{"id":"https://openalex.org/W2975194574","doi":"https://doi.org/10.1109/infcomw.2019.8845301","title":"Decreasing Security Threshold Against Double Spend Attack in Networks with Slow Synchronization","display_name":"Decreasing Security Threshold Against Double Spend Attack in Networks with Slow Synchronization","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2975194574","doi":"https://doi.org/10.1109/infcomw.2019.8845301","mag":"2975194574"},"language":"en","primary_location":{"id":"doi:10.1109/infcomw.2019.8845301","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcomw.2019.8845301","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034337895","display_name":"Lyudmila Kovalchuk","orcid":"https://orcid.org/0000-0003-2874-7950"},"institutions":[{"id":"https://openalex.org/I202483615","display_name":"National Technical University of Ukraine \u201cIgor Sikorsky Kyiv Polytechnic Institute\u201d","ror":"https://ror.org/00syn5v21","country_code":"UA","type":"education","lineage":["https://openalex.org/I202483615"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Lyudmila Kovalchuk","raw_affiliation_strings":["Input Output HK, National Technical University of Ukraine, &#x201C;Igor Sikorsky Kyiv Polytechnic Institute&#x201D;, Kyiv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Input Output HK, National Technical University of Ukraine, &#x201C;Igor Sikorsky Kyiv Polytechnic Institute&#x201D;, Kyiv, Ukraine","institution_ids":["https://openalex.org/I202483615"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043789677","display_name":"Dmytro Kaidalov","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dmytro Kaidalov","raw_affiliation_strings":["Input Output HK, Kharkiv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Input Output HK, Kharkiv, Ukraine","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018880931","display_name":"Andrii Nastenko","orcid":"https://orcid.org/0000-0001-7780-5331"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Andrii Nastenko","raw_affiliation_strings":["Input Output HK, Kharkiv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Input Output HK, Kharkiv, Ukraine","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034626627","display_name":"Mariia Rodinko","orcid":"https://orcid.org/0000-0003-4692-9811"},"institutions":[{"id":"https://openalex.org/I8765205","display_name":"V. N. Karazin Kharkiv National University","ror":"https://ror.org/03ftejk10","country_code":"UA","type":"education","lineage":["https://openalex.org/I8765205"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Mariia Rodinko","raw_affiliation_strings":["Input Output HK, V. N. Karazin Kharkiv National University, Kharkiv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Input Output HK, V. N. Karazin Kharkiv National University, Kharkiv, Ukraine","institution_ids":["https://openalex.org/I8765205"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000442359","display_name":"Oleksiy Shevtsov","orcid":null},"institutions":[{"id":"https://openalex.org/I8765205","display_name":"V. N. Karazin Kharkiv National University","ror":"https://ror.org/03ftejk10","country_code":"UA","type":"education","lineage":["https://openalex.org/I8765205"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Oleksiy Shevtsov","raw_affiliation_strings":["Input Output HK, V. N. Karazin Kharkiv National University, Kharkiv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Input Output HK, V. N. Karazin Kharkiv National University, Kharkiv, Ukraine","institution_ids":["https://openalex.org/I8765205"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064862686","display_name":"Roman Oliynykov","orcid":"https://orcid.org/0000-0002-3494-0493"},"institutions":[{"id":"https://openalex.org/I8765205","display_name":"V. N. Karazin Kharkiv National University","ror":"https://ror.org/03ftejk10","country_code":"UA","type":"education","lineage":["https://openalex.org/I8765205"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Roman Oliynykov","raw_affiliation_strings":["Input Output HK, V. N. Karazin Kharkiv National University, Kharkiv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Input Output HK, V. N. Karazin Kharkiv National University, Kharkiv, Ukraine","institution_ids":["https://openalex.org/I8765205"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5034337895"],"corresponding_institution_ids":["https://openalex.org/I202483615"],"apc_list":null,"apc_paid":null,"fwci":1.6957,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.88466589,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"abs/1702.02867","issue":null,"first_page":"216","last_page":"221"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7204996347427368},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6884317994117737},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.636296808719635},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.5765007734298706},{"id":"https://openalex.org/keywords/time-synchronization","display_name":"Time synchronization","score":0.5288724899291992},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5186833143234253},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5102264881134033},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4856506586074829},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4721871614456177},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4355732500553131},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16922131180763245}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7204996347427368},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6884317994117737},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.636296808719635},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.5765007734298706},{"id":"https://openalex.org/C2986737936","wikidata":"https://www.wikidata.org/wiki/Q1058791","display_name":"Time synchronization","level":2,"score":0.5288724899291992},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5186833143234253},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5102264881134033},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4856506586074829},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4721871614456177},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4355732500553131},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16922131180763245},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infcomw.2019.8845301","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcomw.2019.8845301","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W851575271","https://openalex.org/W1593596963","https://openalex.org/W1965399019","https://openalex.org/W2295940006","https://openalex.org/W2562667804","https://openalex.org/W2571698069","https://openalex.org/W2584364557","https://openalex.org/W2613387059","https://openalex.org/W2751862591","https://openalex.org/W2790825170","https://openalex.org/W2805427728","https://openalex.org/W2907565696","https://openalex.org/W2952871880","https://openalex.org/W4293649164","https://openalex.org/W6733166632","https://openalex.org/W6734052717","https://openalex.org/W6758133233"],"related_works":["https://openalex.org/W2885105415","https://openalex.org/W2166939931","https://openalex.org/W2548702785","https://openalex.org/W4231087120","https://openalex.org/W2031096545","https://openalex.org/W2322793796","https://openalex.org/W1631301428","https://openalex.org/W2361721963","https://openalex.org/W1566366401","https://openalex.org/W2791809871"],"abstract_inverted_index":{"We":[0,22],"study":[1],"probability":[2],"change":[3],"of":[4,25,50],"double":[5],"spend":[6],"attack":[7],"on":[8,13,29],"Proof-of-Work":[9],"consensus":[10],"protocol":[11],"depending":[12],"network":[14,31,42],"parameters":[15],"in":[16],"the":[17,30,34,41,47],"model":[18],"with":[19],"continuous":[20],"time.":[21],"analyze":[23],"effect":[24],"block":[26,51],"generation":[27,52],"intensity":[28],"vulnerability":[32],"to":[33],"attack,":[35],"and":[36,45],"provide":[37],"analytical":[38],"expressions":[39],"for":[40,46],"security":[43],"threshold":[44],"upper":[48],"bound":[49],"intensity.":[53]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
