{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:16:11Z","timestamp":1742966171594,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031539626"},{"type":"electronic","value":"9783031539633"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53963-3_11","type":"book-chapter","created":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T05:02:22Z","timestamp":1710565342000},"page":"131-157","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["ADESS: A Proof-of-Work Protocol to\u00a0Deter Double-Spend Attacks"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Aronoff","sequence":"first","affiliation":[]},{"given":"Isaac","family":"Ardis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,17]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Budish, E.: The Economic Limits of Bitcoin and the Blockchain. National Bureau of Economic Research Working Paper 24717, June 2018 (2018). https:\/\/www.nber.org\/papers\/w24717","DOI":"10.3386\/w24717"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-662-45472-5_28","volume-title":"Financial Cryptography and Data Security","author":"I Eyal","year":"2014","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436\u2013454. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_28"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Gervais, A., Glykantzis, V., Karame, G.O., Ritzdorf, H., Wurst, K., Capkun, S.: On the security and performance of proof of work blockchains. In: CCS 2016: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, United States, pp. 3\u201316. Association for Computing Machinery (2016)","DOI":"10.1145\/2976749.2978341"},{"key":"11_CR4","unstructured":"Guo, D., Ren, L.: Bitcoin\u2019s Latency - Security Analysis Made Simple arxiv2203.06357v3 (2022). https:\/\/arxiv.org\/abs\/2203.06357"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Leshno, J., Strack, P.: Bitcoin: an axiomatic approach and an impossibility theorem. Am. Econ. Rev. Insights 2(3), 269\u2013286 (2020). American Economic Association","DOI":"10.1257\/aeri.20190494"},{"key":"11_CR6","unstructured":"Lovejoy, J.: Reorgs on Bitcoin Gold: Counterattacks in the wild (2020). Medium https:\/\/medium.com\/mit-media-lab-digital-currency-initiative\/reorgs-on-bitcoin-gold-counterattacks-in-the-wild-da7e2b797c21"},{"key":"11_CR7","unstructured":"MIT Media Lab Digital Currency Initiative reorg tracker (2020). 51% attacks - reorg tracker. https:\/\/dci.mit.edu\/51-attacks"},{"key":"11_CR8","unstructured":"Moroz, D., Aronoff, D., Narula, N., Parkes, D.: Double Spend Counterattacks (2020). http:\/\/arxiv.org\/abs\/2002.10736[cs.CR] https:\/\/doi.org\/10.48550\/arXiv.2002.10736"},{"key":"11_CR9","unstructured":"Nakamoto, S.: Bitcoin; A Peer - to - Peer Electronic Cash System (2008). https:\/\/bitcoin.org\/bitcoin.pdf.Original Bitcoin code https:\/\/satoshi.nakamotoinstitute.org\/code\/ (2008) Original Bitcoin code https:\/\/satoshi.nakamotoinstitute.org\/code\/"},{"key":"11_CR10","volume-title":"The Strategy of Conflict","author":"TC Schelling","year":"1960","unstructured":"Schelling, T.C.: The Strategy of Conflict. Harvard University Press, Cambridge (1960)"},{"key":"11_CR11","unstructured":"Singer, A.: Fight fire with fire: MIT scholar suggests ETC counters 51% attacks. Cointelegraph Set. 15 (2020). https:\/\/cointelegraph.com\/news\/fight-fire-with-fire-mit-scholar-suggests-etc-counters-51-attacks"},{"key":"11_CR12","unstructured":"Wood, G.: Ethereum: A secure Decentralised Generalised Transaction Ledger - Berlin Version d77a387, 26 April 2022 (2021). https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf"}],"container-title":["Lecture Notes in Networks and Systems","Advances in Information and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53963-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T05:09:41Z","timestamp":1710565781000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53963-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031539626","9783031539633"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53963-3_11","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"17 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FICC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Future of Information and Communication Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Berlin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ficc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/saiconference.com\/FICC","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}