{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:39:47Z","timestamp":1772041187340,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,2]]},"DOI":"10.1109\/cns59707.2023.10288911","type":"proceedings-article","created":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T17:47:13Z","timestamp":1698428833000},"page":"1-9","source":"Crossref","is-referenced-by-count":9,"title":["FAKEY: Fake Hashed Key Attack on Payment Channel Networks"],"prefix":"10.1109","author":[{"given":"Alvi Ataur","family":"Khalil","sequence":"first","affiliation":[{"name":"Florida International University,Department of Electrical and Computer Engineering,USA"}]},{"given":"Mohammad Ashiqur","family":"Rahman","sequence":"additional","affiliation":[{"name":"Florida International University,Department of Electrical and Computer Engineering,USA"}]},{"given":"Hisham A.","family":"Kholidy","sequence":"additional","affiliation":[{"name":"SUNY Polytechnic Institute,Department of Network and Computer Security,USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423248"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00046"},{"key":"ref15","article-title":"Anonymous multi-hop locks for blockchain scalability and interoperability","author":"malavolta","year":"2018","journal-title":"Cryptology ePrint Archive"},{"key":"ref14","article-title":"Htlcs considered harmful","author":"robinson","year":"2019","journal-title":"Proc Stanford Blockchain Conf"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58820-8_1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC54236.2022.00282"},{"key":"ref1","first-page":"21260","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2008","journal-title":"Decentralized Bus Rev"},{"key":"ref17","year":"0","journal-title":"Bitcoin wiki pcn"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9798003"},{"key":"ref19","year":"0","journal-title":"Bitcoin Wiki"},{"key":"ref18","first-page":"1","article-title":"How lightning&#x2019;s routing diminishes its anonymity","author":"kumble","year":"2021","journal-title":"Int Conference on Availability Reliability and Security"},{"key":"ref24","year":"0","journal-title":"Gas Price"},{"key":"ref23","year":"0","journal-title":"Remix-project"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.112620"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_14"},{"key":"ref22","article-title":"Time-dilation attacks on the lightning network","author":"riard","year":"2020","journal-title":"arXiv preprint arXiv 2006 01997"},{"key":"ref21","article-title":"General congestion attack on htlc-based payment channel networks","author":"lu","year":"2020","journal-title":"Cryptology ePrint Archive"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134093"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_18"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00080"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-51280-4_12","article-title":"Sok: Layer-two blockchain protocols","author":"gudgeon","year":"2020","journal-title":"Financial Cryptography and Data Security"},{"key":"ref3","article-title":"Ethereum: A secure decentralised generalised transaction ledger","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref6","article-title":"Atomic cross-chain swaps: development, trajectory and potential of non-monetary digital token swap facilities","author":"miraz","year":"2019","journal-title":"arXiv preprint arXiv 1902 04260"},{"key":"ref5","author":"poon","year":"2016","journal-title":"The bitcoin lightning network Scalable off-chain instant payments"}],"event":{"name":"2023 IEEE Conference on Communications and Network Security (CNS)","location":"Orlando, FL, USA","start":{"date-parts":[[2023,10,2]]},"end":{"date-parts":[[2023,10,5]]}},"container-title":["2023 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10288629\/10288642\/10288911.pdf?arnumber=10288911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T19:00:00Z","timestamp":1700506800000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10288911\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,2]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/cns59707.2023.10288911","relation":{},"subject":[],"published":{"date-parts":[[2023,10,2]]}}}