{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:01:20Z","timestamp":1760043680513},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319710747"},{"type":"electronic","value":"9783319710754"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71075-4_19","type":"book-chapter","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T17:37:18Z","timestamp":1511890638000},"page":"171-179","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations"],"prefix":"10.1007","author":[{"given":"Fabio","family":"Massacci","sequence":"first","affiliation":[]},{"given":"Chan Nam","family":"Ngo","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Nie","sequence":"additional","affiliation":[]},{"given":"Daniele","family":"Venturi","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Williams","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,29]]},"reference":[{"key":"19_CR1","unstructured":"Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts. Technical report, Cryptology ePrint Archive: Report 2016\/1007 (2016). https:\/\/eprint.iacr.org\/2016\/1007"},{"issue":"3","key":"19_CR2","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1002\/(SICI)1099-1689(199609\/12)6:3\/4<125::AID-STVR121>3.0.CO;2-X","volume":"6","author":"RV Binder","year":"1996","unstructured":"Binder, R.V.: Testing object-oriented software: a survey. J. Softw. Test. Verif. Reliab. 6(3), 125\u2013252 (1996)","journal-title":"J. Softw. Test. Verif. Reliab."},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-642-15497-3_16","volume-title":"Computer Security \u2013 ESORICS 2010","author":"S Chakravarty","year":"2010","unstructured":"Chakravarty, S., Stavrou, A., Keromytis, A.D.: Traffic analysis against low-latency anonymity networks using available bandwidth estimation. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 249\u2013267. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15497-3_16"},{"issue":"2","key":"19_CR4","first-page":"44","volume":"1","author":"BJ Cox","year":"1988","unstructured":"Cox, B.J.: The need for specification and testing languages. J. Object-Oriented Program. 1(2), 44\u201347 (1988)","journal-title":"J. Object-Oriented Program."},{"key":"19_CR5","unstructured":"Duffield, E., Diaz, D.: Dash: a privacy centric cryptocurrency (2014)"},{"key":"19_CR6","unstructured":"Ethereum: A next-generation smart contract and decentralized application platform (2015). https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper . Accessed 30 Dec 2015"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Massacci, F., Ngo, C.N., Nie, J., Venturi, D., Williams, J.: FuturesMEX: secure distributed futures market exchange. Submitted for publication (2017)","DOI":"10.1109\/SP.2018.00028"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology \u2014 CRYPTO 1987","author":"RC Merkle","year":"1988","unstructured":"Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369\u2013378. Springer, Heidelberg (1988). https:\/\/doi.org\/10.1007\/3-540-48184-2_32"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed e-cash from bitcoin. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 397\u2013411. IEEE (2013)","DOI":"10.1109\/SP.2013.34"},{"key":"19_CR10","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Technical report, Unknown (2008)"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"O\u2019Gorman, G., Blott, S.: Improving stream correlation attacks on anonymous networks. In: Proceedings of the 2009 ACM symposium on Applied Computing, pp. 2024\u20132028. ACM (2009)","DOI":"10.1145\/1529282.1529732"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/3-540-48405-1_35","volume-title":"Advances in Cryptology \u2014 CRYPTO 1999","author":"T Sander","year":"1999","unstructured":"Sander, T., Ta-Shma, A.: Auditable, anonymous electronic cash. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 555\u2013572. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_35"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Sasson, E.B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459\u2013474. IEEE (2014)","DOI":"10.1109\/SP.2014.36"},{"issue":"3","key":"19_CR14","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1257\/jep.10.3.135","volume":"10","author":"DF Spulber","year":"1996","unstructured":"Spulber, D.F.: Market microstructure and intermediation. J. Econ. Perspect. 10(3), 135\u2013152 (1996). http:\/\/www.jstor.org\/stable\/2138524","journal-title":"J. Econ. Perspect."},{"key":"19_CR15","unstructured":"Yang, J., Cui, A., Stolfo, S., Sethumadhavan, S.: Concurrency attacks. In: Presented as part of the 4th USENIX Workshop on Hot Topics in Parallelism (2012)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71075-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T00:42:12Z","timestamp":1570408932000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71075-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319710747","9783319710754"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71075-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}