{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:15:57Z","timestamp":1762506957843,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/nca.2016.7778636","type":"proceedings-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T01:48:10Z","timestamp":1481593690000},"page":"318-325","source":"Crossref","is-referenced-by-count":31,"title":["Safety analysis of Bitcoin improvement proposals"],"prefix":"10.1109","author":[{"given":"Emmanuelle","family":"Anceaume","sequence":"first","affiliation":[]},{"given":"Thibaut","family":"Lajoie-Mazenc","sequence":"additional","affiliation":[]},{"given":"Romaric","family":"Ludinard","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Sericola","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382292"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2732196"},{"key":"ref12","article-title":"Poster: Bitcoin meets collective signing","author":"kokoris-kogias","year":"2016","journal-title":"Proceedings of the IEEE Symposium on Security and Privacy (S&P)"},{"key":"ref13","article-title":"Enhancing bitcoin security and performance with strong consistency via collective signing","author":"kokoris-kogias","year":"2016","journal-title":"Proceedings of 14th USENIX Security Symposium (USENIX Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294267"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"journal-title":"Global Decentralized currency based on blockchain technology","article-title":"Litecoin","year":"2011","key":"ref16"},{"journal-title":"Namecoin","year":"2014","author":"loibl","key":"ref17"},{"article-title":"CoinJoin: Bitcoin privacy for the real world","year":"2013","author":"maxwell","key":"ref18"},{"journal-title":"Anonymous Byzantine Consensus from Moderately-Hard Puzzles A Model for Bitcoin","year":"2014","author":"miller","key":"ref19"},{"key":"ref4","article-title":"Practical Byzantine Fault Tolerance","author":"castro","year":"1999","journal-title":"Proc Operating System Design and Implementation (OSDI)"},{"key":"ref3","article-title":"A survey on crypto currencies","author":"ahamad","year":"2013","journal-title":"Proceedings of the International Conference on Advances in Computer Science(AETACS)"},{"key":"ref6","article-title":"Bitcoin-ng: A scalable blockchain protocol","author":"eyal","year":"2016","journal-title":"USENIX Symposium on Networked Systems Design and Implementation"},{"key":"ref5","article-title":"Bitcoin Meets Strong Consistency","author":"decker","year":"2016","journal-title":"Proceedings of the International Conference on Distributed Computing and Networking (ICDCN)"},{"key":"ref8","article-title":"The bitcoin backbone protocol: Analysis and applications","author":"garay","year":"2015","journal-title":"Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques - Advances in Cryptology (EUROCRYPT)"},{"year":"0","author":"fincham","key":"ref7"},{"year":"2016","key":"ref2","article-title":"BlockTrail - Bitcoin API and Block Explorer"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755950"},{"year":"2016","key":"ref1","article-title":"Bitcoin Network Hashrate"},{"journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System","year":"2008","author":"nakamoto","key":"ref20"},{"key":"ref22","article-title":"Accelerating bitcoin's transaction processing. fast money grows on trees, not chains","volume":"2013","author":"sompolinsky","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref21","article-title":"Coinshuffle: Practical decentralized coin mixing for bitcoin","author":"ruffing","year":"2014","journal-title":"Proceedings of European Symposium on Research in Computer Security (ESORICS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.38"},{"journal-title":"Ppcoin Peer-to-peer Crypto-currency with Proof-of-stake","year":"2012","author":"king","key":"ref23"},{"article-title":"Ethereum: A secure decentralised generalised transaction ledger","year":"0","author":"wood","key":"ref25"}],"event":{"name":"2016 IEEE 15th International Symposium on Network Computing and Applications (NCA)","start":{"date-parts":[[2016,10,31]]},"location":"Cambridge, Boston, MA, USA","end":{"date-parts":[[2016,11,2]]}},"container-title":["2016 IEEE 15th International Symposium on Network Computing and Applications (NCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7764659\/7778571\/07778636.pdf?arnumber=7778636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T20:15:54Z","timestamp":1513196154000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7778636\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/nca.2016.7778636","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}