{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T07:25:03Z","timestamp":1766647503204,"version":"3.40.3"},"publisher-location":"Cham","reference-count":131,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031786754"},{"type":"electronic","value":"9783031786761"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78676-1_8","type":"book-chapter","created":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T06:48:44Z","timestamp":1740120524000},"page":"128-155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["SoK: A Stratified Approach to\u00a0Blockchain Decentralization"],"prefix":"10.1007","author":[{"given":"Christina","family":"Ovezik","sequence":"first","affiliation":[]},{"given":"Dimitris","family":"Karakostas","sequence":"additional","affiliation":[]},{"given":"Aggelos","family":"Kiayias","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,22]]},"reference":[{"issue":"1","key":"8_CR1","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","volume":"74","author":"R Albert","year":"2002","unstructured":"Albert, R., Barab\u00e1si, A.L.: Statistical mechanics of complex networks. Rev. Mod. Phys. 74(1), 47 (2002)","journal-title":"Rev. Mod. Phys."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Allen, D.W., Berg, C., Lane, A.M.: Trust and governance in collective blockchain treasuries. Available at SSRN (2021)","DOI":"10.2139\/ssrn.3891976"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Alston, E.: Constitutions and blockchains: competitive governance of fundamental rule sets. Case Western Reserve J. Law, Technol. Internet 11(4) (2019)","DOI":"10.2139\/ssrn.3358434"},{"key":"8_CR4","doi-asserted-by":"publisher","unstructured":"Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: routing attacks on cryptocurrencies. In: 2017 IEEE Symposium on Security and Privacy, pp. 375\u2013392. IEEE Computer Society Press, San Jose, CA, USA (2017). https:\/\/doi.org\/10.1109\/SP.2017.29","DOI":"10.1109\/SP.2017.29"},{"key":"8_CR5","unstructured":"Araya, D.: The promise of bitcoin: an interview with andreas m. antonopoulos (2016). https:\/\/futurism.com\/promise-bitcoin-interview-andreas-m-antonopoulos"},{"issue":"4","key":"8_CR6","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1086\/256963","volume":"58","author":"KJ Arrow","year":"1950","unstructured":"Arrow, K.J.: A difficulty in the concept of social welfare. J. Polit. Econ. 58(4), 328\u2013346 (1950)","journal-title":"J. Polit. Econ."},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-030-01446-9_5","volume-title":"Provable Security","author":"G Ateniese","year":"2018","unstructured":"Ateniese, G., Kiayias, A., Magri, B., Tselekounis, Y., Venturi, D.: Secure outsourcing of cryptographic circuits manufacturing. In: Baek, J., Susilo, W., Kim, J. (eds.) ProvSec 2018. LNCS, vol. 11192, pp. 75\u201393. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01446-9_5"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/978-3-030-32101-7_28","volume-title":"Financial Cryptography and Data Security","author":"G Avarikioti","year":"2019","unstructured":"Avarikioti, G., K\u00e4ppeli, L., Wang, Y., Wattenhofer, R.: Bitcoin security under temporary dishonest majority. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 466\u2013483. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32101-7_28"},{"key":"8_CR9","doi-asserted-by":"publisher","unstructured":"Azouvi, S., Maller, M., Meiklejohn, S.: Egalitarian society or benevolent dictatorship: the state of cryptocurrency governance. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 127\u2013143. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_10","DOI":"10.1007\/978-3-662-58820-8_10"},{"key":"8_CR10","doi-asserted-by":"publisher","unstructured":"Badertscher, C., Gazi, P., Kiayias, A., Russell, A., Zikas, V.: Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) ACM CCS 2018: 25th Conference on Computer and Communications Security, pp. 913\u2013930. ACM Press, Toronto, ON, Canada (2018). https:\/\/doi.org\/10.1145\/3243734.3243848","DOI":"10.1145\/3243734.3243848"},{"key":"8_CR11","unstructured":"Badertscher, C., Ga\u017ei, P., Kiayias, A., Russell, A., Zikas, V.: Consensus redux: distributed ledgers in the face of adversarial supremacy. Cryptology ePrint Archive, Report 2020\/1021 (2020). https:\/\/eprint.iacr.org\/2020\/1021"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"170404","DOI":"10.1109\/ACCESS.2020.3024254","volume":"8","author":"Z Bao","year":"2020","unstructured":"Bao, Z., Wang, Q., Shi, W., Wang, L., Lei, H., Chen, B.: When blockchain meets SGX: an overview, challenges, and open issues. IEEE Access 8, 170404\u2013170420 (2020)","journal-title":"IEEE Access"},{"issue":"1","key":"8_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCOM.1964.1088883","volume":"12","author":"P Baran","year":"1964","unstructured":"Baran, P.: On distributed communications networks. IEEE Trans. Commun. Syst. 12(1), 1\u20139 (1964)","journal-title":"IEEE Trans. Commun. Syst."},{"key":"8_CR14","unstructured":"Bastiat, F.: Popular Fallacies regarding General Interests; being a translation of the \u201cSophismes \u00e9conomiques\u201d... With notes by GR Porter [the translator]. John Murray (1846)"},{"issue":"10","key":"8_CR15","first-page":"1","volume":"19","author":"R Beck","year":"2018","unstructured":"Beck, R., M\u00fcller-Bloch, C., King, J.L.: Governance in the blockchain economy: a framework and research agenda. J. Assoc. Inf. Syst. 19(10), 1 (2018)","journal-title":"J. Assoc. Inf. Syst."},{"key":"8_CR16","unstructured":"BigQuery: Bitcoin cryptocurrency dataset. https:\/\/console.cloud.google.com\/marketplace\/product\/bitcoin\/crypto-bitcoin"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Dinu, D., Khovratovich, D.: Argon2: new generation of memory-hard functions for password hashing and other applications. In: 2016 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 292\u2013302. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.31"},{"key":"8_CR18","unstructured":"Bitnodes: Bitnodes dashboard. https:\/\/bitnodes.io\/dashboard"},{"key":"8_CR19","unstructured":"Blockchair: Blockchair bitcoin node explorer. https:\/\/blockchair.com\/bitcoin\/nodes"},{"issue":"2","key":"8_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14763\/2021.2.1563","volume":"10","author":"B Bod\u00f3","year":"2021","unstructured":"Bod\u00f3, B., Brekke, J.K., Hoepman, J.H.: Decentralisation: a multidisciplinary perspective. Internet Policy Rev. 10(2), 1\u201321 (2021)","journal-title":"Internet Policy Rev."},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Bod\u00f3, B., Giannopoulou, A.: The logics of technology decentralization\u2013the case of distributed ledger technologies. Blockchain web 3 (2019)","DOI":"10.4324\/9780429029530-8"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1007\/978-3-319-96884-1_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"D Boneh","year":"2018","unstructured":"Boneh, D., Bonneau, J., B\u00fcnz, B., Fisch, B.: Verifiable delay functions. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10991, pp. 757\u2013788. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_25"},{"key":"8_CR23","unstructured":"Bonneau, J., Meckler, I., Rao, V., Shapiro, E.: Coda: Decentralized cryptocurrency at scale. Cryptology ePrint Archive, Report 2020\/352 (2020). https:\/\/eprint.iacr.org\/2020\/352"},{"issue":"2","key":"8_CR24","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MC.2012.37","volume":"45","author":"E Brewer","year":"2012","unstructured":"Brewer, E.: Cap twelve years later: How the\" rules\" have changed. Computer 45(2), 23\u201329 (2012)","journal-title":"Computer"},{"key":"8_CR25","doi-asserted-by":"publisher","unstructured":"Br\u00fcnjes, L., Kiayias, A., Koutsoupias, E., Stouka, A.: Reward sharing schemes for stake pools. In: IEEE European Symposium on Security and Privacy, EuroS &P 2020, Genoa, Italy, September 7-11, 2020, pp. 256\u2013275. IEEE (2020). https:\/\/doi.org\/10.1109\/EuroSP48549.2020.00024, https:\/\/doi.org\/10.1109\/EuroSP48549.2020.00024","DOI":"10.1109\/EuroSP48549.2020.00024"},{"key":"8_CR26","doi-asserted-by":"publisher","unstructured":"B\u00fcnz, B., Kiffer, L., Luu, L., Zamani, M.: FlyClient: super-light clients for cryptocurrencies. In: 2020 IEEE Symposium on Security and Privacy, pp. 928\u2013946. IEEE Computer Society Press, San Francisco, CA, USA (2020). https:\/\/doi.org\/10.1109\/SP40000.2020.00049","DOI":"10.1109\/SP40000.2020.00049"},{"key":"8_CR27","unstructured":"Buterin, V.: On stake (2014). https:\/\/blog.ethereum.org\/2014\/07\/05\/stake"},{"key":"8_CR28","unstructured":"Buterin, V.: Hard fork completed (2016). https:\/\/blog.ethereum.org\/2016\/07\/20\/hard-fork-completed\/"},{"key":"8_CR29","unstructured":"Buterin, V.: Two-slot proposer\/builder separation (2021). https:\/\/ethresear.ch\/t\/two-slot-proposer-builder-separation\/10980"},{"key":"8_CR30","unstructured":"Cambridge Centre for Alternative Finance: Cambridge bitcoin electricity consumption index (cbeci): Bitcoin mining map (2022). https:\/\/ccaf.io\/cbeci\/mining_map"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Chatzigiannis, P., Baldimtsi, F., Chalkias, K.: Sok: blockchain light clients. In: International Conference on Financial Cryptography and Data Security, pp. 615\u2013641. Springer (2022)","DOI":"10.1007\/978-3-031-18283-9_31"},{"key":"8_CR32","unstructured":"Chen, J., Gorbunov, S., Micali, S., Vlachos, G.: ALGORAND AGREEMENT: Super fast and partition resilient byzantine agreement. Cryptology ePrint Archive, Report 2018\/377 (2018). https:\/\/eprint.iacr.org\/2018\/377"},{"key":"8_CR33","unstructured":"Cheng, L., Zhu, F., Liu, H., Miao, C.: On decentralization of bitcoin: an asset perspective (2021)"},{"key":"8_CR34","doi-asserted-by":"publisher","first-page":"66210","DOI":"10.1109\/ACCESS.2018.2878895","volume":"6","author":"H Cho","year":"2018","unstructured":"Cho, H.: Asic-resistance of multi-hash proof-of-work mechanisms for blockchain consensus protocols. IEEE Access 6, 66210\u201366222 (2018)","journal-title":"IEEE Access"},{"key":"8_CR35","unstructured":"Choi, J., Choi, W., Aiken, W., Kim, H., Huh, J.H., Kim, T., Kim, Y., Anderson, R.: Attack of the clones: Measuring the maintainability, originality and security of bitcoin\u2019forks\u2019 in the wild. arXiv preprint arXiv:2201.08678 (2022)"},{"key":"8_CR36","unstructured":"CoinMarketCap: Coinmarketcap. https:\/\/coinmarketcap.com"},{"key":"8_CR37","unstructured":"Cook, C.: Introducing the blockstream satellite base station (2021)"},{"key":"8_CR38","unstructured":"Core, B.: Cve-2018-17144 full disclosure (2018). https:\/\/bitcoincore.org\/en\/2018\/09\/20\/notice\/"},{"key":"8_CR39","doi-asserted-by":"crossref","unstructured":"Coretti, S., Kiayias, A., Moore, C., Russell, A.: The generals\u00e2\u20ac\u2122 scuttlebutt: Byzantine-resilient gossip protocols. IACR Cryptol. ePrint Arch. 541 (2022). https:\/\/eprint.iacr.org\/2022\/541","DOI":"10.1145\/3548606.3560638"},{"key":"8_CR40","doi-asserted-by":"publisher","unstructured":"Daian, P., Pass, R., Shi, E.: Snow white: Robustly reconfigurable consensus and applications to provably secure proof of stake. In: Goldberg and Moore [62], pp. 23\u201341. https:\/\/doi.org\/10.1007\/978-3-030-32101-7_2","DOI":"10.1007\/978-3-030-32101-7_2"},{"key":"8_CR41","doi-asserted-by":"crossref","unstructured":"Daveas, S., Karantias, K., Kiayias, A., Zindros, D.: A gas-efficient superlight bitcoin client in solidity. Cryptology ePrint Archive, Report 2020\/927 (2020). https:\/\/eprint.iacr.org\/2020\/927","DOI":"10.1145\/3419614.3423255"},{"key":"8_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-319-78375-8_3","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"B David","year":"2018","unstructured":"David, B., Ga\u017ei, P., Kiayias, A., Russell, A.: Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10821, pp. 66\u201398. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78375-8_3"},{"key":"8_CR43","unstructured":"De\u00a0Best, R.: Distribution of bitcoin\u2019s network hashrate in the last 24 hours until january 12 (2024). https:\/\/www.statista.com\/statistics\/731416\/market-share-of-mining-pools\/"},{"key":"8_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-662-64331-0_6","volume-title":"Financial Cryptography and Data Security","author":"S Deb","year":"2021","unstructured":"Deb, S., Kannan, S., Tse, D.: PoSAT: proof-of-work availability and unpredictability, without the work. In: Borisov, N., Diaz, C. (eds.) FC 2021. LNCS, vol. 12675, pp. 104\u2013128. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-64331-0_6"},{"key":"8_CR45","doi-asserted-by":"publisher","unstructured":"Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: 13th IEEE International Conference on Peer-to-Peer Computing, IEEE P2P 2013, Trento, Italy, September 9-11, 2013, Proceedings, pp. 1\u201310. IEEE (2013). https:\/\/doi.org\/10.1109\/P2P.2013.6688704, https:\/\/doi.org\/10.1109\/P2P.2013.6688704","DOI":"10.1109\/P2P.2013.6688704"},{"key":"8_CR46","unstructured":"Dfinity: Node provider machine hardware guide - internet computer wiki. https:\/\/wiki.internetcomputer.org\/wiki\/Node_Provider_Machine_Hardware_Guide"},{"key":"8_CR47","doi-asserted-by":"crossref","unstructured":"Dickey, C.G., Grothoff, C.: Bootstrapping of peer-to-peer networks. In: 2008 International Symposium on Applications and the Internet, pp. 205\u2013208. IEEE (2008)","DOI":"10.1109\/SAINT.2008.15"},{"key":"8_CR48","unstructured":"Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: King, S.T. (ed.) USENIX Security 2013: 22nd USENIX Security Symposium, pp. 605\u2013620. USENIX Association, Washington, DC, USA (2013)"},{"key":"8_CR49","doi-asserted-by":"crossref","unstructured":"Ekblaw, A., Barabas, C., Harvey-Buschel, J., Lippman, A.: Bitcoin and the myth of decentralization: socio-technical proposals for restoring network integrity. In: 2016 IEEE 1st international workshops on foundations and applications of self* systems (FAS* W), pp. 18\u201323. IEEE (2016)","DOI":"10.1109\/FAS-W.2016.18"},{"issue":"1","key":"8_CR50","first-page":"17","volume":"5","author":"P Erdos","year":"1960","unstructured":"Erdos, P., R\u00e9nyi, A., et al.: On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci 5(1), 17\u201360 (1960)","journal-title":"Publ. Math. Inst. Hung. Acad. Sci"},{"key":"8_CR51","unstructured":"Ethereum: Ethash (2022). https:\/\/ethereum.org\/en\/developers\/docs\/consensus-mechanisms\/pow\/mining-algorithms\/ethash\/"},{"key":"8_CR52","unstructured":"Ethereum: The merge (2022). https:\/\/ethereum.org\/en\/upgrades\/merge"},{"key":"8_CR53","unstructured":"Fuller, B., Khan, J.: Cve-2018-17145: Bitcoin inventory out-of-memory denial-of-service attack (2020). https:\/\/invdos.net\/paper\/CVE-2018-17145.pdf"},{"key":"8_CR54","doi-asserted-by":"publisher","unstructured":"Gao, Y., Shi, J., Wang, X., Tan, Q., Zhao, C., Yin, Z.: Topology measurement and analysis on ethereum P2P network. In: 2019 IEEE Symposium on Computers and Communications, ISCC 2019, Barcelona, Spain, June 29 - July 3, 2019, pp.\u00a01\u20137. IEEE (2019). https:\/\/doi.org\/10.1109\/ISCC47284.2019.8969695, https:\/\/doi.org\/10.1109\/ISCC47284.2019.8969695","DOI":"10.1109\/ISCC47284.2019.8969695"},{"key":"8_CR55","doi-asserted-by":"publisher","unstructured":"Garay, J.A., Kiayias, A.: SoK: A consensus taxonomy in the blockchain era. In: Jarecki [68], pp. 284\u2013318. https:\/\/doi.org\/10.1007\/978-3-030-40186-3_13","DOI":"10.1007\/978-3-030-40186-3_13"},{"key":"8_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-662-46803-6_10","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"J Garay","year":"2015","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281\u2013310. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46803-6_10"},{"key":"8_CR57","doi-asserted-by":"publisher","unstructured":"Garay, J.A., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol with chains of variable difficulty. In: Katz and Shacham [76], pp. 291\u2013323. https:\/\/doi.org\/10.1007\/978-3-319-63688-7_10","DOI":"10.1007\/978-3-319-63688-7_10"},{"key":"8_CR58","doi-asserted-by":"publisher","unstructured":"Garay, J.A., Kiayias, A., Panagiotakos, G.: Consensus from signatures of work. In: Jarecki [68], pp. 319\u2013344. https:\/\/doi.org\/10.1007\/978-3-030-40186-3_14","DOI":"10.1007\/978-3-030-40186-3_14"},{"key":"8_CR59","doi-asserted-by":"crossref","unstructured":"Ga\u017ei, P., Kiayias, A., Russell, A.: Stake-bleeding attacks on proof-of-stake blockchains. Cryptology ePrint Archive, Report 2018\/248 (2018). https:\/\/eprint.iacr.org\/2018\/248","DOI":"10.1109\/CVCBT.2018.00015"},{"key":"8_CR60","doi-asserted-by":"publisher","unstructured":"Gencer, A.E., Basu, S., Eyal, I., van Renesse, R., Sirer, E.G.: Decentralization in bitcoin and Ethereum networks. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 439\u2013457. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-58387-6_24","DOI":"10.1007\/978-3-662-58387-6_24"},{"key":"8_CR61","doi-asserted-by":"publisher","unstructured":"Gervais, A., Karame, G.O., Capkun, V., Capkun, S.: Is bitcoin a decentralized currency? IEEE Secur. Priv. 12(3), 54\u201360 (2014). https:\/\/doi.org\/10.1109\/MSP.2014.49, https:\/\/doi.org\/10.1109\/MSP.2014.49","DOI":"10.1109\/MSP.2014.49"},{"key":"8_CR62","doi-asserted-by":"crossref","unstructured":"Goldberg, I., Moore, T. (eds.): FC 2019: 23rd International Conference on Financial Cryptography and Data Security, Lecture Notes in Computer Science, vol. 11598. Springer, Heidelberg, Germany, Frigate Bay, St. Kitts and Nevis (2019)","DOI":"10.1007\/978-3-030-32101-7"},{"key":"8_CR63","unstructured":"Hajdarbegovic, N.: Bitcoin miners ditch ghash.io pool over fears of 51% attack (2014). https:\/\/www.coindesk.com\/markets\/2014\/01\/09\/bitcoin-miners-ditch-ghashio-pool-over-fears-of-51-attack\/"},{"key":"8_CR64","unstructured":"Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin\u2019s peer-to-peer network. In: Jung, J., Holz, T. (eds.) USENIX Security 2015: 24th USENIX Security Symposium, pp. 129\u2013144. USENIX Association, Washington, DC, USA (2015)"},{"key":"8_CR65","doi-asserted-by":"crossref","unstructured":"Heimbach, L., Kiffer, L., Torres, C.F., Wattenhofer, R.: Ethereum\u2019s proposer-builder separation: Promises and realities. arXiv preprint arXiv:2305.19037 (2023)","DOI":"10.1145\/3618257.3624824"},{"key":"8_CR66","unstructured":"Hern, A.: \\$300m in cryptocurrency accidentally lost forever due to bug (2017). https:\/\/www.theguardian.com\/technology\/2017\/nov\/08\/cryptocurrency-300m-dollars-stolen-bug-ether"},{"key":"8_CR67","unstructured":"IO, EOS: Eos. io technical white paper v2. EOS, Tech. Rep (2018)"},{"key":"8_CR68","doi-asserted-by":"crossref","unstructured":"Jarecki, S. (ed.): Topics in Cryptology \u2013 CT-RSA\u00a02020, Lecture Notes in Computer Science, vol. 12006. Springer, Heidelberg, Germany, San Francisco, CA, USA (2020)","DOI":"10.1007\/978-3-030-40186-3"},{"key":"8_CR69","unstructured":"Johnson, N.L.: Diversity in decentralized systems: enabling self-organizing solutions. In: Decentralization II Conference, UCLA. vol.\u00a04. Citeseer (1999)"},{"key":"8_CR70","unstructured":"Jourenko, M., Kurazumi, K., Larangeira, M., Tanaka, K.: SoK: A taxonomy for layer-2 scalability related protocols for cryptocurrencies. Cryptology ePrint Archive, Report 2019\/352 (2019). https:\/\/eprint.iacr.org\/2019\/352"},{"key":"8_CR71","doi-asserted-by":"publisher","unstructured":"Kanjalkar, S., Kuo, J., Li, Y., Miller, A.: Short paper: I can\u2019t believe it\u2019s not stake! Resource exhaustion attacks on PoS. In: Goldberg and Moore [62], pp. 62\u201369. https:\/\/doi.org\/10.1007\/978-3-030-32101-7_4","DOI":"10.1007\/978-3-030-32101-7_4"},{"key":"8_CR72","unstructured":"Karakostas, D., Karayannidis, N., Kiayias, A.: Efficient state management in distributed ledgers. Cryptology ePrint Archive, Report 2021\/183 (2021). https:\/\/eprint.iacr.org\/2021\/183"},{"key":"8_CR73","doi-asserted-by":"publisher","unstructured":"Karakostas, D., Kiayias, A., Nasikas, C., Zindros, D.: Cryptocurrency egalitarianism: a quantitative approach. In: Danos, V., Herlihy, M., Potop-Butucaru, M., Prat, J., Piergiovanni, S.T. (eds.) International Conference on Blockchain Economics, Security and Protocols, Tokenomics 2019, May 6-7, 2019, Paris, France. OASIcs, vol.\u00a071, pp. 7:1\u20137:21. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2019). https:\/\/doi.org\/10.4230\/OASIcs.Tokenomics.2019.7","DOI":"10.4230\/OASIcs.Tokenomics.2019.7"},{"key":"8_CR74","unstructured":"Karantias, K.: Sok: A taxonomy of cryptocurrency wallets. Cryptology ePrint Archive (2020)"},{"key":"8_CR75","unstructured":"Kattis, A., Bonneau, J.: Proof of necessary work: Succinct state verification with fairness guarantees. Cryptology ePrint Archive, Report 2020\/190 (2020). https:\/\/eprint.iacr.org\/2020\/190"},{"key":"8_CR76","doi-asserted-by":"crossref","unstructured":"Katz, J., Shacham, H. (eds.): Advances in Cryptology \u2013 CRYPTO\u00a02017, Part\u00a0I, Lecture Notes in Computer Science, vol. 10401. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (2017)","DOI":"10.1007\/978-3-319-63688-7"},{"key":"8_CR77","doi-asserted-by":"publisher","unstructured":"Kerber, T., Kiayias, A., Kohlweiss, M.: Mining for privacy: How to bootstrap a snarky blockchain. In: Borisov, N., D\u00edaz, C. (eds.) Financial Cryptography and Data Security - 25th International Conference, FC 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part I. Lecture Notes in Computer Science, vol. 12674, pp. 497\u2013514. Springer (2021). https:\/\/doi.org\/10.1007\/978-3-662-64322-8_24, https:\/\/doi.org\/10.1007\/978-3-662-64322-8_24","DOI":"10.1007\/978-3-662-64322-8_24"},{"key":"8_CR78","unstructured":"Kiayias, A., Lazos, P.: Sok: Blockchain governance. CoRR abs\/2201.07188 (2022). https:\/\/arxiv.org\/abs\/2201.07188"},{"key":"8_CR79","unstructured":"Kiayias, A., Miller, A., Zindros, D.: Non-interactive proofs of proof-of-work. Cryptology ePrint Archive, Report 2017\/963 (2017). https:\/\/eprint.iacr.org\/2017\/963"},{"key":"8_CR80","unstructured":"Kiayias, A., Polydouri, A., Zindros, D.: The velvet path to superlight blockchain clients. Cryptology ePrint Archive, Report 2020\/1122 (2020). https:\/\/eprint.iacr.org\/2020\/1122"},{"key":"8_CR81","doi-asserted-by":"publisher","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: A provably secure proof-of-stake blockchain protocol. In: Katz and Shacham [76], pp. 357\u2013388. https:\/\/doi.org\/10.1007\/978-3-319-63688-7_12","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"8_CR82","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-030-92078-4_4","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2021","author":"M Kohlweiss","year":"2021","unstructured":"Kohlweiss, M., Maller, M., Siim, J., Volkhov, M.: Snarky ceremonies. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021. LNCS, vol. 13092, pp. 98\u2013127. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92078-4_4"},{"key":"8_CR83","doi-asserted-by":"crossref","unstructured":"Koutsoupias, E., Papadimitriou, C.: Worst-case equilibria. In: Annual symposium on theoretical aspects of computer science, pp. 404\u2013413. Springer (1999)","DOI":"10.1007\/3-540-49116-3_38"},{"key":"8_CR84","unstructured":"Kwon, J., Buchman, E.: Cosmos whitepaper. A Netw. Distrib. Ledgers 27 (2019)"},{"issue":"3","key":"8_CR85","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. (TOPLAS) 4(3), 382\u2013401 (1982)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"key":"8_CR86","unstructured":"Leiba, O.: Unveiling bigspender: Double (and multiple) spend vulnerability in major bitcoin wallets (2020). https:\/\/zengo.com\/bigspender-double-spend-vulnerability-in-bitcoin-wallets\/"},{"key":"8_CR87","doi-asserted-by":"crossref","unstructured":"Li, W., Andreina, S., Bohli, J.M., Karame, G.: Securing proof-of-stake blockchain protocols. In: Data Privacy Management, Cryptocurrencies and Blockchain Technology, pp. 297\u2013315. Springer (2017)","DOI":"10.1007\/978-3-319-67816-0_17"},{"key":"8_CR88","doi-asserted-by":"crossref","unstructured":"Lin, Q., Li, C., Zhao, X., Chen, X.: Measuring decentralization in bitcoin and ethereum using multiple metrics and granularities. In: 2021 IEEE 37th International Conference on Data Engineering Workshops (ICDEW), pp. 80\u201387. IEEE (2021)","DOI":"10.1109\/ICDEW53142.2021.00022"},{"key":"8_CR89","doi-asserted-by":"publisher","unstructured":"Loe, A.F., Quaglia, E.A.: You shall not join: A measurement study of cryptocurrency peer-to-peer bootstrapping techniques. In: Cavallaro, L., Kinder, J., Wang, X., Katz, J. (eds.) ACM CCS 2019: 26th Conference on Computer and Communications Security, pp. 2231\u20132247. ACM Press (2019). https:\/\/doi.org\/10.1145\/3319535.3345649","DOI":"10.1145\/3319535.3345649"},{"issue":"3","key":"8_CR90","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1145\/3007787.3001156","volume":"44","author":"I Magaki","year":"2016","unstructured":"Magaki, I., Khazraee, M., Gutierrez, L.V., Taylor, M.B.: Asic clouds: specializing the datacenter. ACM SIGARCH Comput. Archit. News 44(3), 178\u2013190 (2016)","journal-title":"ACM SIGARCH Comput. Archit. News"},{"key":"8_CR91","doi-asserted-by":"crossref","unstructured":"Mariem, S.B., Casas, P., Romiti, M., Donnet, B., St\u00fctz, R., Haslhofer, B.: All that glitters is not bitcoin\u2013unveiling the centralized nature of the btc (ip) network. In: NOMS 2020-2020 IEEE\/IFIP Network Operations and Management Symposium, pp.\u00a01\u20139. IEEE (2020)","DOI":"10.1109\/NOMS47738.2020.9110354"},{"key":"8_CR92","unstructured":"Marlinspike, M.: My first impressions of web3. Moxie Marlinspike\u2019s Website (2022). https:\/\/moxie.org\/2022\/01\/07\/web3-first-impressions.html"},{"key":"8_CR93","doi-asserted-by":"publisher","unstructured":"Matt, C., Nielsen, J.B., Thomsen, S.E.: Formalizing delayed adaptive corruptions and the security of flooding networks. In: Dodis, Y., Shrimpton, T. (eds.) Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part II. Lecture Notes in Computer Science, vol. 13508, pp. 400\u2013430. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-15979-4_14, https:\/\/doi.org\/10.1007\/978-3-031-15979-4_14","DOI":"10.1007\/978-3-031-15979-4_14"},{"key":"8_CR94","unstructured":"Milewski, K.: Cftc, fincen, and sec warn of crypto aml enforcement (2019). https:\/\/www.natlawreview.com\/article\/cftc-fincen-and-sec-warn-crypto-aml-enforcement"},{"key":"8_CR95","unstructured":"Monero: Network upgrade and release 0.15 (2019). https:\/\/www.getmonero.org\/2019\/10\/01\/announcement-release-0-15.html"},{"key":"8_CR96","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-39884-1_3","volume-title":"Financial Cryptography and Data Security","author":"T Moore","year":"2013","unstructured":"Moore, T., Christin, N.: Beware the middleman: empirical analysis of bitcoin-exchange risk. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 25\u201333. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_3"},{"key":"8_CR97","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)"},{"issue":"1","key":"8_CR98","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1109\/COMST.2018.2852480","volume":"21","author":"T Neudecker","year":"2018","unstructured":"Neudecker, T., Hartenstein, H.: Network layer aspects of permissionless blockchains. IEEE Commun. Surv. Tutorials 21(1), 838\u2013857 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"8_CR99","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S003614450342480","volume":"45","author":"ME Newman","year":"2003","unstructured":"Newman, M.E.: The structure and function of complex networks. SIAM Rev. 45(2), 167\u2013256 (2003)","journal-title":"SIAM Rev."},{"key":"8_CR100","unstructured":"NiceHash: Mining profitability calculator. https:\/\/www.nicehash.com\/profitability-calculator"},{"key":"8_CR101","unstructured":"Nikolaenko, V., Ragsdale, S., Bonneau, J., Boneh, D.: Powers-of-tau to the people: Decentralizing setup ceremonies. Cryptology ePrint Archive (2022)"},{"key":"8_CR102","unstructured":"Ovezik, C., Karakostas, D., Kiayias, A.: Sok: A stratified approach to blockchain decentralization (2024)"},{"key":"8_CR103","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-3-319-56614-6_22","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2017","author":"R Pass","year":"2017","unstructured":"Pass, R., Seeman, L., Shelat, A.: Analysis of the blockchain protocol in asynchronous networks. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10211, pp. 643\u2013673. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56614-6_22"},{"issue":"2","key":"8_CR104","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M Pease","year":"1980","unstructured":"Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. J. ACM (JACM) 27(2), 228\u2013234 (1980)","journal-title":"J. ACM (JACM)"},{"key":"8_CR105","unstructured":"Peck, M.: The crazy security behind the birth of zcash, the inside story (2016). https:\/\/spectrum.ieee.org\/the-crazy-security-behind-the-birth-of-zcash"},{"key":"8_CR106","doi-asserted-by":"crossref","unstructured":"Pelt, R.v., Jansen, S., Baars, D., Overbeek, S.: Defining blockchain governance: a framework for analysis and comparison. Inform. Syst. Manage. 38(1), 21\u201341 (2021)","DOI":"10.1080\/10580530.2020.1720046"},{"key":"8_CR107","unstructured":"Peters, K.: A history of bitcoin hard forks (2021). https:\/\/www.investopedia.com\/tech\/history-bitcoin-hard-forks\/"},{"key":"8_CR108","unstructured":"Poon, J., Dryja, T.: The bitcoin lightning network: Scalable off-chain instant payments (2016)"},{"key":"8_CR109","doi-asserted-by":"publisher","unstructured":"Reed, D.D., Luiselli, J.K.: Temporal Discounting, pp. 1474\u20131474. Springer US, Boston, MA (2011). https:\/\/doi.org\/10.1007\/978-0-387-79061-9_3162","DOI":"10.1007\/978-0-387-79061-9_3162"},{"key":"8_CR110","doi-asserted-by":"publisher","unstructured":"Reibel, P., Yousaf, H., Meiklejohn, S.: Short paper: an exploration of code diversity in the cryptocurrency landscape. In: Goldberg and Moore [62], pp. 73\u201383. https:\/\/doi.org\/10.1007\/978-3-030-32101-7_5","DOI":"10.1007\/978-3-030-32101-7_5"},{"key":"8_CR111","unstructured":"Reiff, N.: All about the bitcoin cash hard fork (2022). https:\/\/www.investopedia.com\/news\/all-about-bitcoin-cash-hard-fork\/"},{"key":"8_CR112","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/978-3-319-70500-2_16","volume-title":"Theory of Cryptography","author":"L Ren","year":"2017","unstructured":"Ren, L., Devadas, S.: Bandwidth hard functions for ASIC resistance. In: Kalai, Y., Reyzin, L. (eds.) TCC 2017. LNCS, vol. 10677, pp. 466\u2013492. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70500-2_16"},{"key":"8_CR113","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_2"},{"key":"8_CR114","unstructured":"Roubini, N.: The big blockchain lie (2018). https:\/\/www.project-syndicate.org\/commentary\/blockchain-big-lie-by-nouriel-roubini-2018-10"},{"key":"8_CR115","doi-asserted-by":"publisher","unstructured":"Sai, A.R., Buckley, J., Fitzgerald, B., Gear, A.L.: Taxonomy of centralization in public blockchain systems: a systematic literature review. Inf. Process. Manag. 58(4), 102584 (2021). https:\/\/doi.org\/10.1016\/j.ipm.2021.102584","DOI":"10.1016\/j.ipm.2021.102584"},{"key":"8_CR116","doi-asserted-by":"publisher","unstructured":"Sai, A.R., Buckley, J., Gear, A.L.: Characterizing wealth inequality in cryptocurrencies. Front. Blockchain 4, 730122 (2021). https:\/\/doi.org\/10.3389\/fbloc.2021.730122, https:\/\/doi.org\/10.3389\/fbloc.2021.730122","DOI":"10.3389\/fbloc.2021.730122"},{"issue":"4","key":"8_CR117","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1080\/17530350.2019.1589553","volume":"12","author":"N Schneider","year":"2019","unstructured":"Schneider, N.: Decentralization: an incomplete ambition. J. Cult. Econ. 12(4), 265\u2013285 (2019)","journal-title":"J. Cult. Econ."},{"issue":"1","key":"8_CR118","doi-asserted-by":"publisher","first-page":"10694","DOI":"10.1038\/s41598-022-14987-0","volume":"12","author":"W Sun","year":"2022","unstructured":"Sun, W., Jin, H., Jin, F., Kong, L., Peng, Y., Dai, Z.: Spatial analysis of global bitcoin mining. Sci. Rep. 12(1), 10694 (2022)","journal-title":"Sci. Rep."},{"key":"8_CR119","unstructured":"Tanenbaum, A.S., Wetherall, D.: Computer networks, 5th Edition. Pearson (2011). https:\/\/www.worldcat.org\/oclc\/698581231"},{"issue":"9","key":"8_CR120","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MC.2017.3571056","volume":"50","author":"MB Taylor","year":"2017","unstructured":"Taylor, M.B.: The evolution of bitcoin hardware. Computer 50(9), 58\u201366 (2017)","journal-title":"Computer"},{"key":"8_CR121","doi-asserted-by":"crossref","unstructured":"Tosh, D.K., Shetty, S., Liang, X., Kamhoua, C.A., Kwiat, K.A., Njilla, L.: Security implications of blockchain cloud with analysis of block withholding attack. In: 2017 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pp. 458\u2013467. IEEE (2017)","DOI":"10.1109\/CCGRID.2017.111"},{"key":"8_CR122","unstructured":"UNDP, U.: Decentralization: A sampling of definitions. Working Paper (1999)"},{"key":"8_CR123","unstructured":"US Securities and Exchange Commission and others: Report of investigation pursuant to section 21(a) of the securities exchange act of 1934: The dao (2017). https:\/\/www.sec.gov\/litigation\/investreport\/34-81207.pdf"},{"key":"8_CR124","unstructured":"US Securities and Exchange Commission and others: Framework for \"investment contract\" analysis of digital assets. US Securities and Exchange Commission 3 (2019)"},{"issue":"2","key":"8_CR125","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MITP.2018.2876932","volume":"21","author":"LJ Valdivia","year":"2019","unstructured":"Valdivia, L.J., Del-Valle-Soto, C., Rodriguez, J., Alcaraz, M.: Decentralization: the failed promise of cryptocurrencies. IT Prof. 21(2), 33\u201340 (2019)","journal-title":"IT Prof."},{"key":"8_CR126","unstructured":"Werner, S.M., Perez, D., Gudgeon, L., Klages-Mundt, A., Harz, D., Knottenbelt, W.J.: Sok: Decentralized finance (defi). CoRR abs\/2101.08778 (2021). https:\/\/arxiv.org\/abs\/2101.08778"},{"key":"8_CR127","doi-asserted-by":"crossref","unstructured":"Zhang, B., Oliynykov, R., Balogun, H.: A treasury system for cryptocurrencies: Enabling better collaborative intelligence. In: ISOC Network and Distributed System Security Symposium \u2013 NDSS\u00a02019. The Internet Society, San Diego, CA, USA (2019)","DOI":"10.14722\/ndss.2019.23024"},{"key":"8_CR128","unstructured":"Zhang, L., Ma, X., Liu, Y.: Sok: Blockchain decentralization. arXiv preprint arXiv:2205.04256 (2022)"},{"key":"8_CR129","unstructured":"Zhou, F., Song, N.: 2020 q2 cryptocurrency mining industry report (2020). https:\/\/medium.com\/coinmonks\/2020-q2-cryptocurrency-mining-industry-report-50a908773b17"},{"key":"8_CR130","doi-asserted-by":"publisher","unstructured":"Zhou, L., et al.: Sok: decentralized finance (defi) attacks. In: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, pp. 2444\u20132461. IEEE (2023). https:\/\/doi.org\/10.1109\/SP46215.2023.10179435","DOI":"10.1109\/SP46215.2023.10179435"},{"key":"8_CR131","doi-asserted-by":"crossref","unstructured":"Zhou, Q.: Irregular-program-based hash algorithms. In: 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON), pp. 125\u2013128. IEEE (2019)","DOI":"10.1109\/DAPPCON.2019.00024"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78676-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T06:49:43Z","timestamp":1740120583000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78676-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031786754","9783031786761"],"references-count":131,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78676-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"22 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Willemstad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cura\u00e7ao","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc24.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}