{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:09:05Z","timestamp":1773414545756,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662533567","type":"print"},{"value":"9783662533574","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-53357-4_1","type":"book-chapter","created":{"date-parts":[[2016,8,30]],"date-time":"2016-08-30T13:22:01Z","timestamp":1472563321000},"page":"3-18","source":"Crossref","is-referenced-by-count":54,"title":["Stressing Out: Bitcoin \u201cStress Testing\u201d"],"prefix":"10.1007","author":[{"given":"Khaled","family":"Baqer","sequence":"first","affiliation":[]},{"given":"Danny Yuxing","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Damon","family":"McCoy","sequence":"additional","affiliation":[]},{"given":"Nicholas","family":"Weaver","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,31]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-642-39498-0_7","volume-title":"The Economics of Information Security and Privacy","author":"J Becker","year":"2013","unstructured":"Becker, J., Breuker, D., Heide, T., Holler, J., Rauer, H.P., B\u00f6hme, R.: Can we afford integrity by proof-of-work? Scenarios inspired by the Bitcoin currency. In: B\u00f6hme, R. (ed.) The Economics of Information Security and Privacy, pp. 135\u2013156. Springer, Heidelberg (2013)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: Research perspectives and challenges for Bitcoin and cryptocurrencies. In: IEEE Symposium on Security and Privacy (2015)","DOI":"10.1109\/SP.2015.14"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Decker, C., Wattenhofer, R.: Information propagation in the Bitcoin network. In: IEEE Thirteenth International Conference on Peer-to-Peer Computing (P2P), pp. 1\u201310 (2013)","DOI":"10.1109\/P2P.2013.6688704"},{"key":"1_CR4","unstructured":"Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In: Proceedings of WEIS 2013 (2013)"},{"key":"1_CR5","unstructured":"Maxwell, G.: Merkle tree of open transactions for lite mode? bitcointalk.org (2011)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of Bitcoins: characterizing payments among men with no names. In: Proceedings of the Conference on Internet Measurement Conference, pp. 127\u2013140. ACM (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/978-3-642-39884-1_3","volume-title":"Financial Cryptography and Data Security","author":"T Moore","year":"2013","unstructured":"Moore, T., Christin, N.: Beware the middleman: empirical analysis of Bitcoin-exchange risk. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 25\u201333. Springer, Heidelberg (2013)"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-662-48051-9_2","volume-title":"Financial Cryptography and Data Security","author":"M M\u00f6ser","year":"2015","unstructured":"M\u00f6ser, M., B\u00f6hme, R.: Trends, tips, tolls: a longitudinal study of Bitcoin transaction fees. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015 Workshops. LNCS, vol. 8976, pp. 19\u201333. Springer, Heidelberg (2015)"},{"issue":"2012","key":"1_CR9","first-page":"28","volume":"1","author":"S Nakamoto","year":"2008","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted 1(2012), 28 (2008)","journal-title":"Consulted"},{"key":"1_CR10","unstructured":"Trillo, M.: Stress Test Prepares VisaNet for the Most Wonderful Time of the Year (2013). http:\/\/www.visa.com\/blogarchives\/us\/2013\/10\/10\/stress-test-prepares-visanet-for-the-most-wonderful-time-of-the-year\/index.html"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/978-3-662-44774-1_5","volume-title":"Financial Cryptography and Data Security","author":"M Vasek","year":"2014","unstructured":"Vasek, M., Thornton, M., Moore, T.: Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014 Workshops. LNCS, vol. 8438, pp. 57\u201371. Springer, Heidelberg (2014)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-53357-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T21:38:42Z","timestamp":1498340322000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-53357-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662533567","9783662533574"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-53357-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}