{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T14:04:05Z","timestamp":1749737045213,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030614669"},{"type":"electronic","value":"9783030614676"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61467-6_7","type":"book-chapter","created":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T05:04:26Z","timestamp":1603688666000},"page":"89-111","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Native Custom Tokens in the Extended UTXO Model"],"prefix":"10.1007","author":[{"given":"Manuel M. T.","family":"Chakravarty","sequence":"first","affiliation":[]},{"given":"James","family":"Chapman","sequence":"additional","affiliation":[]},{"given":"Kenneth","family":"MacKenzie","sequence":"additional","affiliation":[]},{"given":"Orestis","family":"Melkonian","sequence":"additional","affiliation":[]},{"given":"Jann","family":"M\u00fcller","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Peyton Jones","sequence":"additional","affiliation":[]},{"given":"Polina","family":"Vinogradova","sequence":"additional","affiliation":[]},{"given":"Philip","family":"Wadler","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Atzei, N., Bartoletti, M., Lande, S., Yoshida, N., Zunino, R.: Developing secure Bitcoin contracts with BitML. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1124\u20131128 (2019)","DOI":"10.1145\/3338906.3341173"},{"key":"7_CR2","volume-title":"Principles of Model Checking","author":"C Baier","year":"2008","unstructured":"Baier, C., Katoen, J.: Principles of Model Checking. MIT Press, Cambridge (2008)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Zunino, R.: BitML: a calculus for Bitcoin smart contracts. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 83\u2013100. ACM (2018)","DOI":"10.1145\/3243734.3243795"},{"key":"7_CR4","unstructured":"Chakravarty, M.M.T., et al.: UTXO$$_{\\rm ma}$$: UTXO with multi-asset support. In: Margaria, T., Steffen, B. (eds.) ISoLA 2020. LNCS, vol. 12478, pp. 112\u2013130. Springer, Heidelberg (2020). \nhttps:\/\/omelkonian.github.io\/data\/publications\/utxoma.pdf"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-030-54455-3_37","volume-title":"Financial Cryptography and Data Security","author":"MMT Chakravarty","year":"2020","unstructured":"Chakravarty, M.M.T., Chapman, J., MacKenzie, K., Melkonian, O., Peyton Jones, M., Wadler, P.: The extended UTXO model. In: Bernhard, M., et al. (eds.) FC 2020. LNCS, vol. 12063, pp. 525\u2013539. Springer, Cham (2020). \nhttps:\/\/doi.org\/10.1007\/978-3-030-54455-3_37"},{"key":"7_CR6","unstructured":"Chakravarty, M.M.T., Coretti, S., Fitzi, M., Gazi, P., Kant, P., Kiayias, A., Russell, A.: Hydra: Fast isomorphic state channels. Technical report, Cryptology ePrint Archive, Report 2020\/299 (2020). \nhttps:\/\/eprint.iacr.org\/2020\/299"},{"key":"7_CR7","unstructured":"Entriken, W., Shirley, D., Evans, J., Sachs, N.: ERC-721 non-fungible token standard. Ethereum Foundation (2018). \nhttps:\/\/eips.ethereum.org\/EIPS\/eip-721"},{"key":"7_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68635-4","volume-title":"Temporal Logic and State Systems","author":"F Kr\u00f6ger","year":"2008","unstructured":"Kr\u00f6ger, F., Merz, S.: Temporal Logic and State Systems. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-68635-4"},{"key":"7_CR9","unstructured":"Maker Team: The Dai stablecoin system (2017). \nhttps:\/\/makerdao.com\/whitepaper\/DaiDec17WP.pdf"},{"key":"7_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0931-7","volume-title":"The Temporal Logic of Reactive and Concurrent Systems - Specification","author":"Z Manna","year":"1992","unstructured":"Manna, Z., Pnueli, A.: The Temporal Logic of Reactive and Concurrent Systems - Specification. Springer, Heidelberg (1992). \nhttps:\/\/doi.org\/10.1007\/978-1-4612-0931-7"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/978-3-030-32101-7_27","volume-title":"Financial Cryptography and Data Security","author":"A Mavridou","year":"2019","unstructured":"Mavridou, A., Laszka, A., Stachtiari, E., Dubey, A.: VeriSolid: correct-by-design smart contracts for ethereum. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 446\u2013465. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-32101-7_27"},{"key":"7_CR12","volume-title":"Communicating and Mobile Systems: the $$\\pi $$-Calculus","author":"R Milner","year":"1999","unstructured":"Milner, R.: Communicating and Mobile Systems: the $$\\pi $$-Calculus. Cambridge University Press, Cambridge (1999)"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-25318-8_26","volume-title":"Programming Languages and Systems","author":"K Nakata","year":"2011","unstructured":"Nakata, K., Uustalu, T., Bezem, M.: A proof pearl with the fan theorem and bar induction. In: Yang, H. (ed.) APLAS 2011. LNCS, vol. 7078, pp. 353\u2013368. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-25318-8_26"},{"key":"7_CR14","unstructured":"Sergey, I., Kumar, A., Hobor, A.: Scilla: a smart contract intermediate-level language. arXiv preprint \narXiv:1801.00687\n\n (2018)"},{"issue":"OOPSLA","key":"7_CR15","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1145\/3360611","volume":"3","author":"I Sergey","year":"2019","unstructured":"Sergey, I., Nagaraj, V., Johannsen, J., Kumar, A., Trunov, A., Hao, K.C.G.: Safer smart contract programming with Scilla. Proc. ACM Program. Lang. 3(OOPSLA), 185 (2019)","journal-title":"Proc. ACM Program. Lang."},{"key":"7_CR16","unstructured":"Stellar Development Foundation: Stellar Development Guides (2020). \nhttps:\/\/solidity.readthedocs.io\/"},{"key":"7_CR17","unstructured":"Vogelsteller, F., Buterin, V.: ERC-20 token standard. Ethereum Foundation (Stiftung Ethereum), Zug, Switzerland (2015). \nhttps:\/\/eips.ethereum.org\/EIPS\/eip-20"},{"key":"7_CR18","unstructured":"Waves Team: Waves blockchain documentation (2020). \nhttps:\/\/docs.wavesprotocol.org\/"}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation: Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61467-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T05:06:05Z","timestamp":1603688765000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-61467-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030614669","9783030614676"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61467-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"27 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISoLA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Leveraging Applications of Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rhodes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isola2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isola-conference.org\/isola2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}