{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:37:16Z","timestamp":1760027836115,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,19]]},"DOI":"10.1145\/3558535.3559777","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:54:17Z","timestamp":1688568857000},"page":"126-147","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Longest Chain Consensus Under Bandwidth Constraint"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9777-6168","authenticated-orcid":false,"given":"Joachim","family":"Neu","sequence":"first","affiliation":[{"name":"Electrical Engineering, Stanford University, Stanford, California, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1880-570X","authenticated-orcid":false,"given":"Srivatsan","family":"Sridhar","sequence":"additional","affiliation":[{"name":"Electrical Engineering, Stanford University, Stanford, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3256-4700","authenticated-orcid":false,"given":"Lei","family":"Yang","sequence":"additional","affiliation":[{"name":"MIT CSAIL, Cambridge, Massachusetts, USA"}]},{"given":"David","family":"Tse","sequence":"additional","affiliation":[{"name":"Electrical Engineering, Stanford University, Stanford, California, United States of America"}]},{"given":"Mohammad","family":"Alizadeh","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, Massachusetts, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,7,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Bitcoin Developer Guide - P2P Network - Initial Block Download - Headers-First. https:\/\/developer.bitcoin.org\/devguide\/p2p_network.html#headers-first 2020. Bitcoin Developer Guide - P2P Network - Initial Block Download - Headers-First. https:\/\/developer.bitcoin.org\/devguide\/p2p_network.html#headers-first"},{"key":"e_1_3_2_1_2_1","unstructured":"2021. Ethereum 2.0 networking specification. https:\/\/github.com\/ethereum\/eth2.0-specs\/blob\/dev\/specs\/phase0\/p2p-interface.md 2021. Ethereum 2.0 networking specification. https:\/\/github.com\/ethereum\/eth2.0-specs\/blob\/dev\/specs\/phase0\/p2p-interface.md"},{"key":"e_1_3_2_1_3_1","volume-title":"Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 375--392","author":"Apostolaki Maria","year":"2017","unstructured":"Maria Apostolaki , Aviv Zohar , and Laurent Vanbever . 2017 . Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 375--392 . Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 375--392."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243848"},{"key":"e_1_3_2_1_5_1","volume-title":"Proof-of-Stake Longest Chain Protocols: Security vs Predictability. CoRR abs\/1910.02218","author":"Bagaria Vivek","year":"2019","unstructured":"Vivek Bagaria , Amir Dembo , Sreeram Kannan , Sewoong Oh , David Tse , Pramod Viswanath , Xuechao Wang , and Ofer Zeitouni . 2019. Proof-of-Stake Longest Chain Protocols: Security vs Predictability. CoRR abs\/1910.02218 ( 2019 ). Vivek Bagaria, Amir Dembo, Sreeram Kannan, Sewoong Oh, David Tse, Pramod Viswanath, Xuechao Wang, and Ofer Zeitouni. 2019. Proof-of-Stake Longest Chain Protocols: Security vs Predictability. CoRR abs\/1910.02218 (2019)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363213"},{"key":"e_1_3_2_1_7_1","unstructured":"Vitalik Buterin. 2014. Proof of Stake: How I Learned to Love Weak Subjectivity. Retrieved 2022-05-05 from https:\/\/blog.ethereum.org\/2014\/11\/25\/proof-stake-learned-love-weak-subjectivity\/ Vitalik Buterin. 2014. Proof of Stake: How I Learned to Love Weak Subjectivity. Retrieved 2022-05-05 from https:\/\/blog.ethereum.org\/2014\/11\/25\/proof-stake-learned-love-weak-subjectivity\/"},{"key":"e_1_3_2_1_8_1","volume-title":"Casper the Friendly Finality Gadget. CoRR abs\/1710.09437","author":"Buterin Vitalik","year":"2017","unstructured":"Vitalik Buterin and Virgil Griffith . 2017. Casper the Friendly Finality Gadget. CoRR abs\/1710.09437 ( 2017 ). Vitalik Buterin and Virgil Griffith. 2017. Casper the Friendly Finality Gadget. CoRR abs\/1710.09437 (2017)."},{"key":"e_1_3_2_1_9_1","volume-title":"Zhang","author":"Buterin Vitalik","year":"2020","unstructured":"Vitalik Buterin , Diego Hernandez , Thor Kamphefner , Khiem Pham , Zhi Qiao , Danny Ryan , Juhyeok Sin , Ying Wang , and Yan X . Zhang . 2020 . Combining GHOST and Casper. CoRR abs\/2003.03052 (2020). Vitalik Buterin, Diego Hernandez, Thor Kamphefner, Khiem Pham, Zhi Qiao, Danny Ryan, Juhyeok Sin, Ying Wang, and Yan X. Zhang. 2020. Combining GHOST and Casper. CoRR abs\/2003.03052 (2020)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2005.9"},{"key":"e_1_3_2_1_11_1","unstructured":"Tong Cao Jiangshan Yu J\u00e9r\u00e9mie Decouchant and Paulo Esteves-Verissimo. 2018. Revisiting Network-Level Attacks on Blockchain Network. (2018). https:\/\/orbilu.uni.lu\/bitstream\/10993\/38142\/1\/bcrb18-cao.pdf Tong Cao Jiangshan Yu J\u00e9r\u00e9mie Decouchant and Paulo Esteves-Verissimo. 2018. Revisiting Network-Level Attacks on Blockchain Network. (2018). https:\/\/orbilu.uni.lu\/bitstream\/10993\/38142\/1\/bcrb18-cao.pdf"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844156"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Sandro Coretti Aggelos Kiayias Cristopher Moore and Alexander Russell. 2022. The Generals' Scuttlebutt: Byzantine-Resilient Gossip Protocols. IACR Cryptol. ePrint Arch. (2022) 541. Sandro Coretti Aggelos Kiayias Cristopher Moore and Alexander Russell. 2022. The Generals' Scuttlebutt: Byzantine-Resilient Gossip Protocols. IACR Cryptol. ePrint Arch. (2022) 541.","DOI":"10.1145\/3548606.3560638"},{"key":"e_1_3_2_1_16_1","volume-title":"Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake. In Financial Cryptography and Data Security (FC '19)","author":"Daian Phil","year":"2019","unstructured":"Phil Daian , Rafael Pass , and Elaine Shi . 2019 . Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake. In Financial Cryptography and Data Security (FC '19) . Springer , 23--41. Phil Daian, Rafael Pass, and Elaine Shi. 2019. Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake. In Financial Cryptography and Data Security (FC '19). Springer, 23--41."},{"key":"e_1_3_2_1_17_1","volume-title":"Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain. In EUROCRYPT","author":"David Bernardo","year":"2018","unstructured":"Bernardo David , Peter Gazi , Aggelos Kiayias , and Alexander Russell . 2018 . Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain. In EUROCRYPT 2018. Springer , 66--98. Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexander Russell. 2018. Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain. In EUROCRYPT 2018. Springer, 66--98."},{"key":"e_1_3_2_1_18_1","unstructured":"Edsko de Vries Thomas Winant and Duncan Coutts. 2020. The Cardano Consensus and Storage Layer. https:\/\/github.com\/input-output-hk\/ouroboros-network\/tree\/master\/ouroboros-consensus\/docs\/report Edsko de Vries Thomas Winant and Duncan Coutts. 2020. The Cardano Consensus and Storage Layer. https:\/\/github.com\/input-output-hk\/ouroboros-network\/tree\/master\/ouroboros-consensus\/docs\/report"},{"volume-title":"P2P","author":"Decker Christian","key":"e_1_3_2_1_19_1","unstructured":"Christian Decker and Roger Wattenhofer . 2013. Information propagation in the Bitcoin network . In P2P . IEEE , 1--10. Christian Decker and Roger Wattenhofer. 2013. Information propagation in the Bitcoin network. In P2P. IEEE, 1--10."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417290"},{"key":"e_1_3_2_1_21_1","volume-title":"CRYPTO (Lecture Notes in Computer Science","volume":"147","author":"Dwork Cynthia","year":"1992","unstructured":"Cynthia Dwork and Moni Naor . 1992 . Pricing via Processing or Combatting Junk Mail . In CRYPTO (Lecture Notes in Computer Science , Vol. 740). Springer, 139-- 147 . Cynthia Dwork and Moni Naor. 1992. Pricing via Processing or Combatting Junk Mail. In CRYPTO (Lecture Notes in Computer Science, Vol. 740). Springer, 139--147."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212998"},{"key":"e_1_3_2_1_23_1","volume-title":"Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition. IACR Cryptol. ePrint Arch.","author":"Fitzi Matthias","year":"2018","unstructured":"Matthias Fitzi , Peter Ga\u017ei , Aggelos Kiayias , and Alexander Russell . 2018 . Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition. IACR Cryptol. ePrint Arch. (2018), 1119. Matthias Fitzi, Peter Ga\u017ei, Aggelos Kiayias, and Alexander Russell. 2018. Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition. IACR Cryptol. ePrint Arch. (2018), 1119."},{"key":"e_1_3_2_1_24_1","unstructured":"Matthias Fitzi Peter Ga\u017ei Aggelos Kiayias and Alexander Russell. 2020. Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput. IACR Cryptol. ePrint Arch. (2020) 37. Matthias Fitzi Peter Ga\u017ei Aggelos Kiayias and Alexander Russell. 2020. Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput. IACR Cryptol. ePrint Arch. (2020) 37."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Peter Ga\u017ei Aggelos Kiayias and Alexander Russell. 2020. Tight Consistency Bounds for Bitcoin. In CCS. ACM 819--838. Peter Ga\u017ei Aggelos Kiayias and Alexander Russell. 2020. Tight Consistency Bounds for Bitcoin. In CCS. ACM 819--838.","DOI":"10.1145\/3372297.3423365"},{"key":"e_1_3_2_1_27_1","volume-title":"Proof-of-Stake Sidechains. In IEEE Symposium on Security and Privacy. IEEE, 139--156","author":"Ga\u017ei Peter","year":"2019","unstructured":"Peter Ga\u017ei , Aggelos Kiayias , and Dionysis Zindros . 2019 . Proof-of-Stake Sidechains. In IEEE Symposium on Security and Privacy. IEEE, 139--156 . Peter Ga\u017ei, Aggelos Kiayias, and Dionysis Zindros. 2019. Proof-of-Stake Sidechains. In IEEE Symposium on Security and Privacy. IEEE, 139--156."},{"key":"e_1_3_2_1_28_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman , Alison Kendler , Aviv Zohar , and Sharon Goldberg . 2015 . Eclipse Attacks on Bitcoin's Peer-to-Peer Network . In 24th USENIX Security Symposium (USENIX Security 15) . USENIX Association, Washington, D.C., 129--144. Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 129--144."},{"key":"e_1_3_2_1_29_1","volume-title":"Reiter","author":"Hendricks James","year":"2007","unstructured":"James Hendricks , Gregory R. Ganger , and Michael K . Reiter . 2007 . Verifying distributed erasure-coded data. In PODC. ACM , 139--146. James Hendricks, Gregory R. Ganger, and Michael K. Reiter. 2007. Verifying distributed erasure-coded data. In PODC. ACM, 139--146."},{"key":"e_1_3_2_1_30_1","unstructured":"IOHK. 2020. input-output-hk\/ouroboros-network. https:\/\/github.com\/input-output-hk\/ouroboros-network\/blob\/master\/ouroboros-network\/src\/Ouroboros\/Network IOHK. 2020. input-output-hk\/ouroboros-network. https:\/\/github.com\/input-output-hk\/ouroboros-network\/blob\/master\/ouroboros-network\/src\/Ouroboros\/Network"},{"key":"e_1_3_2_1_31_1","unstructured":"IOHK. 2020. input-output-hk\/ouroboros-network. https:\/\/github.com\/input-output-hk\/ouroboros-network\/blob\/master\/ouroboros-network\/src\/Ouroboros\/Network\/BlockFetch\/Decision.hs#L162 IOHK. 2020. input-output-hk\/ouroboros-network. https:\/\/github.com\/input-output-hk\/ouroboros-network\/blob\/master\/ouroboros-network\/src\/Ouroboros\/Network\/BlockFetch\/Decision.hs#L162"},{"key":"e_1_3_2_1_32_1","unstructured":"IOHK. 2021. input-output-hk\/ouroboros-network. https:\/\/github.com\/input-output-hk\/ouroboros-network\/blob\/master\/ouroboros-consensus-shelley\/src\/Ouroboros\/Consensus\/Shelley\/Protocol.hs#L281 IOHK. 2021. input-output-hk\/ouroboros-network. https:\/\/github.com\/input-output-hk\/ouroboros-network\/blob\/master\/ouroboros-consensus-shelley\/src\/Ouroboros\/Consensus\/Shelley\/Protocol.hs#L281"},{"key":"e_1_3_2_1_33_1","volume-title":"Proofs of Work and Bread Pudding Protocols. In Communications and Multimedia Security (IFIP Conference Proceedings","volume":"272","author":"Jakobsson Markus","year":"1999","unstructured":"Markus Jakobsson and Ari Juels . 1999 . Proofs of Work and Bread Pudding Protocols. In Communications and Multimedia Security (IFIP Conference Proceedings , Vol. 152). Kluwer, 258-- 272 . Markus Jakobsson and Ari Juels. 1999. Proofs of Work and Bread Pudding Protocols. In Communications and Multimedia Security (IFIP Conference Proceedings, Vol. 152). Kluwer, 258--272."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_28"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"e_1_3_2_1_36_1","volume-title":"Proof-of-Work Sidechains. In Financial Cryptography Workshops (Lecture Notes in Computer Science","volume":"34","author":"Kiayias Aggelos","year":"2019","unstructured":"Aggelos Kiayias and Dionysis Zindros . 2019 . Proof-of-Work Sidechains. In Financial Cryptography Workshops (Lecture Notes in Computer Science , Vol. 11599). Springer, 21-- 34 . Aggelos Kiayias and Dionysis Zindros. 2019. Proof-of-Work Sidechains. In Financial Cryptography Workshops (Lecture Notes in Computer Science, Vol. 11599). Springer, 21--34."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Bob Lantz Brandon Heller and Nick McKeown. 2010. A network in a laptop: rapid prototyping for software-defined networks. In HotNets. ACM 19. Bob Lantz Brandon Heller and Nick McKeown. 2010. A network in a laptop: rapid prototyping for software-defined networks. In HotNets. ACM 19.","DOI":"10.1145\/1868447.1868466"},{"key":"e_1_3_2_1_38_1","volume-title":"Scaling Nakamoto Consensus to Thousands of Transactions per Second. CoRR abs\/1805.03870","author":"Li Chenxing","year":"2018","unstructured":"Chenxing Li , Peilun Li , Wei Xu , Fan Long , and Andrew Chi-chih Yao . 2018. Scaling Nakamoto Consensus to Thousands of Transactions per Second. CoRR abs\/1805.03870 ( 2018 ). Chenxing Li, Peilun Li, Wei Xu, Fan Long, and Andrew Chi-chih Yao. 2018. Scaling Nakamoto Consensus to Thousands of Transactions per Second. CoRR abs\/1805.03870 (2018)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Chen-Da Liu-Zhang Christian Matt Ueli Maurer Guilherme Rito and S\u00f8ren Eller Thomsen. 2022. Practical Provably Secure Flooding for Blockchains. IACR Cryptol. ePrint Arch. (2022) 608. Chen-Da Liu-Zhang Christian Matt Ueli Maurer Guilherme Rito and S\u00f8ren Eller Thomsen. 2022. Practical Provably Secure Flooding for Blockchains. IACR Cryptol. ePrint Arch. (2022) 608.","DOI":"10.1007\/978-3-031-22963-3_26"},{"key":"e_1_3_2_1_40_1","unstructured":"Michael McSweeney. 2021. Solana experiences transaction stoppage as developers report 'intermittent instability'. Retrieved 2021-11-21 from https:\/\/www.theblockcrypto.com\/linked\/117624\/solana-experiences-transaction-stoppage-as-developers-report-intermittent-instability Michael McSweeney. 2021. Solana experiences transaction stoppage as developers report 'intermittent instability'. Retrieved 2021-11-21 from https:\/\/www.theblockcrypto.com\/linked\/117624\/solana-experiences-transaction-stoppage-as-developers-report-intermittent-instability"},{"key":"e_1_3_2_1_41_1","unstructured":"Mike Millard. 2022. Solana restarted after seven-hour outage caused by surge of transactions. Retrieved 2022-05-04 from https:\/\/www.theblockcrypto.com\/linked\/144639\/solana-restarted-after-seven-hour-outage-caused-by-surge-of-transactions Mike Millard. 2022. Solana restarted after seven-hour outage caused by surge of transactions. Retrieved 2022-05-04 from https:\/\/www.theblockcrypto.com\/linked\/144639\/solana-restarted-after-seven-hour-outage-caused-by-surge-of-transactions"},{"key":"e_1_3_2_1_42_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Kamilla Nazirkhanova Joachim Neu and David Tse. 2022. Information Dispersal with Provable Retrievability for Rollups. In AFT. ACM. Forthcoming. Kamilla Nazirkhanova Joachim Neu and David Tse. 2022. Information Dispersal with Provable Retrievability for Rollups. In AFT. ACM. Forthcoming.","DOI":"10.1145\/3558535.3559778"},{"key":"e_1_3_2_1_44_1","volume-title":"Ertem Nusret Tas, and David Tse","author":"Neu Joachim","year":"2021","unstructured":"Joachim Neu , Ertem Nusret Tas, and David Tse . 2021 . The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets. CoRR abs\/2105.06075 (2021). Joachim Neu, Ertem Nusret Tas, and David Tse. 2021. The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets. CoRR abs\/2105.06075 (2021)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"e_1_3_2_1_46_1","volume-title":"Rethinking Large-Scale Consensus. In Computer Security Foundations Symposium (CSF '17)","author":"Pass Rafael","year":"2017","unstructured":"Rafael Pass and Elaine Shi . 2017 . Rethinking Large-Scale Consensus. In Computer Security Foundations Symposium (CSF '17) . IEEE, 115--129. Rafael Pass and Elaine Shi. 2017. Rethinking Large-Scale Consensus. In Computer Security Foundations Symposium (CSF '17). IEEE, 115--129."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70697-9_14"},{"key":"e_1_3_2_1_48_1","unstructured":"Brian Quarmby. 2022. Solana hit with another network incident causing degraded performance. Retrieved 2021-05-04 from https:\/\/cointelegraph.com\/news\/solana-hit-with-another-network-incident-causing-degraded-performance Brian Quarmby. 2022. Solana hit with another network incident causing degraded performance. Retrieved 2021-05-04 from https:\/\/cointelegraph.com\/news\/solana-hit-with-another-network-incident-causing-degraded-performance"},{"key":"e_1_3_2_1_49_1","unstructured":"Ling Ren. 2019. Analysis of Nakamoto Consensus. IACR Cryptol. ePrint Arch. (2019) 943. Ling Ren. 2019. Analysis of Nakamoto Consensus. IACR Cryptol. ePrint Arch. (2019) 943."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484566"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133613"},{"key":"e_1_3_2_1_52_1","volume-title":"Wallach","author":"Singh Atul","year":"2006","unstructured":"Atul Singh , Tsuen-Wan Ngan , Peter Druschel , and Dan S . Wallach . 2006 . Eclipse Attacks on Overlay Networks : Threats and Defenses. In INFOCOM. IEEE. Atul Singh, Tsuen-Wan Ngan, Peter Druschel, and Dan S. Wallach. 2006. Eclipse Attacks on Overlay Networks: Threats and Defenses. In INFOCOM. IEEE."},{"volume-title":"Security Considerations for Peer-to-Peer Distributed Hash Tables","author":"Sit Emil","key":"e_1_3_2_1_53_1","unstructured":"Emil Sit and Robert Morris . 2002. Security Considerations for Peer-to-Peer Distributed Hash Tables . In Peer-to-Peer Systems, Peter Druschel, Frans Kaashoek, and Antony Rowstron (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 261--269. Emil Sit and Robert Morris. 2002. Security Considerations for Peer-to-Peer Distributed Hash Tables. In Peer-to-Peer Systems, Peter Druschel, Frans Kaashoek, and Antony Rowstron (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 261--269."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"e_1_3_2_1_55_1","volume-title":"Solana: A new architecture for a high performance blockchain v0.8.13. Retrieved 2021-11-21 from https:\/\/solana.com\/solana-whitepaper.pdf","author":"Yakovenko Anatoly","year":"2018","unstructured":"Anatoly Yakovenko . 2018 . Solana: A new architecture for a high performance blockchain v0.8.13. Retrieved 2021-11-21 from https:\/\/solana.com\/solana-whitepaper.pdf Anatoly Yakovenko. 2018. Solana: A new architecture for a high performance blockchain v0.8.13. Retrieved 2021-11-21 from https:\/\/solana.com\/solana-whitepaper.pdf"},{"key":"e_1_3_2_1_56_1","volume-title":"DispersedLedger: High-Throughput Byzantine Consensus on Variable Bandwidth Networks. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Yang Lei","year":"2022","unstructured":"Lei Yang , Seo Jin Park , Mohammad Alizadeh , Sreeram Kannan , and David Tse . 2022 . DispersedLedger: High-Throughput Byzantine Consensus on Variable Bandwidth Networks. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22) . USENIX Association, Renton, WA, 493--512. Lei Yang, Seo Jin Park, Mohammad Alizadeh, Sreeram Kannan, and David Tse. 2022. DispersedLedger: High-Throughput Byzantine Consensus on Variable Bandwidth Networks. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). USENIX Association, Renton, WA, 493--512."}],"event":{"name":"AFT '22: 4th ACM Conference on Advances in Financial Technologies","acronym":"AFT '22","location":"Cambridge MA USA"},"container-title":["Proceedings of the 4th ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558535.3559777","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558535.3559777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:09Z","timestamp":1750178829000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558535.3559777"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,19]]},"references-count":54,"alternative-id":["10.1145\/3558535.3559777","10.1145\/3558535"],"URL":"https:\/\/doi.org\/10.1145\/3558535.3559777","relation":{},"subject":[],"published":{"date-parts":[[2022,9,19]]},"assertion":[{"value":"2023-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}