencies and Blockchain Technology, pp. 175\u2013187. Springer International Publishing, Cham (2018)","DOI":"10.1007\/978-3-030-00305-0_13"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Czyzowicz, J., Kowalski, D., Markou, E., Pelc, A.: Searching for a black hole in tree networks. In: Proceedings of the 8th International Conference on Principles of Distributed Systems, pp. 67\u201380. OPODIS\u201904. Springer, Berlin, Heidelberg (2005)","DOI":"10.1007\/11516798_5"},{"key":"3_CR16","unstructured":"Czyzowicz, J., Kowalski, D.R., Markou, E., Pelc, A.: Complexity of searching for a black hole. Fundam. Inform. 71(2\u20133), 229\u2013242 (2006). \nhttp:\/\/content.iospress.com\/articles\/fundamenta-informaticae\/fi71-2-3-05"},{"issue":"1","key":"3_CR17","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s00453-006-1232-z","volume":"48","author":"S Dobrev","year":"2007","unstructured":"Dobrev, S., Flocchini, P., Prencipe, G., Santoro, N.: Mobile search for a black hole in an anonymous ring. Algorithmica 48(1), 67\u201390 (2007)","journal-title":"Algorithmica"}],"container-title":["Springer Proceedings in Business and Economics","Mathematical Research for Blockchain Economy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37110-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T00:31:04Z","timestamp":1581640264000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37110-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030371098","9783030371104"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37110-4_3","relation":{},"ISSN":["2198-7246","2198-7254"],"issn-type":[{"type":"print","value":"2198-7246"},{"type":"electronic","value":"2198-7254"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}