{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T19:17:29Z","timestamp":1777490249870,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978341","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"3-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1204,"title":["On the Security and Performance of Proof of Work Blockchains"],"prefix":"10.1145","author":[{"given":"Arthur","family":"Gervais","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Ghassan O.","family":"Karame","sequence":"additional","affiliation":[{"name":"NEC Laboratories, Heidelberg, Germany"}]},{"given":"Karl","family":"W\u00fcst","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Vasileios","family":"Glykantzis","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Hubert","family":"Ritzdorf","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Srdjan","family":"Capkun","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bitcoin block size limit controversy 2016. Available from: https:\/\/en.bitcoin.it\/wiki\/Block_size_limit_controversy. Bitcoin block size limit controversy 2016. Available from: https:\/\/en.bitcoin.it\/wiki\/Block_size_limit_controversy."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660310"},{"key":"e_1_3_2_1_3_1","unstructured":"Bitnodes. Bitnodes ip crawler. Available from: https:\/\/github.com\/ayeowch\/bitnodes. Bitnodes. Bitnodes ip crawler. Available from: https:\/\/github.com\/ayeowch\/bitnodes."},{"key":"e_1_3_2_1_4_1","volume-title":"A next-generation smart contract and decentralized application platform","author":"Buterin V.","year":"2014"},{"key":"e_1_3_2_1_5_1","first-page":"173","volume-title":"OSDI","volume":"99","author":"Castro Miguel","year":"1999"},{"key":"e_1_3_2_1_6_1","unstructured":"Coinmarketcap. Coinmarketcap. Available from: https:\/\/coinmarketcap.com\/. Coinmarketcap. Coinmarketcap. Available from: https:\/\/coinmarketcap.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Matt Corallo. Bitcoin relay network. Available from: http:\/\/bitcoinrelaynetwork.org\/. Matt Corallo. Bitcoin relay network. Available from: http:\/\/bitcoinrelaynetwork.org\/."},{"key":"e_1_3_2_1_8_1","volume-title":"Courtois and Lear Bahack. On subversive miner strategies and block withholding attack in bitcoin digital currency. CoRR, abs\/1402.1718","author":"Nicolas","year":"2014"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_8"},{"key":"e_1_3_2_1_10_1","volume-title":"Information Propagation in the Bitcoin Network. In 13-th IEEE International Conference on Peer-to-Peer Computing","author":"Decker C.","year":"2013"},{"key":"e_1_3_2_1_11_1","unstructured":"Ethereum. Ethereum tie breaking. Available from: https:\/\/github.com\/ethereum\/go-ethereum\/commit\/bcf565730b1816304947021080981245d084a930. Ethereum. Ethereum tie breaking. Available from: https:\/\/github.com\/ethereum\/go-ethereum\/commit\/bcf565730b1816304947021080981245d084a930."},{"key":"e_1_3_2_1_12_1","unstructured":"Ethereum. ethernodes. Available from: https:\/\/www.ethernodes.org\/network\/1. Ethereum. ethernodes. Available from: https:\/\/www.ethernodes.org\/network\/1."},{"key":"e_1_3_2_1_13_1","unstructured":"Ethereum. ethstats. Available from: https:\/\/ethstats.net\/. Ethereum. ethstats. Available from: https:\/\/ethstats.net\/."},{"key":"e_1_3_2_1_14_1","volume-title":"Emin Gun Sirer, and Robbert van Renesse. Bitcoin-ng: A scalable blockchain protocol. arXiv preprint arXiv:1510.02037","author":"Eyal Ittay","year":"2015"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1007\/978-3-662-45472-5_28","volume-title":"Financial Cryptography and Data Security","author":"Eyal Ittay","year":"2014"},{"key":"e_1_3_2_1_16_1","unstructured":"The Finney Attack 2013. Available from: https:\/\/en.bitcoin.it\/wiki\/Weaknesses#The_.22Finney.22_attack. The Finney Attack 2013. Available from: https:\/\/en.bitcoin.it\/wiki\/Weaknesses#The_.22Finney.22_attack."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813655"},{"key":"e_1_3_2_1_19_1","volume-title":"Eclipse attacks on bitcoin's peer-to-peer network","author":"Heilman E.","year":"2015"},{"key":"e_1_3_2_1_20_1","volume-title":"Dynamic Probabilistic Systems, Volume I: Markov Models","author":"Howard Ronald A","year":"2012"},{"key":"e_1_3_2_1_21_1","unstructured":"IBM. Ibm openblockchain. Available from: http:\/\/www.ibm.com\/blockchain\/. IBM. Ibm openblockchain. Available from: http:\/\/www.ibm.com\/blockchain\/."},{"key":"e_1_3_2_1_22_1","unstructured":"Intel. Proof of elapsed time (poet). Available from: http:\/\/intelledger.github.io\/. Intel. Proof of elapsed time (poet). Available from: http:\/\/intelledger.github.io\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382292"},{"key":"e_1_3_2_1_24_1","volume-title":"Linear Algebra for Undergraduates","author":"Kemeny John G","year":"1974"},{"key":"e_1_3_2_1_25_1","first-page":"279","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Kogias Eleftherios Kokoris","year":"2016"},{"key":"e_1_3_2_1_26_1","unstructured":"D. Mazieres. The stellar consensus protocol: A federated model for internet-level consensus. Available from: https:\/\/www.stellar.org\/papers\/stellar-consensus-protocol.pdf. D. Mazieres. The stellar consensus protocol: A federated model for internet-level consensus. Available from: https:\/\/www.stellar.org\/papers\/stellar-consensus-protocol.pdf."},{"key":"e_1_3_2_1_27_1","unstructured":"Andrew Miller James Litton Andrew Pachulski Neal Gupta Dave Levin Neil Spring and Bobby Bhattacharjee. Discovering bitcoin's public topology and influential nodes. Andrew Miller James Litton Andrew Pachulski Neal Gupta Dave Levin Neil Spring and Bobby Bhattacharjee. Discovering bitcoin's public topology and influential nodes."},{"key":"e_1_3_2_1_28_1","first-page":"2","volume-title":"Bitcoin: A","author":"Nakamoto S.","year":"2009"},{"key":"e_1_3_2_1_29_1","volume-title":"IACR Cryptology ePrint Archive","author":"Nayak Kartik","year":"2015"},{"key":"e_1_3_2_1_30_1","unstructured":"QuantumMechanic. Proof of stake. Available from: https:\/\/bitcointalk.org\/index.php?topic=27787.0. QuantumMechanic. Proof of stake. Available from: https:\/\/bitcointalk.org\/index.php?topic=27787.0."},{"key":"e_1_3_2_1_31_1","volume-title":"Analysis of hashrate-based double spending. arXiv preprint arXiv:1402.2009","author":"Rosenfeld Meni","year":"2014"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 2016 Conference on Financial Crypto (FC)","author":"Sapirshtein Ayelet","year":"2016"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"e_1_3_2_1_34_1","unstructured":"testmy.net. testmy.net. Available from: http:\/\/testmy.net\/country. testmy.net. testmy.net. Available from: http:\/\/testmy.net\/country."},{"key":"e_1_3_2_1_35_1","unstructured":"Jonathan Toomim. blocktorrent. Available from: http:\/\/lists.linuxfoundation.org\/pipermail\/bitcoin-dev\/2015-September\/011176.html. Jonathan Toomim. blocktorrent. Available from: http:\/\/lists.linuxfoundation.org\/pipermail\/bitcoin-dev\/2015-September\/011176.html."},{"key":"e_1_3_2_1_36_1","unstructured":"Verizon. Verizon latency. Available from: http:\/\/www.verizonenterprise.com\/about\/network\/latency\/. Verizon. Verizon latency. Available from: http:\/\/www.verizonenterprise.com\/about\/network\/latency\/."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the IFIP WG 11.4 Workshop iNetSec 2015","author":"Vukolic Marko","year":"2015"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978341","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:14Z","timestamp":1750218014000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978341"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":37,"alternative-id":["10.1145\/2976749.2978341","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978341","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}