{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T20:39:22Z","timestamp":1768595962453,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/nca.2016.7778635","type":"proceedings-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T01:48:10Z","timestamp":1481593690000},"page":"310-317","source":"Crossref","is-referenced-by-count":79,"title":["The Blockchain Anomaly"],"prefix":"10.1109","author":[{"given":"Christopher","family":"Natoli","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Gramoli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2499772"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2833312.2833321"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"ref11","first-page":"305","article-title":"In search of an understandable consensus algorithm","author":"ongaro","year":"2014","journal-title":"2014 USENIX Annual Technical Conference (USENIX ATC 14)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/343477.343630"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45269-7_5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2016.21"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_10"},{"key":"ref17","article-title":"Hashcash - a denial of service counter-measure","author":"black","year":"2002","journal-title":"Tech Rep Cypherspace"},{"key":"ref18","article-title":"Ethereum: A secure decentralised generalised transaction ledger","author":"wood","year":"2015","journal-title":"yellow paper"},{"key":"ref19","author":"szabo","year":"1997","journal-title":"Formalizing and securing relationships on public networks"},{"key":"ref28","article-title":"vector76","year":"2011","journal-title":"The vector76 attack"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688717"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"ref6","first-page":"11","article-title":"Zookeeper: Wait-free coordination for internet-scale systems","author":"hunt","year":"2010","journal-title":"USENIX ATC"},{"key":"ref29","article-title":"The bitcoin lightning network: Scalable off-chain instant payments","author":"poon","year":"2016","journal-title":"draft Version 0 5 9 2"},{"key":"ref5","first-page":"507","article-title":"Secure high-rate transaction processing in bitcoin","author":"sompolinsky","year":"2015","journal-title":"Financial Cryptography and Data Security &#x2013; 19th International Conference FC 2015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2416-0_22"},{"key":"ref7","article-title":"Virtually synchronous methodology for dynamic service replication","author":"birman","year":"2010","journal-title":"Microsoft Research Tech Rep MSR-TR-2010-151"},{"key":"ref2","article-title":"Ethereum: A secure decentralised generalised transaction ledger final draft - under review","author":"wood","year":"2014"},{"key":"ref9","article-title":"On the danger of private blockchains","author":"gramoli","year":"2016","journal-title":"Workshop on Distributed Cryptocurrencies and Consensus Ledgers (DCCL)"},{"key":"ref1","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref20","author":"rosenfeld","year":"2012","journal-title":"Analysis of hashrate-based double-spending"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39028-4_9"},{"key":"ref21","article-title":"On scaling decentralized blockchains","author":"croman","year":"2016","journal-title":"3rd Workshop on Bitcoin Research (BITCOIN)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"ref26","first-page":"248","article-title":"Two bitcoins at the price of one? double-spending attacks on fast payments in bitcoin","volume":"2012","author":"karame","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref25","author":"finney","year":"2011","journal-title":"Finney's attack"}],"event":{"name":"2016 IEEE 15th International Symposium on Network Computing and Applications (NCA)","location":"Cambridge, Boston, MA, USA","start":{"date-parts":[[2016,10,31]]},"end":{"date-parts":[[2016,11,2]]}},"container-title":["2016 IEEE 15th International Symposium on Network Computing and Applications (NCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7764659\/7778571\/07778635.pdf?arnumber=7778635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T21:13:41Z","timestamp":1513199621000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7778635\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/nca.2016.7778635","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}