{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:09:10Z","timestamp":1740100150923,"version":"3.37.3"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100007225","name":"Ministry of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007225","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/icc42927.2021.9500338","type":"proceedings-article","created":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T20:49:21Z","timestamp":1628282961000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["B++: A High-Throughput Proof-of-Work based Blockchain with Eventual Consistency"],"prefix":"10.1109","author":[{"given":"Bing-Jyue","family":"Chen","sequence":"first","affiliation":[{"name":"National Taiwan University,Graduate Institute of Communication Engineering"}]},{"given":"Ting-Han","family":"Jian","sequence":"additional","affiliation":[{"name":"National Taiwan University,Department of Electrical Engineering"}]},{"given":"Tsung-Nan","family":"Lin","sequence":"additional","affiliation":[{"name":"National Taiwan University,Department of Electrical Engineering"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_33"},{"key":"ref11","first-page":"1159","article-title":"Spectre: A fast and scalable cryptocurrency protocol","volume":"2016","author":"sompolinsky","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref12","article-title":"Phantom: A scalable blockdag protocol","author":"sompolinsky","year":"2018","journal-title":"Cryptology EPrint Archive Report 2011"},{"key":"ref13","article-title":"Scaling nakamoto consensus to thousands of transactions per second","volume":"abs 1805 3870","author":"li","year":"2018","journal-title":"CoRR"},{"key":"ref14","article-title":"Blockguard: Adaptive blockchain security","volume":"abs 1907 13232","author":"rai","year":"2019","journal-title":"ArXiv"},{"key":"ref15","article-title":"An analysis of attacks on blockchain consensus","volume":"abs 1610 7985","author":"bissias","year":"2016","journal-title":"CoRR"},{"key":"ref16","article-title":"Profitable double-spending attacks","volume":"abs 1903 1711","author":"jang","year":"2019","journal-title":"CoRR"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2020.00028"},{"year":"2016","key":"ref18","article-title":"Proof of stake versus proof of work white paper"},{"key":"ref4","article-title":"On scaling decentralized blockchains - (a position paper)","author":"croman","year":"2016","journal-title":"Financial Cryptography Workshops"},{"key":"ref3","article-title":"Analysis of hashrate-based double spending","volume":"abs 1402 2009","author":"rosenfeld","year":"2014","journal-title":"CoRR"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3316481"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363213"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1145\/3243734.3243853","article-title":"Rapidchain: Scaling blockchain via full sharding","author":"zamani","year":"2018"},{"article-title":"Ethereum: A secure decentralised generalised transaction ledger eip-150 revision (759dccd - 2017-08-07)","year":"2017","author":"wood","key":"ref2"},{"key":"ref1","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2009","journal-title":"Cryptography Mailing list"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_32"}],"event":{"name":"ICC 2021 - IEEE International Conference on Communications","start":{"date-parts":[[2021,6,14]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2021,6,23]]}},"container-title":["ICC 2021 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9500243\/9500244\/09500338.pdf?arnumber=9500338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:08:00Z","timestamp":1659485280000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9500338\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icc42927.2021.9500338","relation":{},"subject":[],"published":{"date-parts":[[2021,6]]}}}