{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T08:34:22Z","timestamp":1778142862696,"version":"3.51.4"},"reference-count":89,"publisher":"Informa UK Limited","issue":"4","license":[{"start":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T00:00:00Z","timestamp":1715644800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100027426","name":"Schmidt Futures","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100027426","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Parallel, Emergent and Distributed Systems"],"published-print":{"date-parts":[[2024,7,3]]},"DOI":"10.1080\/17445760.2024.2352740","type":"journal-article","created":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T00:32:44Z","timestamp":1715733164000},"page":"446-460","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":8,"title":["Sybil attack vulnerability trilemma"],"prefix":"10.1080","volume":"39","author":[{"given":"Moritz","family":"Platt","sequence":"first","affiliation":[{"name":"Department of Informatics, King's College London, London, UK"}]},{"given":"Daniel","family":"Platt","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Imperial College London, London, UK"},{"name":"I-X Centre for AI In Science, Imperial College London, London, UK"}]},{"given":"Peter","family":"McBurney","sequence":"additional","affiliation":[{"name":"Department of Informatics, King's College London, London, UK"}]}],"member":"301","published-online":{"date-parts":[[2024,5,14]]},"reference":[{"key":"e_1_3_5_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1980.1653534"},{"key":"e_1_3_5_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067651.801633"},{"key":"e_1_3_5_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188"},{"key":"e_1_3_5_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"e_1_3_5_6_1","unstructured":"Nakamoto S. Bitcoin: a peer-to-peer electronic cash system; 2008. [cited 2023 April 19]. Available from: https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_5_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-020-00656-x"},{"key":"e_1_3_5_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00086"},{"key":"e_1_3_5_9_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4198139"},{"key":"e_1_3_5_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"issue":"3","key":"e_1_3_5_11_1","first-page":"353","article-title":"Blockchain and democracy","volume":"41","author":"Racsko P.","year":"2019","unstructured":"Racsko P. Blockchain and democracy. Soc Econ. 2019 Sep;41(3):353\u2013369.","journal-title":"Soc Econ"},{"key":"e_1_3_5_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/17445760.2023.2272777"},{"key":"e_1_3_5_13_1","doi-asserted-by":"publisher","DOI":"10.3386\/w26534"},{"key":"e_1_3_5_14_1","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/hhaa075"},{"key":"e_1_3_5_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102584"},{"key":"e_1_3_5_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556609"},{"key":"e_1_3_5_17_1","unstructured":"Kleinrock L. Information flow in large communication nets [Thesis proposal]; 1961."},{"key":"e_1_3_5_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1976.1674598"},{"key":"e_1_3_5_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3971347"},{"key":"e_1_3_5_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-21821-1_4"},{"key":"e_1_3_5_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-023-00649-0"},{"key":"e_1_3_5_22_1","unstructured":"Rocco G. Public blockchains as a means to resist information censorship [Master's thesis]. New York (NY) USA: City University of New York; 2019. Available from: https:\/\/academicworks.cuny.edu\/gc_etds\/2995\/."},{"key":"e_1_3_5_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/24701475.2021.1935547"},{"key":"e_1_3_5_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890928"},{"key":"e_1_3_5_25_1","unstructured":"Glaser F Zimmermann K Haferkorn M et\u00a0al. Bitcoin\u2013asset or currency? Revealing users' hidden intentions. In: Proceedings of the 22nd European Conference on Information Systems; Jun.; Tel Aviv Israel: AIS; 2014. p. 1\u201314. Available from: https:\/\/aisel.aisnet.org\/ecis2014\/proceedings\/track10\/15\/."},{"key":"e_1_3_5_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2019.100848"},{"key":"e_1_3_5_27_1","unstructured":"Beinke JH Nguyen D Teuteberg F. Towards a business model taxonomy of startups in the finance sector using blockchain. In: Proceedings of the 2018 International Conference on Information Systems; San Francisco (CA) USA; 2018. p. 1\u20139. Available from: https:\/\/aisel.aisnet.org\/icis2018\/crypto\/Presentations\/9."},{"key":"e_1_3_5_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjie.2023.101286"},{"issue":"3","key":"e_1_3_5_29_1","first-page":"493","article-title":"Bitcoin in the Dark Web: a shadow over banking secrecy and a call for global response","volume":"26","author":"Piazza F.","year":"2017","unstructured":"Piazza F. Bitcoin in the Dark Web: a shadow over banking secrecy and a call for global response. South Calif Interdiscip Law J. 2017;26(3):493\u2013520.","journal-title":"South Calif Interdiscip Law J"},{"key":"e_1_3_5_30_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40163-021-00163-8"},{"key":"e_1_3_5_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/17445760.2019.1617865"},{"key":"e_1_3_5_32_1","doi-asserted-by":"publisher","DOI":"10.15388\/Informatica.2019.227"},{"key":"e_1_3_5_33_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006408207550764"},{"key":"e_1_3_5_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07535-3_12"},{"issue":"2","key":"e_1_3_5_35_1","first-page":"1","article-title":"Permissionlessness","volume":"11","author":"Nabben K","year":"2022","unstructured":"Nabben K, Zargham M. Permissionlessness. Int Policy Rev. 2022;11(2):1\u201310.","journal-title":"Int Policy Rev"},{"key":"e_1_3_5_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42524-020-0110-8"},{"key":"e_1_3_5_37_1","doi-asserted-by":"publisher","DOI":"10.3390\/a16010034"},{"key":"e_1_3_5_38_1","unstructured":"Valenta M Sandner P. Comparison of Ethereum Hyperledger Fabric and Corda. Frankfurt School Blockchain Center; 2017. FSBC working paper. Available from: http:\/\/explore-ip.com\/2017_Comparison-of-Ethereum-Hyperledger-Corda.pdf."},{"key":"e_1_3_5_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIC48496.2019.8966735"},{"key":"e_1_3_5_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2020.09.002"},{"key":"e_1_3_5_41_1","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2018.8400278"},{"key":"e_1_3_5_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/17445760.2021.1939873"},{"key":"e_1_3_5_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108424"},{"key":"e_1_3_5_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20614-6_15"},{"key":"e_1_3_5_45_1","unstructured":"Castro M Liskov B. Practical Byzantine fault tolerance. In: Proceedings of the 3rd Symposium on Operating Systems Design and Implementation; New Orleans (LA) USA: USENIX; 1999 Feb. p. 173\u2013186."},{"key":"e_1_3_5_46_1","unstructured":"Ongaro D Ousterhout J. In search of an understandable consensus algorithm. In: Proceedings of the 2014 USENIX Annual Technical Conference; Jun.; Philadelphia (PA) USA: USENIX; 2014. p. 305\u2013320."},{"key":"e_1_3_5_47_1","unstructured":"Back A. Hashcash -- a denial of service counter-measure; 2002. [cited 2023 Dec 30]. Available from: http:\/\/www.hashcash.org\/papers\/hashcash.pdf."},{"key":"e_1_3_5_48_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3467058"},{"key":"e_1_3_5_49_1","doi-asserted-by":"publisher","DOI":"10.1093\/ooenergy\/oiad012"},{"key":"e_1_3_5_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C55045.2021.00168"},{"key":"e_1_3_5_51_1","doi-asserted-by":"crossref","unstructured":"Treiblmaier H. Blockchain technology and sustainability. In: Abraham MA editor. Encyclopedia of sustainable technologies. 2nd ed.; Vol. 3. Amsterdam: Elsevier; 2024. p. 850\u2013860.","DOI":"10.1016\/B978-0-323-90386-8.00090-5"},{"key":"e_1_3_5_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06791-4_17"},{"key":"e_1_3_5_53_1","doi-asserted-by":"publisher","DOI":"10.1086\/256963"},{"key":"e_1_3_5_54_1","doi-asserted-by":"publisher","DOI":"10.2307\/1914083"},{"key":"e_1_3_5_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0531(75)90050-2"},{"key":"e_1_3_5_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-19955-5_31"},{"key":"e_1_3_5_57_1","doi-asserted-by":"publisher","DOI":"10.5209\/tekn.64523"},{"key":"e_1_3_5_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376660"},{"key":"e_1_3_5_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SYNCHROINFO49631.2020.9166109"},{"key":"e_1_3_5_60_1","article-title":"Decentralized blockchain technology and the rise of lex cryptographia","author":"Wright A","year":"2015","unstructured":"Wright A, De Filippi P. Decentralized blockchain technology and the rise of lex cryptographia. SSRN Electron J. 2015.","journal-title":"SSRN Electron J"},{"issue":"5","key":"e_1_3_5_61_1","first-page":"685","article-title":"Use of blockchain in governance: a systematic literature review","volume":"10","author":"Razzaq A","year":"2019","unstructured":"Razzaq A, Murad M, Talib R, et al. Use of blockchain in governance: a systematic literature review. Int J Adv Comput Sci Appl. 2019;10(5):685\u2013691.","journal-title":"Int J Adv Comput Sci Appl"},{"key":"e_1_3_5_62_1","doi-asserted-by":"publisher","DOI":"10.1561\/0700000071"},{"key":"e_1_3_5_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107299"},{"key":"e_1_3_5_64_1","doi-asserted-by":"publisher","DOI":"10.1177\/21582440211002526"},{"key":"e_1_3_5_65_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315211909-8"},{"key":"e_1_3_5_66_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2020.1759974"},{"issue":"4","key":"e_1_3_5_67_1","first-page":"446","article-title":"Blockchain governance and governance via blockchain: decentralized utopia or centralized dystopia?","volume":"6","author":"Cengiz F.","year":"2023","unstructured":"Cengiz F. Blockchain governance and governance via blockchain: decentralized utopia or centralized dystopia?. Policy Des Practice. 2023 Aug;6(4):446\u2013464.","journal-title":"Policy Des Practice"},{"key":"e_1_3_5_68_1","doi-asserted-by":"publisher","DOI":"10.3233\/IP-190154"},{"key":"e_1_3_5_69_1","doi-asserted-by":"publisher","DOI":"10.1142\/9789811239670_0003"},{"issue":"30","key":"e_1_3_5_70_1","first-page":"80","article-title":"Bitcoin, cryptocurrencies & the climate crisis","volume":"10","author":"Walsh M.","year":"2021","unstructured":"Walsh M. Bitcoin, cryptocurrencies & the climate crisis. Irish Marxist Rev. 2021;10(30):80\u201389.","journal-title":"Irish Marxist Rev"},{"key":"e_1_3_5_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37110-4_13"},{"key":"e_1_3_5_72_1","first-page":"59","article-title":"(de)centralization in the governance of blockchain systems: cryptocurrency cases","volume":"12","author":"Heo K","year":"2023","unstructured":"Heo K, Yi S. (de)centralization in the governance of blockchain systems: cryptocurrency cases. J Organ Des. 2023 Mar;12:59\u201382.","journal-title":"J Organ Des"},{"key":"e_1_3_5_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36504-4_9"},{"key":"e_1_3_5_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_10"},{"key":"e_1_3_5_75_1","unstructured":"Seuken S Parkes DC. Sybil-proof accounting mechanisms with transitive trust. In: Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent Systems; Paris France: ACM; 2014. p. 205\u2013212."},{"key":"e_1_3_5_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159945"},{"key":"e_1_3_5_77_1","unstructured":"Seuken S Parkes D. On the Sybil-proofness of accounting mechanisms. In: Proceedings of the 11th Workshop on the Economics of Networks Systems and Computation; San Jose (CA) USA; 2011 Jun. Available from: https:\/\/netecon.seas.harvard.edu\/NetEcon11\/Papers\/Seuken_netecon11.pdf."},{"key":"e_1_3_5_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2344013"},{"key":"e_1_3_5_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861382"},{"key":"e_1_3_5_80_1","unstructured":"Yee B Tygar JD. Secure coprocessors in electronic commerce applications. In: Proceedings of the 1st USENIX Workshop on Electronic Commerce; New York (NY) USA; 1995. p. 155\u2013170."},{"key":"e_1_3_5_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77525-8_333"},{"key":"e_1_3_5_82_1","doi-asserted-by":"publisher","DOI":"10.4064\/fm-3-1-76-108"},{"key":"e_1_3_5_83_1","doi-asserted-by":"publisher","DOI":"10.1090\/bull\/1935-41-10"},{"issue":"2","key":"e_1_3_5_84_1","first-page":"84","article-title":"Computer system attack classification","volume":"66","author":"Paulauskas N","year":"2006","unstructured":"Paulauskas N, Garsva E. Computer system attack classification. Elektron Elektrotech. 2006;66(2):84\u201387.","journal-title":"Elektron Elektrotech"},{"key":"e_1_3_5_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134434.3136559"},{"key":"e_1_3_5_86_1","unstructured":"QuantumMechanic. Proof of stake instead of proof of work; 2011. [cited 2023 Apr 28]. Available from: https:\/\/bitcointalk.org\/index.php?topic=27787.0."},{"key":"e_1_3_5_87_1","unstructured":"Buterin V. A next generation smart contract & decentralized application platform; 2014. [cited 2023 Apr 28]. Available from: https:\/\/blockchainlab.com\/pdf\/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalik-buterin.pdf."},{"key":"e_1_3_5_88_1","doi-asserted-by":"publisher","DOI":"10.3390\/commodities2020006"},{"key":"e_1_3_5_89_1","unstructured":"Ethereum Foundation. Proof-of-stake (PoS); 2024. [cited 2024 Feb 24]. Available from: https:\/\/ethereum.org\/developers\/docs\/consensus-mechanisms\/pos."},{"key":"e_1_3_5_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00215"}],"container-title":["International Journal of Parallel, Emergent and Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17445760.2024.2352740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T00:38:14Z","timestamp":1731976694000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17445760.2024.2352740"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,14]]},"references-count":89,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7,3]]}},"alternative-id":["10.1080\/17445760.2024.2352740"],"URL":"https:\/\/doi.org\/10.1080\/17445760.2024.2352740","relation":{},"ISSN":["1744-5760","1744-5779"],"issn-type":[{"value":"1744-5760","type":"print"},{"value":"1744-5779","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,14]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=gpaa20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=gpaa20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-01-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-04","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}