{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T15:24:23Z","timestamp":1774797863675,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T00:00:00Z","timestamp":1583971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-FE0031745"],"award-info":[{"award-number":["DE-FE0031745"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,12]]},"DOI":"10.1145\/3390566.3391673","type":"proceedings-article","created":{"date-parts":[[2020,5,30]],"date-time":"2020-05-30T04:39:23Z","timestamp":1590813563000},"page":"13-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["The Impact of Block Parameters on the Throughput and Security of Blockchains"],"prefix":"10.1145","author":[{"given":"Elham","family":"Akbari","sequence":"first","affiliation":[{"name":"Cleveland State University, USA, Cleveland, OH"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wenbing","family":"Zhao","sequence":"additional","affiliation":[{"name":"Cleveland State University, USA, Cleveland, OH"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shunkun","family":"Yang","sequence":"additional","affiliation":[{"name":"Beihang University, School of Reliability and Systems Engineering, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiong","family":"Luo","sequence":"additional","affiliation":[{"name":"University of Science and Technology Beijing, Beijing Key Lab of Knowledge Engr. for Materials Sci., Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. http:\/\/www.bitcoin.org."},{"key":"e_1_3_2_1_2_1","volume-title":"On Consensus in Public Blockchains. In Proceedings of the 2019 International Conference on Blockchain Technology","author":"Zhao W.","year":"2019","unstructured":"Zhao, W., Yang, S., & Luo, X. (2019, March). On Consensus in Public Blockchains. In Proceedings of the 2019 International Conference on Blockchain Technology (Honolulu, Hawaii, USA, March 2019). ACM, 1--5."},{"key":"e_1_3_2_1_3_1","volume-title":"Building dependable distributed systems","author":"Zhao W.","unstructured":"Zhao, W. 2014. Building dependable distributed systems. John Wiley & Sons."},{"key":"e_1_3_2_1_4_1","first-page":"6","article-title":"Low latency fault tolerance system","volume":"56","author":"Zhao W.","year":"2012","unstructured":"Zhao, W., Melliar-Smith, P. M., & Moser, L. E. 2012. Low latency fault tolerance system. The Computer Journal, 56, 6 (June 2012), 716--740.","journal-title":"The Computer Journal"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/17445760.2015.1078802"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2014.17"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/computers6020013"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.11.006"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.292"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.57"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896108"},{"key":"e_1_3_2_1_13_1","unstructured":"Kiayias A. & Panagiotakos G. 2015. Speed-Security Tradeoffs in Blockchain Protocols. IACR Cryptology ePrint Archive (2015) 1019."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI.2017.34"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the International Conference on Financial Cryptography and Data Security (February","author":"Sapirshtein A.","year":"2016","unstructured":"Sapirshtein, A., Sompolinsky, Y., & Zohar, A. 2016. Optimal selfish mining strategies in bitcoin. In Proceedings of the International Conference on Financial Cryptography and Data Security (February 2016). Springer, Berlin, Heidelberg. 515--532."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_3_2_1_19_1","volume-title":"Tech. Rep.","author":"Poon J.","year":"2016","unstructured":"Poon, J. and Dryja, T. 2016. The bitcoin lightning network: Scalable offchain instant payments, Lightning Labs, Tech. Rep., Nov. 2016"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3390566.3391672"},{"key":"e_1_3_2_1_21_1","volume-title":"Mastering Bitcoin: unlocking digital cryptocurrencies","author":"Antonopoulos A. M.","unstructured":"Antonopoulos, A. M. 2014. Mastering Bitcoin: unlocking digital cryptocurrencies. O'Reilly Media, Inc."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212998"},{"key":"e_1_3_2_1_24_1","volume-title":"From Blockchain to Internet-Based Voting (Masters dissertation","author":"Akbari E.","unstructured":"Akbari, E. 2018. From Blockchain to Internet-Based Voting (Masters dissertation, Cleveland State University)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2856241"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2854549"}],"event":{"name":"ICBCT'20: 2020 The 2nd International Conference on Blockchain Technology","location":"Hilo HI USA","acronym":"ICBCT'20","sponsor":["Shanghai Jiao Tong University Shanghai Jiao Tong University","Huazhong University of Science and Technology"]},"container-title":["Proceedings of the 2020 2nd International Conference on Blockchain Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3390566.3391673","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3390566.3391673","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3390566.3391673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:36Z","timestamp":1750199916000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3390566.3391673"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,12]]},"references-count":26,"alternative-id":["10.1145\/3390566.3391673","10.1145\/3390566"],"URL":"https:\/\/doi.org\/10.1145\/3390566.3391673","relation":{},"subject":[],"published":{"date-parts":[[2020,3,12]]},"assertion":[{"value":"2020-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}