{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:19Z","timestamp":1750220779530,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Chinese National Research Fund (NSFC)","award":["No.61702330"],"award-info":[{"award-number":["No.61702330"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384754","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:22Z","timestamp":1601915602000},"page":"572-583","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Rational Manager in Bitcoin Mining Pool: Dynamic Strategies to Gain Extra Rewards"],"prefix":"10.1145","author":[{"given":"Feifan","family":"Yu","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Na","family":"Ruan","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Siyuan","family":"Cheng","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Joseph Boneaau and Andrew Miller. 2015. Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. Security & Privacy(2015).  Joseph Boneaau and Andrew Miller. 2015. Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. Security & Privacy(2015).","DOI":"10.1109\/SP.2015.14"},{"volume-title":"On the Security and Performance of Proof-of-Work Blockchains. ACM Conference on Computer and Communications Security(2016)","author":"Arthur","key":"e_1_3_2_2_2_1"},{"key":"e_1_3_2_2_3_1","unstructured":"Ayelet Sapirshiten et al. 2016. Optimal Selfish Mining Strategies in Bitcoin. Financial Cryptography(2016).  Ayelet Sapirshiten et al. 2016. Optimal Selfish Mining Strategies in Bitcoin. Financial Cryptography(2016)."},{"volume-title":"Information Propagation in the Bitcoin Network. International Conference on Peer-to-peer Computing, IEEE(2013)","author":"Christian","key":"e_1_3_2_2_4_1"},{"volume-title":"Proc. of the USENIX Security Symposium (Security)(2015)","author":"Ethan","key":"e_1_3_2_2_5_1"},{"volume-title":"On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining. Computer Security Foundations Symposium, IEEE(2015)","author":"Loi","key":"e_1_3_2_2_6_1"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Okke Schrijvers et al. 2016. Incentive Compatibility of Bitcoin Mining Pool Reward Functions. Financial Cryptography(2016).  Okke Schrijvers et al. 2016. Incentive Compatibility of Bitcoin Mining Pool Reward Functions. Financial Cryptography(2016).","DOI":"10.1007\/978-3-662-54970-4_28"},{"volume-title":"Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System. ACM Conference on Computer and Communications Security(2019)","author":"Shang","key":"e_1_3_2_2_8_1"},{"volume-title":"Be Selfish and Avoid Dilemmas: Fork After Withholding(FAW) Attacks on Bitcoin. ACM Conference on Computer and Communications Security(2017)","author":"Yujin","key":"e_1_3_2_2_9_1"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Ittay Eyal. 2015. The Miner's Dilemma. Security & Privacy(2015).  Ittay Eyal. 2015. The Miner's Dilemma. Security & Privacy(2015).","DOI":"10.1109\/SP.2015.13"},{"volume-title":"Enough: Bitcoin Mining is Vulnerable. Financial Cryptography(2014).","year":"2014","author":"Eyal I.","key":"e_1_3_2_2_11_1"},{"volume-title":"On the Strategy and Behavior of Bitcoin Mining with N-attackers. ACM Asia Conference on Computer and Communications Security(2018)","year":"2018","author":"Liu Hanqing","key":"e_1_3_2_2_12_1"},{"volume-title":"Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. European Security & Privacy(2016).","year":"2016","author":"Nayak Kartik","key":"e_1_3_2_2_13_1"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"ASIA CCS '20"},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384754","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:28Z","timestamp":1750200088000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384754"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":13,"alternative-id":["10.1145\/3320269.3384754","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384754","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}