{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:22:09Z","timestamp":1775470929419,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Zurich Information Security Center"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813655","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"692-705","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":168,"title":["Tampering with the Delivery of Blocks and Transactions in Bitcoin"],"prefix":"10.1145","author":[{"given":"Arthur","family":"Gervais","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Hubert","family":"Ritzdorf","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Ghassan O.","family":"Karame","sequence":"additional","affiliation":[{"name":"NEC Laboratories Europe, Heidelberg, Germany"}]},{"given":"Srdjan","family":"Capkun","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bitcoin Wiki Available from https:\/\/en.bitcoin.it\/wiki\/. Bitcoin Wiki Available from https:\/\/en.bitcoin.it\/wiki\/."},{"key":"e_1_3_2_1_2_1","volume-title":"prevent peer flooding request queue for an inv","author":"Bitcoin","year":"2015"},{"key":"e_1_3_2_1_3_1","volume-title":"net: Better askfor request management","author":"Bitcoin","year":"2015"},{"key":"e_1_3_2_1_4_1","unstructured":"Bitcoin Mailing List - Peter Todd about how many pools use an additional relay network 2015. Available from: http:\/\/sourceforge.net\/p\/bitcoin\/mailman\/message\/34152876\/. Bitcoin Mailing List - Peter Todd about how many pools use an additional relay network 2015. Available from: http:\/\/sourceforge.net\/p\/bitcoin\/mailman\/message\/34152876\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Bitcoin market cap 2015. Available from: https:\/\/blockchain.info\/charts\/market-cap. Bitcoin market cap 2015. Available from: https:\/\/blockchain.info\/charts\/market-cap."},{"key":"e_1_3_2_1_6_1","unstructured":"Bitcoin Relay Network 2015. Available from: http:\/\/bitcoinrelaynetwork.org\/. Bitcoin Relay Network 2015. Available from: http:\/\/bitcoinrelaynetwork.org\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Bitcoin XT 2015. Available from: https:\/\/github.com\/bitcoinxt\/bitcoinxt. Bitcoin XT 2015. Available from: https:\/\/github.com\/bitcoinxt\/bitcoinxt."},{"key":"e_1_3_2_1_8_1","unstructured":"Double spending in Bitcoin 2015. Available from: https:\/\/medium.com\/@octskyward\/double-spending-in-bitcoin-be0f1d1e8008%. Double spending in Bitcoin 2015. Available from: https:\/\/medium.com\/@octskyward\/double-spending-in-bitcoin-be0f1d1e8008%."},{"key":"e_1_3_2_1_9_1","unstructured":"Stress Test Prepares VisaNet for the Most Wonderful Time of the Year 2015. Available from: http:\/\/goo.gl\/hba0oh. Stress Test Prepares VisaNet for the Most Wonderful Time of the Year 2015. Available from: http:\/\/goo.gl\/hba0oh."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_29"},{"key":"e_1_3_2_1_11_1","volume-title":"Felten. Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy","author":"Bonneau Joseph","year":"2015"},{"key":"e_1_3_2_1_12_1","volume-title":"Courtois and Lear Bahack. On subversive miner strategies and block withholding attack in bitcoin digital currency. CoRR, abs\/1402.1718","author":"Nicolas","year":"2014"},{"key":"e_1_3_2_1_13_1","volume-title":"Information Propagation in the Bitcoin Network. In 13-th IEEE International Conference on Peer-to-Peer Computing","author":"Decker C.","year":"2013"},{"key":"e_1_3_2_1_14_1","unstructured":"Bitcoin exchanges 2013. Available from: https:\/\/en.bitcoin.it\/wiki\/Exchanges. Bitcoin exchanges 2013. Available from: https:\/\/en.bitcoin.it\/wiki\/Exchanges."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1007\/978-3-662-45472-5_28","volume-title":"Financial Cryptography and Data Security","author":"Eyal Ittay","year":"2014"},{"key":"e_1_3_2_1_16_1","unstructured":"The Finney Attack 2013. Available from: https:\/\/en.bitcoin.it\/wiki\/Weaknesses#The_.22Finney.22_attack. The Finney Attack 2013. Available from: https:\/\/en.bitcoin.it\/wiki\/Weaknesses#The_.22Finney.22_attack."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.49"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664267"},{"key":"e_1_3_2_1_19_1","volume-title":"Eclipse attacks on bitcoin's peer-to-peer network","author":"Heilman E.","year":"2015"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382292"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2732196"},{"key":"e_1_3_2_1_22_1","volume-title":"Discovering bitcoin's public topology and influential nodes","author":"Miller Andrew","year":"2015"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813655","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:24Z","timestamp":1750225704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813655"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":22,"alternative-id":["10.1145\/2810103.2813655","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813655","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}