{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:32:49Z","timestamp":1730280769782,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T00:00:00Z","timestamp":1633305600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T00:00:00Z","timestamp":1633305600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T00:00:00Z","timestamp":1633305600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,4]]},"DOI":"10.1109\/lcn52139.2021.9524930","type":"proceedings-article","created":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T19:37:11Z","timestamp":1631043431000},"page":"9-16","source":"Crossref","is-referenced-by-count":6,"title":["Blockchain Layer Zero: Characterizing the Bitcoin Network through Measurements, Models, and Simulations"],"prefix":"10.1109","author":[{"given":"Elias","family":"Rohrer","sequence":"first","affiliation":[]},{"given":"Florian","family":"Tschorsch","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Shadow: Running tor in a box for accurate and efficient experimentation","author":"jansen","year":"2012","journal-title":"Proceedings of the Symposium on Network and Distributed System Security NDSS-95"},{"key":"ref38","article-title":"Shadow-bitcoin: Scalable simulation via direct execution of multi-threaded applications","author":"miller","year":"2015","journal-title":"CSET &#x2019;15 Proceedings of the 8th Workshop on Cyber Security Experimentation and Test"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_22"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-58387-6_24","article-title":"Decentralization in bitcoin and ethereum networks","author":"gencer","year":"2018","journal-title":"FC &#x2019;18 Proceedings of the 22nd International Conference on Financial Cryptography and Data Security"},{"key":"ref31","first-page":"87","article-title":"The bitcoin p2p network","author":"donet","year":"2014","journal-title":"BITCOIN &#x2019;14 Proceedings of the 1st Workshop on Bitcoin Research"},{"year":"2020","key":"ref30","article-title":"Bitcoin monitoring"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1007\/978-3-030-51280-4_31","article-title":"Exploring the monero peer-to-peer network","author":"cao","year":"2020","journal-title":"FC &#x2019;20 Proceedings of the 24th International Conference on Financial Cryptography and Data Security"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00041"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751297"},{"key":"ref34","article-title":"Measurement and analysis of the bit-coin networks: A view from mining pools","volume":"abs 1902 7549","author":"wang","year":"2019","journal-title":"CoRR"},{"year":"2019","key":"ref10","article-title":"Homepage"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1145\/3308897.3308956","article-title":"Blocksim: A simulation framework for blockchain systems","volume":"46","author":"alharby","year":"2018","journal-title":"Sigmetrics Performance Evaluation Review"},{"key":"ref11","article-title":"Deanonymization in the bitcoin P2P network","author":"fanti","year":"2017","journal-title":"NIPS &#x2019;17 Proceedings of 30th Annual Conference on Neural Information Processing Systems"},{"article-title":"Bip 130: Sendheaders message","year":"2015","author":"daftuar","key":"ref12"},{"article-title":"Bip 152: Compact block relay","year":"2016","author":"corallo","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","article-title":"Kademlia: A peer-to-peer information system based on the XOR metric","author":"maymounkov","year":"2002","journal-title":"IPTPS '02 Proceedings of the 1st International Workshop on Peer-to-Peer Systems"},{"year":"2019","key":"ref15","article-title":"Devp2p network protocols"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00040"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278542"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.49"},{"key":"ref19","article-title":"The looming threat of china: An analysis of chinese influence on bitcoin","volume":"abs 1810 2466","author":"kaiser","year":"2018","journal-title":"CoRR"},{"year":"2019","key":"ref28","article-title":"Hashrate distribution"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355469"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"ref6","first-page":"281","article-title":"The bitcoin backbone protocol: Analysis and applications","author":"garay","year":"2015","journal-title":"EUROCRYPT &#x2019;15 Proceedings of the 34th International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref29","first-page":"29","article-title":"Characterization of the bitcoin peer-to-peer network (2015-2018)","volume":"1","author":"neudecker","year":"2019","journal-title":"Technical report Karlsruhe"},{"key":"ref5","first-page":"106","article-title":"On scaling decentralized blockchains - a position paper","author":"croman","year":"2016","journal-title":"BITCOIN &#x2019;16 Proceedings of the 3rd Workshop on Bitcoin Research"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243814"},{"key":"ref7","first-page":"643","article-title":"Analysis of the blockchain protocol in asynchronous networks","author":"pass","year":"2017","journal-title":"EUROCRYPT 17 Proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"year":"2014","key":"ref2","article-title":"A next-generation smart contract and decentralized application platform"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845253"},{"journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System","year":"2008","author":"nakamoto","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LCN44214.2019.8990796"},{"year":"2020","key":"ref22","article-title":"TCPDUMP\/LIBPCAP public repository"},{"year":"2019","key":"ref21","article-title":"Homepage"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219639"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3078505.3078528"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751431"},{"year":"2019","key":"ref23","article-title":"Geoip geolite2 database"},{"key":"ref26","first-page":"527","article-title":"Network simulations with the ns-3 simulator","volume":"14","author":"henderson","year":"2008","journal-title":"SIGCOMM Demonstration"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.52"}],"event":{"name":"2021 IEEE 46th Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2021,10,4]]},"location":"Edmonton, AB, Canada","end":{"date-parts":[[2021,10,7]]}},"container-title":["2021 IEEE 46th Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9524874\/9524875\/09524930.pdf?arnumber=9524930","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:45:25Z","timestamp":1652197525000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9524930\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,4]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/lcn52139.2021.9524930","relation":{},"subject":[],"published":{"date-parts":[[2021,10,4]]}}}