{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T08:15:53Z","timestamp":1775636153818,"version":"3.50.1"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319702773","type":"print"},{"value":"9783319702780","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-70278-0_31","type":"book-chapter","created":{"date-parts":[[2017,11,17]],"date-time":"2017-11-17T21:03:19Z","timestamp":1510952599000},"page":"494-509","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":291,"title":["An Empirical Analysis of Smart Contracts: Platforms, Applications, and Design Patterns"],"prefix":"10.1007","author":[{"given":"Massimo","family":"Bartoletti","sequence":"first","affiliation":[]},{"given":"Livio","family":"Pompianu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,19]]},"reference":[{"key":"31_CR1","unstructured":"Bitcoin contract. \nhttps:\/\/en.bitcoin.it\/wiki\/Contract\n\n. Accessed 14 Jan 2017"},{"key":"31_CR2","unstructured":"Bitcoin OP_RETURN wiki page. \nhttps:\/\/en.bitcoin.it\/wiki\/OP_RETURN\n\n. Accessed 14 Jan 2017"},{"key":"31_CR3","unstructured":"Dgx website. \nhttps:\/\/www.dgx.io\/\n\n. Accessed 14 Jan 2017"},{"key":"31_CR4","unstructured":"Ethereum hard fork 20 July 2016. \nhttps:\/\/blog.ethereum.org\/2016\/07\/20\/hard-fork-completed\/\n\n. Accessed 14 Jan 2017"},{"key":"31_CR5","unstructured":"Ethereum request for comment 20. \nhttps:\/\/github.com\/ethereum\/wiki\/wiki\/Standardized_Contract_APIs\n\n. Accessed 14 Jan 2017"},{"key":"31_CR6","unstructured":"Lisk. \nhttps:\/\/lisk.io\/\n\n. Accessed 14 Jan 2017"},{"key":"31_CR7","unstructured":"Making sense of blockchain smart contracts. \nhttp:\/\/www.coindesk.com\/making-sense-smart-contracts\/\n\n. Accessed 14 Jan 2017"},{"key":"31_CR8","unstructured":"Monax. \nhttps:\/\/monax.io\/\n\n. Accessed 14 Jan 2017"},{"key":"31_CR9","unstructured":"Smart contracts: The good, the bad and the lazy. \nhttp:\/\/www.multichain.com\/blog\/2015\/11\/smart-contracts-good-bad-lazy\/\n\n. Accessed 14 Jan 2017"},{"key":"31_CR10","unstructured":"Stellar. \nhttps:\/\/www.stellar.org\/\n\n. Accessed 14 Jan 2017"},{"key":"31_CR11","unstructured":"The Stellar consensus protocol. \nhttps:\/\/www.stellar.org\/papers\/stellar-consensus-protocol.pdf\n\n. Accessed 14 Jan 2017"},{"key":"31_CR12","unstructured":"Thinking about smart contract security. \nhttps:\/\/blog.ethereum.org\/2016\/06\/19\/thinking-smart-contract-security\/\n\n. Accessed 14 Jan 2017"},{"key":"31_CR13","unstructured":"Understanding the DAO attack. \nhttp:\/\/www.coindesk.com\/understanding-dao-hack-journalists\/\n\n. Accessed 14 Jan 2017"},{"key":"31_CR14","unstructured":"Another bug in the ens, you can win with an unlimited high bid without paying for it (2017). \nhttps:\/\/www.reddit.com\/r\/ethereum\/comments\/5zctus\/another_bug_in_the_ens_you_can_win_with_an\/\n\n. Accessed 17 Mar 2017"},{"key":"31_CR15","unstructured":"Anderson, L., Holz, R., Ponomarev, A., Rimba, P., Weber, I.: New kids on the block: an analysis of modern blockchains. CoRR abs\/1606.06530 (2016)"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, L.: Secure multiparty computations on Bitcoin. In: IEEE S & P, pp. 443\u2013458 (2014)","DOI":"10.1109\/SP.2014.35"},{"issue":"4","key":"31_CR17","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1145\/2896386","volume":"59","author":"M Andrychowicz","year":"2016","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, L.: Secure ultiparty computations on Bitcoin. Commun. ACM 59(4), 76\u201384 (2016). \nhttp:\/\/doi.acm.org\/10.1145\/2896386","journal-title":"Commun. ACM"},{"key":"31_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-662-54455-6_8","volume-title":"Principles of Security and Trust","author":"N Atzei","year":"2017","unstructured":"Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts (SoK). In: Maffei, M., Ryan, M. (eds.) POST 2017. LNCS, vol. 10204, pp. 164\u2013186. Springer, Heidelberg (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-662-54455-6_8"},{"key":"31_CR19","unstructured":"Back, A., Bentov, I.: Note on fair coin toss via Bitcoin (2013). \nhttp:\/\/www.cs.technion.ac.il\/~idddo\/cointossBitcoin.pdf"},{"key":"31_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-319-45741-3_14","volume-title":"Computer Security \u2013 ESORICS 2016","author":"W Banasik","year":"2016","unstructured":"Banasik, W., Dziembowski, S., Malinowski, D.: Efficient zero-knowledge contingent payments in cryptocurrencies without scripts. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9879, pp. 261\u2013280. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-45741-3_14"},{"key":"31_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-53357-4_1","volume-title":"Financial Cryptography and Data Security","author":"K Baqer","year":"2016","unstructured":"Baqer, K., Huang, D.Y., McCoy, D., Weaver, N.: Stressing out: Bitcoin \u201cstress testing\u201d. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 3\u201318. Springer, Heidelberg (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-662-53357-4_1"},{"key":"31_CR22","unstructured":"Bartoletti, M., Carta, S., Cimoli, T., Saia, R.: Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact. CoRR abs\/1703.03779 (2017). \nhttps:\/\/arxiv.org\/abs\/1703.03779"},{"key":"31_CR23","unstructured":"Bartoletti, M., Pompianu, L.: An analysis of Bitcoin OP_RETURN metadata. CoRR abs\/1702.01024 (2016). To appear in Bitcoin Workshop 2017. \nhttps:\/\/arxiv.org\/abs\/1702.01024"},{"key":"31_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-662-44381-1_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"I Bentov","year":"2014","unstructured":"Bentov, I., Kumaresan, R.: How to use Bitcoin to design fair protocols. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8617, pp. 421\u2013439. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-44381-1_24"},{"key":"31_CR25","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Delignat-Lavaud, A., Fournet, C., Gollamudi, A., Gonthier, G., Kobeissi, N., Rastogi, A., Sibut-Pinote, T., Swamy, N., Zanella-Beguelin, S.: Formal verification of smart contracts. In: PLAS (2016)","DOI":"10.1145\/2993600.2993611"},{"key":"31_CR26","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for Bitcoin and cryptocurrencies. In: IEEE S & P, pp. 104\u2013121 (2015)","DOI":"10.1109\/SP.2015.14"},{"key":"31_CR27","unstructured":"Brown, R.G., Carlyle, J., Grigg, I., Hearn, M.: Corda: an introduction (2016). \nhttp:\/\/r3cev.com\/s\/corda-introductory-whitepaper-final.pdf"},{"key":"31_CR28","unstructured":"Buterin, V.: Ethereum: a next generation smart contract and decentralized application platform (2013). \nhttps:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper"},{"key":"31_CR29","unstructured":"Churyumov, A.: Byteball: a decentralized system for transfer of value (2016). \nhttps:\/\/byteball.org\/Byteball.pdf"},{"key":"31_CR30","unstructured":"Clack, C.D., Bakshi, V.A., Braine, L.: Smart contract templates: foundations, design landscape and research directions. CoRR abs\/1608.00771 (2016)"},{"key":"31_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-662-53357-4_6","volume-title":"Financial Cryptography and Data Security","author":"K Delmolino","year":"2016","unstructured":"Delmolino, K., Arnett, M., Kosba, A., Miller, A., Shi, E.: Step by step towards creating a safe smart contract: lessons and insights from a cryptocurrency lab. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 79\u201394. Springer, Heidelberg (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-662-53357-4_6"},{"key":"31_CR32","unstructured":"Dermody, R., Krellenstein, A., Slama, O., Wagner, E.: Counterparty: Protocol specification (2014). \nhttp:\/\/counterparty.io\/docs\/protocol_specification\/\n\n. Accessed 14 Jan 2017"},{"key":"31_CR33","doi-asserted-by":"crossref","unstructured":"Frantz, C.K., Nowostawski, M.: From institutions to code: towards automated generation of smart contracts. In: Workshop on Engineering Collective Adaptive Systems (eCAS) (2016)","DOI":"10.1109\/FAS-W.2016.53"},{"key":"31_CR34","unstructured":"Glaser, F., Zimmermann, K., Haferkorn, M., Weber, M.C.: Bitcoin - asset or currency? revealing users\u2019 hidden intentions. In: European Conference on Information Systems (ECIS) (2014)"},{"key":"31_CR35","unstructured":"Grau, P.: Lessons learned from making a chess game for Ethereum (2016). \nhttps:\/\/medium.com\/@graycoding\/lessons-learned-from-making-a-chess-game-for-ethereum-6917c01178b6#.fwtdwly6e\n\n. Accessed 14 Jan 2017"},{"key":"31_CR36","doi-asserted-by":"crossref","unstructured":"Kumaresan, R., Moran, T., Bentov, I.: How to use Bitcoin to play decentralized poker. In: ACM CCS, pp. 195\u2013206 (2015)","DOI":"10.1145\/2810103.2813712"},{"key":"31_CR37","unstructured":"Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: ACM CCS (2016). \nhttp:\/\/eprint.iacr.org\/2016\/633"},{"key":"31_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-319-42019-6_10","volume-title":"Rule Technologies. Research, Tools, and Applications","author":"B Marino","year":"2016","unstructured":"Marino, B., Juels, A.: Setting standards for altering and undoing smart contracts. In: Alferes, J.J.J., Bertossi, L., Governatori, G., Fodor, P., Roman, D. (eds.) RuleML 2016. LNCS, vol. 9718, pp. 151\u2013166. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-42019-6_10"},{"key":"31_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-662-48051-9_2","volume-title":"Financial Cryptography and Data Security","author":"M M\u00f6ser","year":"2015","unstructured":"M\u00f6ser, M., B\u00f6hme, R.: Trends, tips, tolls: a longitudinal study of Bitcoin transaction fees. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976, pp. 19\u201333. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-48051-9_2"},{"key":"31_CR40","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). \nhttps:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"31_CR41","unstructured":"Nomura Research Institute: Survey on blockchain technologies and related services. \nhttp:\/\/www.meti.go.jp\/english\/press\/2016\/pdf\/0531_01f.pdf"},{"key":"31_CR42","unstructured":"Popejoy, S.: The Pact smart contract language (2016). \nhttp:\/\/kadena.io\/pact"},{"key":"31_CR43","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-1-4614-4139-7_10","volume-title":"Security and Privacy in Social Networks","author":"F Reid","year":"2013","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the Bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197\u2013223. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-1-4614-4139-7_10"},{"key":"31_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full Bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-39884-1_2"},{"key":"31_CR45","unstructured":"Seijas, P.L., Thompson, S., McAdams, D.: Scripting smart contracts for distributed ledger technology. Cryptology ePrint Archive, Report 2016\/1156 (2016). \nhttp:\/\/eprint.iacr.org\/2016\/1156"},{"key":"31_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/978-3-662-47854-7_32","volume-title":"Financial Cryptography and Data Security","author":"Y Sompolinsky","year":"2015","unstructured":"Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in Bitcoin. In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 507\u2013527. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-47854-7_32"},{"key":"31_CR47","doi-asserted-by":"crossref","unstructured":"Szabo, N.: Formalizing and securing relationships on public networks. First Monday 2(9) (1997). \nhttp:\/\/firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/view\/548","DOI":"10.5210\/fm.v2i9.548"},{"key":"31_CR48","unstructured":"UK Government Chief Scientific Adviser: Distributed ledger technology: beyond block chain. \nhttps:\/\/www.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/492972\/gs-16-1-distributed-ledger-technology.pdf"},{"key":"31_CR49","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger (2014). \nhttp:\/\/gavwood.com\/paper.pdf"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70278-0_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T03:18:28Z","timestamp":1519010308000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-70278-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319702773","9783319702780"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70278-0_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}