{"id":"https://openalex.org/W2983197594","doi":"https://doi.org/10.1145/3319535.3345649","title":"You Shall Not Join","display_name":"You Shall Not Join","publication_year":2019,"publication_date":"2019-11-06","ids":{"openalex":"https://openalex.org/W2983197594","doi":"https://doi.org/10.1145/3319535.3345649","mag":"2983197594"},"language":"en","primary_location":{"id":"doi:10.1145/3319535.3345649","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3319535.3345649","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059891123","display_name":"Angelique Faye Loe","orcid":null},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Angelique Faye Loe","raw_affiliation_strings":["Royal Holloway, University of London, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Royal Holloway, University of London, London, United Kingdom","institution_ids":["https://openalex.org/I184558857"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072602722","display_name":"Elizabeth A. Quaglia","orcid":"https://orcid.org/0000-0002-4010-773X"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Elizabeth Anne Quaglia","raw_affiliation_strings":["Royal Holloway, University of London, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Royal Holloway, University of London, London, United Kingdom","institution_ids":["https://openalex.org/I184558857"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5059891123"],"corresponding_institution_ids":["https://openalex.org/I184558857"],"apc_list":null,"apc_paid":null,"fwci":0.8659,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.81473108,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"2231","last_page":"2247"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.8630295991897583},{"id":"https://openalex.org/keywords/bootstrapping","display_name":"Bootstrapping (finance)","score":0.8490325212478638},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8213054537773132},{"id":"https://openalex.org/keywords/traceroute","display_name":"traceroute","score":0.4376106262207031},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4286873936653137},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.42507821321487427},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.3743782639503479},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34895753860473633},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3429086208343506},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3196365237236023},{"id":"https://openalex.org/keywords/econometrics","display_name":"Econometrics","score":0.11582347750663757},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11336079239845276}],"concepts":[{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.8630295991897583},{"id":"https://openalex.org/C207609745","wikidata":"https://www.wikidata.org/wiki/Q4944086","display_name":"Bootstrapping (finance)","level":2,"score":0.8490325212478638},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8213054537773132},{"id":"https://openalex.org/C157497606","wikidata":"https://www.wikidata.org/wiki/Q603227","display_name":"traceroute","level":3,"score":0.4376106262207031},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4286873936653137},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.42507821321487427},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.3743782639503479},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34895753860473633},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3429086208343506},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3196365237236023},{"id":"https://openalex.org/C149782125","wikidata":"https://www.wikidata.org/wiki/Q160039","display_name":"Econometrics","level":1,"score":0.11582347750663757},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11336079239845276},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3319535.3345649","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3319535.3345649","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7400000095367432}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W87727730","https://openalex.org/W1879677957","https://openalex.org/W2100854209","https://openalex.org/W2121531691","https://openalex.org/W2121654697","https://openalex.org/W2125679908","https://openalex.org/W2133453279","https://openalex.org/W2168006138","https://openalex.org/W2188410443","https://openalex.org/W2517451064","https://openalex.org/W2788125071","https://openalex.org/W2808387274","https://openalex.org/W2895636773","https://openalex.org/W2962691027","https://openalex.org/W4243774931","https://openalex.org/W4289038676"],"related_works":["https://openalex.org/W4366411693","https://openalex.org/W3211641817","https://openalex.org/W2077631231","https://openalex.org/W3164717803","https://openalex.org/W4389915954","https://openalex.org/W2986695989","https://openalex.org/W2380307373","https://openalex.org/W3123387860","https://openalex.org/W4291291739","https://openalex.org/W2390624985"],"abstract_inverted_index":{"Cryptocurrencies":[0],"are":[1,68,94],"digital":[2],"assets":[3],"which":[4],"depend":[5],"upon":[6],"the":[7,34,49,69,114,123,148,156,160,172,181,191],"use":[8,35],"of":[9,36,108,131,141,159,174,183],"distributed":[10,124],"peer-to-peer":[11,23,134],"networks.":[12],"The":[13,29],"method":[14],"a":[15,22,37,104],"new":[16],"peer":[17],"uses":[18],"to":[19,31,74,85,90,100,189],"initially":[20],"join":[21],"network":[24,135],"is":[25,40],"known":[26],"as":[27,62],"bootstrapping.":[28],"ability":[30],"bootstrap":[32],"without":[33],"centralized":[38],"resource":[39],"an":[41],"unresolved":[42],"challenge.":[43],"In":[44,72],"this":[45,75],"paper":[46],"we":[47,77,179],"survey":[48],"bootstrapping":[50,81,149,176],"techniques":[51,82],"used":[52],"by":[53],"74":[54],"cryptocurrencies":[55,161],"and":[56,65,88,137,144,186],"find":[57],"that":[58,155],"censorship-prone":[59],"methods":[60],"such":[61],"DNS":[63,109,116,142],"seeding":[64],"IP":[66],"hard-coding":[67],"most":[70],"prevalent.":[71],"response":[73],"finding,":[76],"test":[78],"two":[79],"other":[80],"less":[83],"susceptible":[84],"censorship,":[86],"Tor":[87],"ZMap,":[89],"determine":[91],"if":[92],"they":[93],"operationally":[95],"feasible":[96],"alternatives":[97],"more":[98],"resilient":[99],"censorship.":[101],"We":[102],"perform":[103],"global":[105],"measurement":[106],"study":[107,152],"query":[110,145],"responses":[111],"for":[112,171],"each":[113,132],"92":[115],"seeds":[117],"discovered":[118],"across":[119],"42":[120],"countries":[121],"using":[122],"RIPE":[125],"Atlas":[126],"network.":[127],"This":[128],"provides":[129],"details":[130],"cryptocurrencies'":[133],"topology":[136],"also":[138,153],"highlights":[139],"instances":[140],"outages":[143],"manipulation":[146],"impacting":[147],"process.":[150],"Our":[151],"reveals":[154],"source":[157],"code":[158],"researched":[162],"comes":[163],"from":[164],"only":[165],"five":[166],"main":[167],"repositories;":[168],"hence":[169],"accounting":[170],"inheritance":[173],"legacy":[175],"methods.":[177],"Finally,":[178],"discuss":[180],"implications":[182],"our":[184],"findings":[185],"provide":[187],"recommendations":[188],"mitigate":[190],"risks":[192],"exposed.":[193]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2019-11-22T00:00:00"}
