{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:03:01Z","timestamp":1769720581198,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662447734","type":"print"},{"value":"9783662447741","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44774-1_12","type":"book-chapter","created":{"date-parts":[[2014,10,7]],"date-time":"2014-10-07T12:50:47Z","timestamp":1412686247000},"page":"161-162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":76,"title":["One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract)"],"prefix":"10.1007","author":[{"given":"Ethan","family":"Heilman","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,10,8]]},"reference":[{"key":"12_CR1","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. arXiv:1311.0243 (2013). http:\/\/arxiv.org\/abs\/1311.0243"},{"key":"12_CR2","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. The Cryptography Mailing List (2008). http:\/\/Bitcoin.org\/Bitcoin.pdf"},{"issue":"2","key":"12_CR3","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/0022-0000(83)90042-9","volume":"27","author":"M Rabin","year":"1983","unstructured":"Rabin, M.: Transaction protection by beacons. J. Comput. Syst. Sci. 27(2), 256\u2013267 (1983). (Elsevier, Amsterdam)","journal-title":"J. Comput. Syst. Sci."},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Heilman, E.: One Weird Trick to Stop Selfish Miners: Fresh Bitcoins. A Solution for the Honest Miner. Cryptology ePrint Archive, Report 2014\/007 (2013). https:\/\/eprint.iacr.org\/2014\/007.pdf","DOI":"10.1007\/978-3-662-44774-1_12"},{"key":"12_CR5","unstructured":"Iorga, M.: NIST, NIST Randomness Beacon (2013). http:\/\/www.nist.gov\/itl\/csd\/ct\/nist_beacon.cfm"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44774-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T12:36:05Z","timestamp":1676637365000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-44774-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662447734","9783662447741"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44774-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}