{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:12:12Z","timestamp":1760080332689,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Consejo Nacional de Ciencia y Tecnolog\u00eda"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3318041.3355471","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"89-109","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Competing (Semi-)Selfish Miners in Bitcoin"],"prefix":"10.1145","author":[{"given":"Francisco J.","family":"Marmolejo-Coss\u00edo","sequence":"first","affiliation":[{"name":"University of Oxford"}]},{"given":"Eric","family":"Brigham","sequence":"additional","affiliation":[{"name":"New College of Florida"}]},{"given":"Benjamin","family":"Sela","sequence":"additional","affiliation":[{"name":"University of Maryland"}]},{"given":"Jonathan","family":"Katz","sequence":"additional","affiliation":[{"name":"University of Maryland"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_2_1","volume-title":"On subversive miner strategies and block withholding attack in bitcoin digital currency. arXiv preprint arXiv:1402.1718","author":"Courtois Nicolas T","year":"2014","unstructured":"Nicolas T Courtois and Lear Bahack . 2014. On subversive miner strategies and block withholding attack in bitcoin digital currency. arXiv preprint arXiv:1402.1718 ( 2014 ). Nicolas T Courtois and Lear Bahack. 2014. On subversive miner strategies and block withholding attack in bitcoin digital currency. arXiv preprint arXiv:1402.1718 (2014)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.13"},{"key":"e_1_3_2_1_4_1","volume-title":"Emin G\u00fcn Sirer, and Robbert Van Renesse.","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal , Adem Efe Gencer , Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016 . Bitcoin-NG: A Scalable Blockchain Protocol.. In NSDI. 45--59. Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A Scalable Blockchain Protocol.. In NSDI. 45--59."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940716.2940773"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134019"},{"key":"e_1_3_2_1_8_1","volume-title":"Blockchain Mining Games with Pay Forward. In The World Wide Web Conference. ACM, 917--927","author":"Lazos Philip","year":"2019","unstructured":"Philip Lazos , Elias Koutsoupias , Foluso Ogunlana , and Paolo Serafino . 2019 . Blockchain Mining Games with Pay Forward. In The World Wide Web Conference. ACM, 917--927 . Philip Lazos, Elias Koutsoupias, Foluso Ogunlana, and Paolo Serafino. 2019. Blockchain Mining Games with Pay Forward. In The World Wide Web Conference. ACM, 917--927."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196512"},{"key":"e_1_3_2_1_10_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system."},{"key":"e_1_3_2_1_11_1","volume-title":"2016 IEEE European Symposium on. IEEE, 305--320","author":"Nayak Kartik","year":"2016","unstructured":"Kartik Nayak , Srijan Kumar , Andrew Miller , and Elaine Shi . 2016 . Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In Security and Privacy (EuroS&P) , 2016 IEEE European Symposium on. IEEE, 305--320 . Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. 2016. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In Security and Privacy (EuroS&P), 2016 IEEE European Symposium on. IEEE, 305--320."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"e_1_3_2_1_13_1","volume-title":"FC 2016, Christ Church","volume":"9603","author":"Sapirshtein Ayelet","year":"2016","unstructured":"Ayelet Sapirshtein , Yonatan Sompolinsky , and Aviv Zohar . 2016 . Optimal Selfish Mining Strategies in Bitcoin. In Financial Cryptography and Data Security - 20th International Conference , FC 2016, Christ Church , Barbados, February 22-26, 2016, Revised Selected Papers (Lecture Notes in Computer Science), Jens Grossklags and Bart Preneel (Eds.) , Vol. 9603 . Springer, 515--532. https:\/\/doi.org\/10.1007\/978-3-662-54970-4_30 10.1007\/978-3-662-54970-4_30 Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal Selfish Mining Strategies in Bitcoin. In Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers (Lecture Notes in Computer Science), Jens Grossklags and Bart Preneel (Eds.), Vol. 9603. Springer, 515--532. https:\/\/doi.org\/10.1007\/978-3-662-54970-4_30"},{"key":"e_1_3_2_1_14_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 515--532","author":"Sapirshtein Ayelet","year":"2016","unstructured":"Ayelet Sapirshtein , Yonatan Sompolinsky , and Aviv Zohar . 2016 . Optimal selfish mining strategies in bitcoin . In International Conference on Financial Cryptography and Data Security. Springer, 515--532 . Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security. Springer, 515--532."},{"key":"e_1_3_2_1_15_1","volume-title":"Blockchain Science: Distributed Ledger Technology","author":"Wattenhofer Roger","year":"2019","unstructured":"Roger Wattenhofer . 2019 . Blockchain Science: Distributed Ledger Technology . Inverted Forest Publishing . Roger Wattenhofer. 2019. Blockchain Science: Distributed Ledger Technology. Inverted Forest Publishing."}],"event":{"name":"AFT '19: 1st ACM Conference on Advances in Financial Technologies","sponsor":["ACM Association for Computing Machinery"],"location":"Zurich Switzerland","acronym":"AFT '19"},"container-title":["Proceedings of the 1st ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355471","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318041.3355471","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318041.3355471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:34Z","timestamp":1750268974000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355471"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":14,"alternative-id":["10.1145\/3318041.3355471","10.1145\/3318041"],"URL":"https:\/\/doi.org\/10.1145\/3318041.3355471","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}