{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:08:17Z","timestamp":1772554097450,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"name":"Dutch Organisation for Scientific Research (NWO)","award":["629.009.014"],"award-info":[{"award-number":["629.009.014"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3477314.3507003","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T00:37:36Z","timestamp":1651883856000},"page":"282-289","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Calibrating the performance and security of blockchains via information propagation delays"],"prefix":"10.1145","author":[{"given":"Julius","family":"Fechner","sequence":"first","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]},{"given":"Balakrishnan","family":"Chandrasekaran","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]},{"given":"Marc X.","family":"Makkes","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]}],"member":"320","published-online":{"date-parts":[[2022,5,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. Bitcoin Mining Map. https:\/\/cbeci.org\/mining_map"},{"key":"e_1_3_2_1_2_1","unstructured":"2021. Speedtest by Ookla - The Global Broadband Speed Test. https:\/\/www.speedtest.net\/ (Accessed: 5-9-2021)."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. Team Cymru: IP to ASN Mapping Service. (2021). https:\/\/team-cymru.com\/community-services\/ip-asn-mapping\/ (Accessed: 10-14-2021)."},{"key":"e_1_3_2_1_4_1","volume-title":"1st Quarter 2013 Report.","year":"2013","unstructured":"Akamai. 2013. The State of the Internet, 1st Quarter 2013 Report. (2013). https:\/\/www.akamai.com\/us\/en\/resources\/our-thinking\/state-of-the-internet-report\/global-state-of-the-internet-connectivity-reports.jsp"},{"key":"e_1_3_2_1_5_1","unstructured":"BTC.com. 2021. Bitcoin Pool Statistics. (2021). https:\/\/btc.com\/stats\/pool (Accessed: 5-9-2021)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487822"},{"key":"e_1_3_2_1_7_1","volume-title":"FIBRE: Fast internet Bitcoin relay engine.","author":"Corallo M.","year":"2019","unstructured":"M. Corallo. 2019. FIBRE: Fast internet Bitcoin relay engine. (2019). https:\/\/github.com\/bitcoinfibre\/bitcoinfibre"},{"key":"e_1_3_2_1_8_1","volume-title":"Compact block relay. BIP 152. (March","author":"Corallo M.","year":"2020","unstructured":"M. Corallo. 2020. Compact block relay. BIP 152. (March 2020). https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0152.mediawiki"},{"key":"e_1_3_2_1_9_1","volume-title":"Bitcoin energy consumption worldwide from","author":"de Best Raynor","year":"2017","unstructured":"Raynor de Best. 2021. Bitcoin energy consumption worldwide from February 2017 to June 27, 2021. (October 2021). https:\/\/www.statista.com\/statistics\/881472\/worldwide-bitcoin-energy-consumption\/"},{"key":"e_1_3_2_1_10_1","volume-title":"Bitcoin's Growing Energy Problem. Joule 2, 5","author":"de Vries Alex","year":"2018","unstructured":"Alex de Vries. 2018. Bitcoin's Growing Energy Problem. Joule 2, 5 (2018)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"C. Decker and R. Wattenhofer. 2013. Information propagation in the Bitcoin network. In IEEE P2P 2013 Proceedings.","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_3_2_1_12_1","unstructured":"Digiconomist. 2021. Bitcoin Energy Consumption Index. (2021). https:\/\/digiconomist.net\/bitcoin-energy-consumption\/ (Accessed: 5-9-2021)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer. 2014. Majority Is Not Enough: Bitcoin Mining Is Vulnerable. In Financial Cryptography and Data Security.","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"e_1_3_2_1_14_1","volume-title":"Makkes","author":"Fechner Julius","year":"2021","unstructured":"Julius Fechner, Balakrishnan Chandrasekaran, and Marc X. Makkes. 2021. Artifacts of the study titled \"Calibrating the Performance and Security of Blockchains via Information Propagation Delays\", published at ACM SAC '22. (2021). https:\/\/github.com\/JuliusAF\/info-prop-delays-artifacts"},{"key":"e_1_3_2_1_15_1","volume-title":"Energy Consumption of Cryptocurrencies Beyond Bitcoin. Joule 4, 9","author":"Gallersd\u00f6rfer Ulrich","year":"2020","unstructured":"Ulrich Gallersd\u00f6rfer, Lena Klaa\u00dfen, and Christian Stoll. 2020. Energy Consumption of Cryptocurrencies Beyond Bitcoin. Joule 4, 9 (2020)."},{"key":"e_1_3_2_1_16_1","volume-title":"Emergent failures: Rethinking cloud reliability at scale","author":"Garraghan Peter","year":"2018","unstructured":"Peter Garraghan, Renyu Yang, Zhenyu Wen, Alexander Romanovsky, Jie Xu, Rajkumar Buyya, and Rajiv Ranjan. 2018. Emergent failures: Rethinking cloud reliability at scale. IEEE Cloud Computing 5, 5 (2018)."},{"key":"e_1_3_2_1_17_1","unstructured":"DSN Research Group. 2021. Bitcoin Network Monitor. https:\/\/www.dsn.kastel.kit.edu\/bitcoin\/"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987550.2987583"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6211920"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3050428"},{"key":"e_1_3_2_1_21_1","volume-title":"Decreasing Security Threshold Against Double Spend Attack in Networks with Slow Synchronization. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).","author":"Kovalchuk Lyudmila","year":"2019","unstructured":"Lyudmila Kovalchuk, Dmytro Kaidalov, Andrii Nastenko, Mariia Rodinko, Oleksiy Shevtsov, and Roman Oliynykov. 2019. Decreasing Security Threshold Against Double Spend Attack in Networks with Slow Synchronization. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110354"},{"key":"e_1_3_2_1_23_1","unstructured":"MaxMind. 2021. GeoLite2 Free Geolocation Data. (2021). https:\/\/dev.maxmind.com\/geoip\/geolite2-free-geolocation-data?lang=en (Accessed: 10-14-2021)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487823"},{"key":"e_1_3_2_1_25_1","unstructured":"Andrew Miller James Litton Andrew Pachulski Neal Gupta Dave Levin Neil Spring and Bobby Bhattacharjee. 2015. Discovering Bitcoin's Public Topology and Influential Nodes. https:\/\/www.cs.umd.edu\/projects\/coinscope\/coinscope.pdf. (2015)."},{"key":"e_1_3_2_1_26_1","volume-title":"On the Benefits of Compact Blocks in Bitcoin. In ICC 2020 - 2020 IEEE International Conference on Communications (ICC).","author":"Mi\u0161i\u0107 Jelena","year":"2020","unstructured":"Jelena Mi\u0161i\u0107, Vojislav B. Mi\u0161i\u0107, and Xiaolin Chang. 2020. On the Benefits of Compact Blocks in Bitcoin. In ICC 2020 - 2020 IEEE International Conference on Communications (ICC)."},{"key":"e_1_3_2_1_27_1","volume-title":"Identifying Impacts of Protocol and Internet Development on the Bitcoin Network. In 2020 IEEE Symposium on Computers and Communications (ISCC).","author":"Nagayama Ryunosuke","year":"2020","unstructured":"Ryunosuke Nagayama, Ryohei Banno, and Kazuyuki Shudo. 2020. Identifying Impacts of Protocol and Internet Development on the Bitcoin Network. In 2020 IEEE Symposium on Computers and Communications (ISCC)."},{"key":"e_1_3_2_1_28_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf. (October","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf. (October 2008)."},{"key":"e_1_3_2_1_30_1","volume-title":"Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin. In Financial Cryptography and Data Security.","author":"Neudecker Till","year":"2019","unstructured":"Till Neudecker and Hannes Hartenstein. 2019. Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin. In Financial Cryptography and Data Security."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340422.3343640"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737490"}],"event":{"name":"SAC '22: The 37th ACM\/SIGAPP Symposium on Applied Computing","location":"Virtual Event","acronym":"SAC '22","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 37th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477314.3507003","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3477314.3507003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:33Z","timestamp":1750191513000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477314.3507003"}},"subtitle":["revisiting an old approach with a new perspective"],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":31,"alternative-id":["10.1145\/3477314.3507003","10.1145\/3477314"],"URL":"https:\/\/doi.org\/10.1145\/3477314.3507003","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-05-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}