| dc.contributor.author | Wang, Xuechao | |
| dc.contributor.author | Muppirala, Viswa Virinchi | |
| dc.contributor.author | Yang, Lei | |
| dc.contributor.author | Kannan, Sreeram | |
| dc.contributor.author | Viswanath, Pramod | |
| dc.date.accessioned | 2022-11-10T14:24:25Z | |
| dc.date.available | 2022-11-10T14:24:25Z | |
| dc.date.issued | 2021-11-12 | |
| dc.identifier.isbn | 978-1-4503-8454-4 | |
| dc.identifier.uri | https://hdl.handle.net/1721.1/146304 | |
| dc.publisher | ACM|Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security | en_US |
| dc.relation.isversionof | https://doi.org/10.1145/3460120.3485254 | en_US |
| dc.rights | Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. | en_US |
| dc.source | ACM|Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security | en_US |
| dc.title | Securing Parallel-chain Protocols under Variable Mining Power | en_US |
| dc.type | Article | en_US |
| dc.identifier.citation | Wang, Xuechao, Muppirala, Viswa Virinchi, Yang, Lei, Kannan, Sreeram and Viswanath, Pramod. 2021. "Securing Parallel-chain Protocols under Variable Mining Power." | |
| dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | |
| dc.identifier.mitlicense | PUBLISHER_POLICY | |
| dc.eprint.version | Final published version | en_US |
| dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
| eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
| dc.date.updated | 2022-11-02T22:16:22Z | |
| dc.language.rfc3066 | en | |
| dc.rights.holder | ACM | |
| dspace.date.submission | 2022-11-02T22:16:22Z | |
| mit.license | PUBLISHER_POLICY | |
| mit.metadata.status | Authority Work and Publication Information Needed | en_US |