{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:40:09Z","timestamp":1744605609624,"version":"3.40.4"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031877650","type":"print"},{"value":"9783031877667","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87766-7_15","type":"book-chapter","created":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:09:18Z","timestamp":1744603758000},"page":"165-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mitigating Balancing Attack on\u00a0Ethereum PoS"],"prefix":"10.1007","author":[{"given":"Ahmad","family":"Atwi","sequence":"first","affiliation":[]},{"given":"Yackolley Amoussou","family":"Guenou","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Potop-Butucaru","sequence":"additional","affiliation":[]},{"given":"Bilel","family":"Zaghdoudi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,15]]},"reference":[{"key":"15_CR1","unstructured":"Asgaonkar, A., D\u2019Amato, F., Saltini, R., Zanolini, L.. Zhang, C.: A confirmation rule for the ethereum consensus protocol. arXiv preprint arXiv:2405.00549 (2024)"},{"key":"15_CR2","doi-asserted-by":"publisher","unstructured":"Chun, B.G., Maniatis, P., Shenker, S., Kubiatowicz, J.: Attested append-only memory: making adversaries stick to their word. In: Bressoud, T.C.,\u00a0Frans Kaashoek, M. (eds.) Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, SOSP 2007, Stevenson, Washington, USA, October 14-17, 2007, pp. 189\u2013204. ACM (2007). https:\/\/doi.org\/10.1145\/1294261.1294280","DOI":"10.1145\/1294261.1294280"},{"key":"15_CR3","unstructured":"Ethereum Foundation: Attack and defense in proof of stake (2024). https:\/\/ethereum.org\/en\/developers\/docs\/consensus-mechanisms\/pos\/attack-and-defense\/. Accessed 28 Aug 2024"},{"key":"15_CR4","unstructured":"Levin, D., Douceur, J.R., Lorch, J.R., Moscibroda, T.: TrInc: small trusted hardware for large distributed systems. In: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2009, 22-24 April 2009, Boston, MA, USA, pp. 1\u201314. USENIX Association (2009). http:\/\/www.usenix.org\/events\/nsdi09\/tech\/full_papers\/levin\/levin.pdf"},{"key":"15_CR5","doi-asserted-by":"publisher","unstructured":"Neu, J., Tas, E.N., Tse, D.: Two attacks on proof-of-stake ghost\/ethereum. CoRR, abs\/2203.01315 (2022). https:\/\/doi.org\/10.48550\/arXiv.2203.01315","DOI":"10.48550\/arXiv.2203.01315"},{"key":"15_CR6","doi-asserted-by":"publisher","unstructured":"Pavloff, U., Amoussou-Guenou, Y., Tucci-Piergiovanni, S.: Ethereum proof-of-stake under scrutiny. In: Hong, J., Lanperne, M., Park, J.W., Cern\u00fd, T., Shahriar, H. (eds). Proceedings of the 38th ACM\/SIGAPP Symposium on Applied Computing, SAC 2023, Tallinn, Estonia, 27-31 March 2023, pp. 212\u2013221. ACM (2023). https:\/\/doi.org\/10.1145\/3555776.3577655","DOI":"10.1145\/3555776.3577655"},{"key":"15_CR7","doi-asserted-by":"publisher","unstructured":"Schwarz-Schilling, C., Neu, J., Monnot, B., Asgaonkar, A., Tas, E.N., Tse, D. (2022). Three Attacks on Proof-of-Stake Ethereum. In: Eyal, I., Garay, J. (eds.) Financial Cryptography and Data Security. - 26th International Conference, FC 2022, Grenada, 2-6 May 2022, Revised Selected Papers, LNCS, vol. 13411, pp. 560\u2013576. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-18283-9_28","DOI":"10.1007\/978-3-031-18283-9_28"},{"key":"15_CR8","doi-asserted-by":"publisher","unstructured":"Veronese, G.S., Correia, M., Bessani, A.N., Lung, L.C. and Verissimo, P.: Efficient byzantine fault-tolerance. IEEE Trans. Comput. 62(1), 16\u201330 (2013). https:\/\/doi.org\/10.1109\/TC.2011.221","DOI":"10.1109\/TC.2011.221"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87766-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:09:21Z","timestamp":1744603761000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87766-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877650","9783031877667"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87766-7_15","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}