{"id":"https://openalex.org/W2894425814","doi":"https://doi.org/10.2478/popets-2019-0005","title":"Tithonus: A Bitcoin Based Censorship Resilient System","display_name":"Tithonus: A Bitcoin Based Censorship Resilient System","publication_year":2018,"publication_date":"2018-12-24","ids":{"openalex":"https://openalex.org/W2894425814","doi":"https://doi.org/10.2478/popets-2019-0005","mag":"2894425814"},"language":"en","primary_location":{"id":"doi:10.2478/popets-2019-0005","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2019-0005","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/1/article-p68.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/1/article-p68.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013297791","display_name":"Ruben Recabarren","orcid":null},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ruben Recabarren","raw_affiliation_strings":["Florida Int\u2019l University , Miami , FL 33199 ,"],"affiliations":[{"raw_affiliation_string":"Florida Int\u2019l University , Miami , FL 33199 ,","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070758536","display_name":"Bogdan C\u0103rbunar","orcid":"https://orcid.org/0000-0002-4950-9751"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bogdan Carbunar","raw_affiliation_strings":["Florida Int\u2019l University , Miami , FL 33199 ,"],"affiliations":[{"raw_affiliation_string":"Florida Int\u2019l University , Miami , FL 33199 ,","institution_ids":["https://openalex.org/I19700959"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5013297791"],"corresponding_institution_ids":["https://openalex.org/I19700959"],"apc_list":null,"apc_paid":null,"fwci":0.4106,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.72645726,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"2019","issue":"1","first_page":"68","last_page":"86"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7314497232437134},{"id":"https://openalex.org/keywords/goodput","display_name":"Goodput","score":0.7278333902359009},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.6655200719833374},{"id":"https://openalex.org/keywords/censorship","display_name":"Censorship","score":0.6056919693946838},{"id":"https://openalex.org/keywords/gossip","display_name":"Gossip","score":0.5610114336013794},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5502128005027771},{"id":"https://openalex.org/keywords/gossip-protocol","display_name":"Gossip protocol","score":0.548843502998352},{"id":"https://openalex.org/keywords/bittorrent","display_name":"BitTorrent","score":0.5186799764633179},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5157785415649414},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.5109254717826843},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.48136526346206665},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4617156684398651},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4478052854537964},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4258122742176056},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.3460305333137512},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.20784443616867065},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.19004637002944946},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14717641472816467},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.13271373510360718},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11177751421928406},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.10174751281738281},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09582206606864929},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.08343103528022766}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7314497232437134},{"id":"https://openalex.org/C94022561","wikidata":"https://www.wikidata.org/wiki/Q1172393","display_name":"Goodput","level":4,"score":0.7278333902359009},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.6655200719833374},{"id":"https://openalex.org/C52930066","wikidata":"https://www.wikidata.org/wiki/Q543","display_name":"Censorship","level":2,"score":0.6056919693946838},{"id":"https://openalex.org/C62989814","wikidata":"https://www.wikidata.org/wiki/Q854648","display_name":"Gossip","level":2,"score":0.5610114336013794},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5502128005027771},{"id":"https://openalex.org/C145928361","wikidata":"https://www.wikidata.org/wiki/Q5587504","display_name":"Gossip protocol","level":3,"score":0.548843502998352},{"id":"https://openalex.org/C520566109","wikidata":"https://www.wikidata.org/wiki/Q133862","display_name":"BitTorrent","level":3,"score":0.5186799764633179},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5157785415649414},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.5109254717826843},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.48136526346206665},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4617156684398651},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4478052854537964},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4258122742176056},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.3460305333137512},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.20784443616867065},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.19004637002944946},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14717641472816467},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.13271373510360718},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11177751421928406},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.10174751281738281},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09582206606864929},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.08343103528022766},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C27206212","wikidata":"https://www.wikidata.org/wiki/Q34178","display_name":"Theology","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.2478/popets-2019-0005","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2019-0005","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/1/article-p68.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1810.00279","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1810.00279","pdf_url":"https://arxiv.org/pdf/1810.00279","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.1810.00279","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1810.00279","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"},{"id":"mag:2894425814","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"doi:10.2478/popets-2019-0005","is_oa":true,"landing_page_url":"https://doi.org/10.2478/popets-2019-0005","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2019/1/article-p68.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7099999785423279}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2894425814.pdf","grobid_xml":"https://content.openalex.org/works/W2894425814.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W120790494","https://openalex.org/W172971539","https://openalex.org/W1786644971","https://openalex.org/W1879677957","https://openalex.org/W2027341813","https://openalex.org/W2042477294","https://openalex.org/W2057248704","https://openalex.org/W2094522125","https://openalex.org/W2122087485","https://openalex.org/W2128883551","https://openalex.org/W2184387311","https://openalex.org/W2209711601","https://openalex.org/W2404168686","https://openalex.org/W2405015683","https://openalex.org/W2410750382","https://openalex.org/W2532745482","https://openalex.org/W2538062086","https://openalex.org/W2671457145","https://openalex.org/W2737898592","https://openalex.org/W2753333424","https://openalex.org/W2915981297","https://openalex.org/W2950226614","https://openalex.org/W2950492851"],"related_works":["https://openalex.org/W2571430336","https://openalex.org/W2989868130","https://openalex.org/W2784097205","https://openalex.org/W2767243545","https://openalex.org/W2547350968","https://openalex.org/W3045306228","https://openalex.org/W1599549092","https://openalex.org/W2779888899","https://openalex.org/W3111381103","https://openalex.org/W3112406890","https://openalex.org/W2950380124","https://openalex.org/W2772080178","https://openalex.org/W2787515005","https://openalex.org/W2972857060","https://openalex.org/W2413088062","https://openalex.org/W2038096741","https://openalex.org/W3032142212","https://openalex.org/W2945105299","https://openalex.org/W3170550184","https://openalex.org/W2761967597"],"abstract_inverted_index":{"Abstract":[0],"Providing":[1],"reliable":[2],"and":[3,13,32,52,69,89,94,97,100,127],"surreptitious":[4],"communications":[5],"is":[6],"difficult":[7],"in":[8],"the":[9,29,50,114,129,162],"presence":[10],"of":[11,116,125,136],"adaptive":[12],"resourceful":[14],"state":[15],"level":[16],"censors.":[17],"In":[18,39],"this":[19],"paper":[20],"we":[21,44],"introduce":[22],"Tithonus,":[23],"a":[24],"framework":[25],"that":[26,75,140],"builds":[27],"on":[28,49],"Bitcoin":[30,81,109],"blockchain":[31,54],"network":[33],"to":[34,41,86,107,119,133,147,161],"provide":[35],"censorship-resistant":[36],"communication":[37,73],"mechanisms.":[38],"contrast":[40],"previous":[42],"approaches,":[43],"do":[45],"not":[46],"rely":[47],"solely":[48],"slow":[51],"expensive":[53],"consensus":[55],"mechanism":[56],"but":[57],"instead":[58],"fully":[59],"exploit":[60],"Bitcoin\u2019s":[61],"peer-to-peer":[62],"gossip":[63],"protocol.":[64],"We":[65,83,138],"develop":[66],"adaptive,":[67],"fast":[68],"cost":[70,115],"effective":[71],"data":[72,118],"solutions":[74,85],"camouflage":[76],"client":[77,142],"requests":[78],"into":[79],"inconspicuous":[80],"transactions.":[82],"propose":[84],"securely":[87],"request":[88],"transfer":[90],"content,":[91],"with":[92],"unobservability":[93],"censorship":[95],"resistance,":[96],"free,":[98],"pay-per-access":[99],"subscription":[101],"based":[102],"payment":[103],"options.":[104],"When":[105],"compared":[106],"state-of-the-art":[108],"writing":[110],"solutions,":[111],"Tithonus":[112,141],"reduces":[113],"transferring":[117],"censored":[120,155],"clients":[121],"by":[122,131],"2":[123],"orders":[124,135],"magnitude":[126],"increases":[128],"goodput":[130],"3":[132],"5":[134],"magnitude.":[137],"show":[139],"initiated":[143,151],"transactions":[144,152],"are":[145],"hard":[146],"detect,":[148],"while":[149],"server":[150],"cannot":[153],"be":[154],"without":[156],"creating":[157],"split":[158],"world":[159],"problems":[160],"Bit-coin":[163],"blockchain.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
