{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:39:36Z","timestamp":1767339576396,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1109\/icbc59979.2024.10634476","type":"proceedings-article","created":{"date-parts":[[2024,8,21]],"date-time":"2024-08-21T22:53:39Z","timestamp":1724280819000},"page":"377-385","source":"Crossref","is-referenced-by-count":6,"title":["From Slow Propagation to Partition: Analyzing Bitcoin Over Anonymous Routing"],"prefix":"10.1109","author":[{"given":"Nazmus","family":"Sakib","sequence":"first","affiliation":[{"name":"University of Colorado,Department of Computer Science,Colorado,Springs,USA,CO 80918"}]},{"given":"Simeon","family":"Wuthier","sequence":"additional","affiliation":[{"name":"University of Colorado,Department of Computer Science,Colorado,Springs,USA,CO 80918"}]},{"given":"Kelei","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Colorado,Department of Computer Science,Colorado,Springs,USA,CO 80918"}]},{"given":"Xiaobo","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Colorado,Department of Computer Science,Colorado,Springs,USA,CO 80918"}]},{"given":"Sang-Yoon","family":"Chang","sequence":"additional","affiliation":[{"name":"University of Colorado,Department of Computer Science,Colorado,Springs,USA,CO 80918"}]}],"member":"263","reference":[{"year":"2024","article-title":"The global crypto market cap, 2023","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/SP.2017.29"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/SP40000.2020.00027"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/3460120.3484568"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/978-3-031-47751-5_10"},{"year":"2015","article-title":"The peer eviction mechanism implementation of bitcoin core (august 2015)","key":"ref6"},{"year":"2020","article-title":"Supplying and using asmap to improve ip bucketing in addrman, 2020","key":"ref7"},{"year":"2020","article-title":"Try to preserve outbound block-relay-only connections during restart","key":"ref8"},{"key":"ref9","first-page":"1253","article-title":"On the Routing-Aware peering against Network-Eclipse attacks in bitcoin","volume-title":"in 30th USENIX Security Symposium (USENIX Security 21)","author":"Tran"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.14722\/ndss.2019.23252"},{"key":"ref11","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008","journal-title":"Decentralized business review"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/SP46215.2023.10179426"},{"year":"2014","author":"Antonopoulos","article-title":"Mastering Bitcoin: unlocking digital cryptocurrencies","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/3212998"},{"key":"ref15","first-page":"303","article-title":"Tor: The secondgeneration onion router","volume-title":"in USENIX security symposium","volume":"4","author":"Dingledine"},{"article-title":"The invisible internet project i2p","key":"ref16"},{"year":"2024","article-title":"bitcoin-network-logger","key":"ref17"},{"year":"2024","author":"Wuthier","article-title":"Positive reputation score for bitcoin p.2p network","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/SP.2012.35"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/978-3-642-03168-7_5"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2382196.2382208"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/978-3-642-14577-3_30"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/1866307.1866345"},{"year":"2018","author":"Imani","article-title":"Modified Relay Selection and Circuit Selection for Faster Tor","key":"ref24"},{"key":"ref25","first-page":"129","article-title":"Eclipse attacks on Bitcoin\u2019speer-to-peer network","volume-title":"in 24th USENIX security symposium (USENIX security 15","author":"Heilman"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TNET.2021.3105604"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/SP.2015.15"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/2660267.2660379"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1007\/978-3-030-02641-7_13"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/DAPPCON.2019.00019"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TEM.2020.2989170"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1007\/978-3-031-06975-8_20"}],"event":{"name":"2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","start":{"date-parts":[[2024,5,27]]},"location":"Dublin, Ireland","end":{"date-parts":[[2024,5,31]]}},"container-title":["2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10634319\/10634334\/10634476.pdf?arnumber=10634476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T11:41:28Z","timestamp":1725450088000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10634476\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icbc59979.2024.10634476","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]}}}