{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T12:02:07Z","timestamp":1757592127721,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T00:00:00Z","timestamp":1554681600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,8]]},"DOI":"10.1145\/3297280.3297309","type":"proceedings-article","created":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T12:18:47Z","timestamp":1556713127000},"page":"276-283","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Adaptive information dissemination in the Bitcoin network"],"prefix":"10.1145","author":[{"given":"Jo\u00e3o","family":"Mar\u00e7al","sequence":"first","affiliation":[{"name":"INESC-ID, IST, U. Lisboa, Lisbon, Portugal"}]},{"given":"Lu\u00eds","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"INESC-ID, IST, U. Lisboa, Lisbon, Portugal"}]},{"given":"Miguel","family":"Matos","sequence":"additional","affiliation":[{"name":"INESC-ID, IST, U. Lisboa, Lisbon, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2019,4,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. arXiv preprint arXiv:1605.07524","author":"Apostolaki Maria","year":"2016","unstructured":"Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2016. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. arXiv preprint arXiv:1605.07524 (2016)."},{"unstructured":"Bitcoin Improvement Proposal. {n. d.}. https:\/\/github.com\/bitcoin\/bips. Accessed: 2018-25-09.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/3084459"},{"unstructured":"Matt Corallo. 2016. Compact Block Relay. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0152.mediawiki. Accessed: 2018-09-17.","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1007\/978-3-662-53357-4_8"},{"unstructured":"Suhas Daftuar. 2015. sendheaders message. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0130.mediawiki. Accessed: 2018-25-09.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","volume-title":"2013 IEEE Thirteenth International Conference on. IEEE, 1--10","author":"Decker Christian","year":"2013","unstructured":"Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on. IEEE, 1--10."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/MC.2004.1297243"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1007\/978-3-662-45472-5_28"},{"unstructured":"Hashrate Distribution. {n. d.}. https:\/\/www.blockchain.com\/en\/pools. Accessed: 2018-15-05.","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.5555\/2831143.2831152"},{"unstructured":"Andrew Miller James Litton Andrew Pachulski Neal Gupta Dave Levin Neil Spring and Bobby Bhattacharjee. 2015. Discovering bitcoin?s public topology and influential nodes. et al. (2015).","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system."},{"key":"e_1_3_2_1_14_1","volume-title":"Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on. IEEE, 2411--2416","author":"Owenson Gareth","year":"2017","unstructured":"Gareth Owenson, Mo Adda, et al. 2017. Proximity awareness approach to enhance propagation delay on the Bitcoin peer-to-peer network. In Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on. IEEE, 2411--2416."},{"key":"e_1_3_2_1_15_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 515--532","author":"Sapirshtein Ayelet","year":"2016","unstructured":"Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security. Springer, 515--532."}],"event":{"sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"acronym":"SAC '19","name":"SAC '19: The 34th ACM\/SIGAPP Symposium on Applied Computing","location":"Limassol Cyprus"},"container-title":["Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297309","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297280.3297309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:14Z","timestamp":1750208534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297309"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,8]]},"references-count":15,"alternative-id":["10.1145\/3297280.3297309","10.1145\/3297280"],"URL":"https:\/\/doi.org\/10.1145\/3297280.3297309","relation":{},"subject":[],"published":{"date-parts":[[2019,4,8]]},"assertion":[{"value":"2019-04-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}