{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T18:28:22Z","timestamp":1767983302163,"version":"3.49.0"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001321","name":"NRF","doi-asserted-by":"publisher","award":["2016K1A1A2912757"],"award-info":[{"award-number":["2016K1A1A2912757"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1109\/tnet.2023.3302955","type":"journal-article","created":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T18:11:33Z","timestamp":1692641493000},"page":"844-858","source":"Crossref","is-referenced-by-count":5,"title":["Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8762-4566","authenticated-orcid":false,"given":"Muhammad","family":"Saad","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Central Florida, Orlando, FL, USA"}]},{"given":"Afsah","family":"Anwar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Central Florida, Orlando, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2965-3940","authenticated-orcid":false,"given":"Srivatsan","family":"Ravi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Southern California, Los Angeles, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3227-2505","authenticated-orcid":false,"given":"David","family":"Mohaisen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Central Florida, Orlando, FL, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484561"},{"key":"ref2","first-page":"801","article-title":"FastKitten: Practical smart contracts on Bitcoin","volume-title":"Proc. USENIX Secur. Symp.","author":"Das"},{"key":"ref3","first-page":"783","article-title":"BITE: Bitcoin lightweight client privacy using trusted execution","volume-title":"Proc. USENIX Secur. Symp.","author":"Matetic"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354237"},{"key":"ref5","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"Nakamoto","year":"2008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_10"},{"key":"ref7","first-page":"454","article-title":"Analysis of the blockchain protocol in asynchronous networks","volume":"2016","author":"Pass","year":"2016"},{"key":"ref8","article-title":"Analysis of Nakamoto consensus","author":"Ren","year":"2019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2017.29"},{"key":"ref10","first-page":"54","article-title":"Discovering Bitcoin\u2019s public topology and influential nodes","author":"Miller","year":"2015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/p2p.2013.6688704"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2019.00086"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/icdcs.2019.00119"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_24"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/dsn.2017.44"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref17","first-page":"129","article-title":"Eclipse attacks on Bitcoin\u2019s peer-to-peer network","volume-title":"Proc. USENIX Secur. Symp.","author":"Heilman"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2016.32"},{"key":"ref19","volume-title":"Improved Bitcoin Core to Counter Hashsplit","year":"2020"},{"key":"ref20","article-title":"Measurement and analysis of the Bitcoin networks: A view from mining pools","author":"Wang","year":"2019","journal-title":"arXiv:1902.07549"},{"key":"ref21","volume-title":"Six Confirmation Practice in Bitcoin","author":"Community","year":"2019"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134019"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3213006"},{"key":"ref25","article-title":"On profitability of selfish mining","author":"Grunspan","year":"2018","journal-title":"arXiv:1805.08281"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_30"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/iscc50000.2020.9219639"},{"key":"ref28","first-page":"1","article-title":"SABRE: Protecting Bitcoin against routing attacks","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Apostolaki"},{"key":"ref29","volume-title":"Bitcoin Hash Rate Distribution"},{"key":"ref30","volume-title":"Bitnodes: Discovering All Reachable Nodes in Bitcoin","year":"2020"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/icdcs47774.2020.00039"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243814"},{"key":"ref33","article-title":"Double spend races","author":"Grunspan","year":"2017","journal-title":"arXiv:1702.02867"},{"key":"ref34","article-title":"Analysis of hashrate-based double spending","author":"Rosenfeld","year":"2014","journal-title":"arXiv:1402.2009"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11518-021-5515-3"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/infocom41043.2020.9155451"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/sp40000.2020.00027"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.16303"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/10439254\/10225481.pdf?arnumber=10225481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T21:16:25Z","timestamp":1709327785000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10225481\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":38,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2023.3302955","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2]]}}}