{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:56:20Z","timestamp":1730210180792,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T00:00:00Z","timestamp":1641254400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T00:00:00Z","timestamp":1641254400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,4]]},"DOI":"10.1109\/comsnets53615.2022.9668572","type":"proceedings-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T20:39:03Z","timestamp":1642106343000},"page":"147-155","source":"Crossref","is-referenced-by-count":0,"title":["Securely Improving Stability and Performance of PoW Blockchains Using Anchors"],"prefix":"10.1109","author":[{"given":"Ovia","family":"Seshadri","sequence":"first","affiliation":[]},{"given":"Vinay J","family":"Ribeiro","sequence":"additional","affiliation":[]},{"given":"Shadab","family":"Zafar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/P2P.2013.6688704"},{"year":"2019","journal-title":"Global Ping Statistics WonderNetwork","key":"ref38"},{"key":"ref33","first-page":"943","article-title":"Analysis of nakamoto consensus","volume":"2019","author":"ren","year":"2019","journal-title":"IACR Cryptol ePrint Arch"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/3243734.3243814"},{"year":"0","journal-title":"Bitcoin hashrate distribution - blockchain info","key":"ref31"},{"key":"ref30","article-title":"6.262 Discrete stochastic processes, Spring 2011 Chapter 7: Random Walks, Large Deviations, and Martingales","author":"gallager","year":"0","journal-title":"Massachusetts Institute of Technology MIT OpenCourseWare"},{"key":"ref37","first-page":"45","article-title":"Bitcoin-NG: A Scalable Blockchain Protocol","volume":"2016","author":"eyal","year":"0","journal-title":"NSDI"},{"year":"2018","journal-title":"Bitcoin Project","key":"ref36"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1145\/3427921.3450247"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1145\/3372297.3423365"},{"key":"ref10","article-title":"Analysis of hashrate-based double spending","author":"rosenfeld","year":"2014","journal-title":"ArXiv Preprint"},{"key":"ref40","first-page":"1019","article-title":"Speed-Security Tradeoffs in Blockchain Protocols","volume":"2015","author":"kiayias","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/2732196"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/3212998"},{"key":"ref13","first-page":"515","article-title":"Optimal selfish mining strategies in bitcoin","author":"sapirshtein","year":"0","journal-title":"International Conference on Financial Cryptography and Data Security"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/EuroSP.2016.32"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/2976749.2978408"},{"key":"ref16","article-title":"The balance attack against proof-of-work blockchains: The R3 testbed as an example","author":"natoli","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref17","first-page":"129","article-title":"Eclipse Attacks on Bitcoin's Peer-to-Peer Network","author":"heilman","year":"0","journal-title":"USENIX Security Symposium"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"ref19","article-title":"Incentivizing double-spend collusion in bitcoin","author":"liao","year":"0","journal-title":"Financial Cryptography 4th Bitcoin Workshop"},{"key":"ref28","first-page":"919","article-title":"Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis","author":"lewenberg","year":"2015","journal-title":"Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems ser AAMAS '15"},{"key":"ref4","article-title":"Primecoin: Cryptocurrency with prime number proof-of-work","author":"king","year":"0","journal-title":"7th July"},{"year":"2010","journal-title":"Mining cartel attack","key":"ref27"},{"year":"0","journal-title":"Litecoin-Open source P2P digital currency","key":"ref3"},{"year":"2018","author":"sompolinsky","journal-title":"Phantom A scalable blockdag protocol","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/3372297.3417290"},{"key":"ref5","first-page":"1159","article-title":"SPECTRE: A Fast and Scalable Cryptocurrency Protocol","volume":"2016","author":"sompolinsky","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/3319535.3363213"},{"key":"ref7","first-page":"515","article-title":"A decentralized blockchain with high throughput and fast confirmation","author":"li","year":"0","journal-title":"2020 (USEMX) Annual Technical Conference ((USENIX)(ATC) 20)"},{"year":"2013","author":"buterin","journal-title":"Ethereum white paper 2014","key":"ref2"},{"key":"ref9","article-title":"OHIE: blockchain scaling made simple","author":"yu","year":"2018","journal-title":"ArXiv Preprint"},{"year":"2008","author":"nakamoto","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/SP.2015.14"},{"key":"ref45","first-page":"415","article-title":"Flux: Revisiting Near Blocks for Proof-of-Work Blockchains","volume":"2018","author":"zamyatin","year":"2018","journal-title":"IACR Cryptology ePrint Archive"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/2382196.2382292"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/978-3-662-53357-4_8"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1007\/978-3-662-47854-7_32"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/3087801.3087809"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1007\/978-3-662-47854-7_33"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/978-3-319-56614-6_22"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.5195\/LEDGER.2016.40"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/SP.2015.13"},{"year":"2015","author":"andresen","journal-title":"[bitcoin-dev] Weak block thoughts&#x2026;","key":"ref43"},{"key":"ref25","article-title":"StrongChain: Transparent and Collaborative Proof-of-Work Consensus","author":"szalachowski","year":"2019","journal-title":"ArXiv Preprint"}],"event":{"name":"2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS)","start":{"date-parts":[[2022,1,4]]},"location":"Bangalore, India","end":{"date-parts":[[2022,1,8]]}},"container-title":["2022 14th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9668311\/9667790\/09668572.pdf?arnumber=9668572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T21:22:16Z","timestamp":1650921736000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9668572\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,4]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/comsnets53615.2022.9668572","relation":{},"subject":[],"published":{"date-parts":[[2022,1,4]]}}}