{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:52Z","timestamp":1750306252028,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,3]],"date-time":"2017-04-03T00:00:00Z","timestamp":1491177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,3]]},"DOI":"10.1145\/3019612.3019657","type":"proceedings-article","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T20:27:45Z","timestamp":1497558465000},"page":"444-449","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Handling bitcoin conflicts through a glimpse of structure"],"prefix":"10.1145","author":[{"given":"Thibaut","family":"Lajoie-Mazenc","sequence":"first","affiliation":[{"name":"CNRS, UMR, France"}]},{"given":"Romaric","family":"Ludinard","sequence":"additional","affiliation":[{"name":"ENSAI, UMR, France"}]},{"given":"Emmanuelle","family":"Anceaume","sequence":"additional","affiliation":[{"name":"CNRS, UMR, France"}]}],"member":"320","published-online":{"date-parts":[[2017,4,3]]},"reference":[{"volume-title":"https:\/\/blockchain.info. (2016). Online, accessed September 9th","key":"e_1_3_2_1_1_1","unstructured":"2016. Blockchain.info. https:\/\/blockchain.info. (2016). Online, accessed September 9th . 2016. Blockchain.info. https:\/\/blockchain.info. (2016). Online, accessed September 9th."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the International Conference on Advances in Computer Science (AETACS).","author":"Ahamad Shaikshakeel","year":"2013","unstructured":"Shaikshakeel Ahamad , Madhusoodhnan Nair , and Biju Varghese . 2013 . A Survey on Crypto Currencies . In Proceedings of the International Conference on Advances in Computer Science (AETACS). Shaikshakeel Ahamad, Madhusoodhnan Nair, and Biju Varghese. 2013. A Survey on Crypto Currencies. In Proceedings of the International Conference on Advances in Computer Science (AETACS)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2016.7778636"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2008.44"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185395.2185447"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27836-8_18"},{"key":"e_1_3_2_1_7_1","volume-title":"Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. In 6th International Workshop on Practice and Theory in Public Key Cryptography","author":"Boldyreva Alexandra","year":"2003","unstructured":"Alexandra Boldyreva . 2003 . Threshold Signatures , Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. In 6th International Workshop on Practice and Theory in Public Key Cryptography (2003). Alexandra Boldyreva. 2003. Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. In 6th International Workshop on Practice and Theory in Public Key Cryptography (2003)."},{"volume-title":"Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI).","author":"Castro M.","key":"e_1_3_2_1_8_1","unstructured":"M. Castro and B. Liskov . 1999. Practical Byzantine Fault Tolerance . In Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI). M. Castro and B. Liskov. 1999. Practical Byzantine Fault Tolerance. In Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2833312.2833321"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"e_1_3_2_1_11_1","volume-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal , Adem Efe Gencer , Emin G\u00fcn Sirer , and Robbert Van Renesse . 2016 . Bitcoin-NG: A scalable blockchain protocol . In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI). Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A scalable blockchain protocol. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_3_2_1_12_1","unstructured":"Neil Fincham. 2013. https:\/\/mineforeman.com\/2013\/03\/14\/what-the-fork-was-that-a-forking-post-mortem\/. (2013).  Neil Fincham. 2013. https:\/\/mineforeman.com\/2013\/03\/14\/what-the-fork-was-that-a-forking-post-mortem\/. (2013)."},{"volume-title":"Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques - Advances in Cryptology (EUROCRYPT).","author":"Garay J. A.","key":"e_1_3_2_1_13_1","unstructured":"J. A. Garay , A. Kiayias , and N. Leonardos . 2015. The Bitcoin Backbone Protocol: Analysis and Applications . In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques - Advances in Cryptology (EUROCRYPT). J. A. Garay, A. Kiayias, and N. Leonardos. 2015. The Bitcoin Backbone Protocol: Analysis and Applications. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques - Advances in Cryptology (EUROCRYPT)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755950"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831152"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382292"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2732196"},{"key":"e_1_3_2_1_18_1","volume-title":"25th USENIX Security Symposium.","author":"Kogias Eleftherios Kokoris","year":"2016","unstructured":"Eleftherios Kokoris Kogias , Philipp Jovanovic , Nicolas Gailly , Ismail Khoffi , Linus Gasser , and Bryan Ford . 2016 . Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing . In 25th USENIX Security Symposium. Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. In 25th USENIX Security Symposium."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294267"},{"key":"e_1_3_2_1_21_1","unstructured":"Andrew Miller and Joseph J LaViola  Jr. 2014. Anonymous byzantine consensus from moderately-hard puzzles: A model for bitcoin. http:\/\/bravenewcoin.com\/assets\/Whitepapers\/. (2014).  Andrew Miller and Joseph J LaViola Jr. 2014. Anonymous byzantine consensus from moderately-hard puzzles: A model for bitcoin. http:\/\/bravenewcoin.com\/assets\/Whitepapers\/. (2014)."},{"key":"e_1_3_2_1_22_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. (2008). Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"e_1_3_2_1_23_1","first-page":"881","article-title":"Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees","volume":"2013","author":"Sompolinsky Y.","year":"2013","unstructured":"Y. Sompolinsky and A. Zohar . 2013 . Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees , Not Chains. IACR Cryptology ePrint Archive 2013 (2013), 881 . Y. Sompolinsky and A. Zohar. 2013. Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains. IACR Cryptology ePrint Archive 2013 (2013), 881.","journal-title":"Not Chains. IACR Cryptology ePrint Archive"}],"event":{"name":"SAC 2017: Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Marrakech Morocco","acronym":"SAC 2017"},"container-title":["Proceedings of the Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3019612.3019657","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3019612.3019657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:57Z","timestamp":1750220637000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3019612.3019657"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,3]]},"references-count":22,"alternative-id":["10.1145\/3019612.3019657","10.1145\/3019612"],"URL":"https:\/\/doi.org\/10.1145\/3019612.3019657","relation":{},"subject":[],"published":{"date-parts":[[2017,4,3]]},"assertion":[{"value":"2017-04-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}