{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:56:49Z","timestamp":1771700209062,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/rtsi.2018.8548376","type":"proceedings-article","created":{"date-parts":[[2018,12,8]],"date-time":"2018-12-08T00:47:45Z","timestamp":1544230065000},"page":"1-6","source":"Crossref","is-referenced-by-count":14,"title":["Bitcoin Pool-Hopping Detection"],"prefix":"10.1109","author":[{"given":"Marianna","family":"Belotti","sequence":"first","affiliation":[]},{"given":"Sofiane","family":"Kirati","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Secci","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"meni","year":"2014","journal-title":"Analysis of hashrate-based double-spending"},{"key":"ref11","year":"2011","journal-title":"Optimal pool abuse strategy"},{"key":"ref12","year":"2018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4139-7_10"},{"key":"ref14","year":"2018","journal-title":"Statistics"},{"key":"ref4","author":"meni","year":"2011","journal-title":"Analysis of bitcoin pooled mining reward systems"},{"key":"ref3","first-page":"1967","article-title":"Bitcoin block withholding attack: Analysis and mitigation","volume":"8","author":"samiran","year":"2017","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref6","author":"ametrano","year":"2016","journal-title":"Hayek Money The Cryptocurrency Price Stability Solution"},{"key":"ref5","author":"antonopoulos","year":"2014","journal-title":"Mastering Bitcoin Unlocking Digital Crypto-Currencies"},{"key":"ref8","article-title":"An analysis of anonymity in bitcoin using p2p network traffic","author":"philip","year":"2014","journal-title":"International Conference on Financial Cryptography and Data Security"},{"key":"ref7","year":"2018","journal-title":"Transaction"},{"key":"ref2","article-title":"Incentive compatibility of bitcoin mining pool reward functions","author":"okke","year":"2016","journal-title":"International Conference on Financial Cryptography and Data Security"},{"key":"ref1","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref9","author":"pool","year":"2018","journal-title":"Reward System"}],"event":{"name":"2018 IEEE 4th International Forum on Research and Technology for Society and Industry (RTSI)","location":"Palermo","start":{"date-parts":[[2018,9,10]]},"end":{"date-parts":[[2018,9,13]]}},"container-title":["2018 IEEE 4th International Forum on Research and Technology for Society and Industry (RTSI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8528317\/8548348\/08548376.pdf?arnumber=8548376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T22:27:44Z","timestamp":1598221664000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8548376\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/rtsi.2018.8548376","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}