{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T23:22:02Z","timestamp":1777591322904,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of Education, Singapore","award":["R-252-000-560-112"],"award-info":[{"award-number":["R-252-000-560-112"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813659","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"706-719","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":144,"title":["Demystifying Incentives in the Consensus Computer"],"prefix":"10.1145","author":[{"given":"Loi","family":"Luu","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Jason","family":"Teutsch","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Raghav","family":"Kulkarni","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Prateek","family":"Saxena","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. bitcoin.org","author":"Nakamoto Satoshi","year":"2009"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2014.0699"},{"key":"e_1_3_2_1_3_1","unstructured":"Rob Halford. Gridcoin: Crypto-currency using berkeley open infrastructure network computing grid as a proof of work. http:\/\/www.gridcoin.us\/images\/gridcoin-white-paper.pdf May 2014.  Rob Halford. Gridcoin: Crypto-currency using berkeley open infrastructure network computing grid as a proof of work. http:\/\/www.gridcoin.us\/images\/gridcoin-white-paper.pdf May 2014."},{"key":"e_1_3_2_1_4_1","unstructured":"Use case for factom: The world's first blockchain operating system (bos). http:\/\/kencode.de\/projects\/ePlug\/Factom-Linux-Whitepaper.pdf Feb 2015.  Use case for factom: The world's first blockchain operating system (bos). http:\/\/kencode.de\/projects\/ePlug\/Factom-Linux-Whitepaper.pdf Feb 2015."},{"key":"e_1_3_2_1_5_1","volume-title":"Ethereum's white paper. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper","author":"Foundation Ethereum","year":"2014"},{"key":"e_1_3_2_1_6_1","unstructured":"blockchain.info. Bitcoin average number of transactions per block. https:\/\/blockchain.info\/charts\/n-transactions-per-block.  blockchain.info. Bitcoin average number of transactions per block. https:\/\/blockchain.info\/charts\/n-transactions-per-block."},{"key":"e_1_3_2_1_7_1","unstructured":"Gavin Andresen. Why increasing the max block size is urgent. http:\/\/gavinandresen.ninja\/why-increasing-the-max-block-size-is-urgent May 2015.  Gavin Andresen. Why increasing the max block size is urgent. http:\/\/gavinandresen.ninja\/why-increasing-the-max-block-size-is-urgent May 2015."},{"key":"e_1_3_2_1_8_1","first-page":"71","volume-title":"Proceedings, Part II","author":"Thaler Justin","year":"2013"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090245"},{"key":"e_1_3_2_1_10_1","first-page":"253","volume-title":"19th Annual Network and Distributed System Security Symposium, NDSS","author":"Setty Srinath T. V.","year":"2012"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522733"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362805"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.47"},{"key":"e_1_3_2_1_15_1","volume-title":"SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. In IEEE Security and Privacy 2015","author":"Bonneau Joseph","year":"2015"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.37"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.34"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660380"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.35"},{"key":"e_1_3_2_1_21_1","first-page":"421","volume-title":"Proceedings, Part II","author":"Bentov Iddo","year":"2014"},{"key":"e_1_3_2_1_22_1","unstructured":"Nick Szabo. The idea of smart contracts. http:\/\/szabo.best.vwh.net\/smart_contracts_idea.html 1997.  Nick Szabo. The idea of smart contracts. http:\/\/szabo.best.vwh.net\/smart_contracts_idea.html 1997."},{"key":"e_1_3_2_1_23_1","unstructured":"Gavin Wood. Ethereum: A secure decentralised generalised transaction ledger. http:\/\/gavwood.com\/paper.pdf 2014.  Gavin Wood. Ethereum: A secure decentralised generalised transaction ledger. http:\/\/gavwood.com\/paper.pdf 2014."},{"key":"e_1_3_2_1_24_1","unstructured":"Andrew Miller James Litton Andrew Pachulski Neil Spring Neal Gupta Dave Levin and Bobby Bhattacharjee. Discovering Bitcoin's public topology and influential nodes. http:\/\/cs.umd.edu\/projects\/coinscope\/coinscope.pdf May 2015.  Andrew Miller James Litton Andrew Pachulski Neil Spring Neal Gupta Dave Levin and Bobby Bhattacharjee. Discovering Bitcoin's public topology and influential nodes. http:\/\/cs.umd.edu\/projects\/coinscope\/coinscope.pdf May 2015."},{"key":"e_1_3_2_1_25_1","volume-title":"Resource exhaustion attack in bitcoin. https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2013--2292","author":"NIST.","year":"2013"},{"key":"e_1_3_2_1_26_1","volume-title":"New bitcoin vulnerability: A transaction that takes at least 3 minutes to be verified by a peer. https:\/\/bitcointalk.org\/~topic=140078","author":"Lerner Sergio Demian","year":"2013"},{"key":"e_1_3_2_1_27_1","volume-title":"July","author":"Some","year":"2015"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1941487.1941509"},{"key":"e_1_3_2_1_29_1","unstructured":"Dana Ron. Property testing (a tutorial). http:\/\/www.eng.tau.ac.il\/ danar\/Public-pdf\/tut.pdf 2000.   Dana Ron. Property testing (a tutorial). http:\/\/www.eng.tau.ac.il\/ danar\/Public-pdf\/tut.pdf 2000."},{"key":"e_1_3_2_1_30_1","volume-title":"Combinatorial property testing (a survey). Electronic Colloquium on Computational Complexity (ECCC), 4(56)","author":"Goldreich Oded","year":"1997"},{"key":"e_1_3_2_1_31_1","series-title":"Colloq","first-page":"399","volume-title":"Probl\u00e8mes combinatoires et th\u00e9orie des graphes (Colloq. Internat. CNRS","author":"Szemer\u00e9di Endre","year":"1976"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1137\/050633445"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480199358655"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/296806.296824"},{"key":"e_1_3_2_1_35_1","volume-title":"April","author":"Mazieres David","year":"2015"},{"key":"e_1_3_2_1_36_1","unstructured":"Kwon Jae. Tendermint: Consensus without mining. http:\/\/jaekwon.com\/2014\/05\/11\/tendermint\/ May 2014.  Kwon Jae. Tendermint: Consensus without mining. http:\/\/jaekwon.com\/2014\/05\/11\/tendermint\/ May 2014."},{"key":"e_1_3_2_1_37_1","unstructured":"King Sunny and Nadal Scott. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. http:\/\/peercoin.net\/assets\/paper\/peercoin-paper.pdf August 2012.  King Sunny and Nadal Scott. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. http:\/\/peercoin.net\/assets\/paper\/peercoin-paper.pdf August 2012."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.34"},{"key":"e_1_3_2_1_39_1","volume-title":"Majority is not enough: Bitcoin mining is vulnerable. arXiv preprint arXiv:1311.0243","author":"Eyal Ittay","year":"2013"},{"key":"e_1_3_2_1_40_1","volume-title":"The 36th IEEE Symposium on Security and Privacy, SP '15","author":"Eyal Ittay","year":"2015"},{"key":"e_1_3_2_1_41_1","volume-title":"Workshop on the Economics of Information Security","author":"Kroll Joshua A.","year":"2013"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_44_1","volume-title":"July","author":"Response","year":"2015"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813659","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:24Z","timestamp":1750225704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813659"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":42,"alternative-id":["10.1145\/2810103.2813659","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813659","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}