{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:17:00Z","timestamp":1763968620462,"version":"3.41.0"},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2132700"],"award-info":[{"award-number":["2132700"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1109\/tit.2025.3557761","type":"journal-article","created":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T21:23:19Z","timestamp":1744060999000},"page":"4708-4731","source":"Crossref","is-referenced-by-count":2,"title":["Security, Latency, and Throughput of Proof-of-Work Nakamoto Consensus"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0132-2586","authenticated-orcid":false,"given":"Shu-Jie","family":"Cao","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Northwestern University, Evanston, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9000-3480","authenticated-orcid":false,"given":"Dongning","family":"Guo","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Northwestern University, Evanston, IL, USA"}]}],"member":"263","reference":[{"volume-title":"Mastering Bitcoin","year":"2017","author":"Antonopoulos","key":"ref1"},{"volume-title":"Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction","year":"2016","author":"Narayanan","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417290"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423365"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559368"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3479722.3480992"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3558535.3559791"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2024.3447576"},{"key":"ref9","article-title":"Transaction capacity, security and latency in blockchains","author":"Doger","year":"2024","journal-title":"arXiv:2402.10138"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ITW61385.2024.10806934"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3477314.3507003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.37"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_10"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484561"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3558535.3559777"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670347"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00027"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484568"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/15326349208807222"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108791"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC54727.2022.9805511"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/18\/11011509\/10955165-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/18\/11011509\/10955165.pdf?arnumber=10955165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T17:03:59Z","timestamp":1748019839000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10955165\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":24,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tit.2025.3557761","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"type":"print","value":"0018-9448"},{"type":"electronic","value":"1557-9654"}],"subject":[],"published":{"date-parts":[[2025,6]]}}}