{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T15:19:16Z","timestamp":1762096756671,"version":"build-2065373602"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,24]]},"DOI":"10.1109\/bcca58897.2023.10338932","type":"proceedings-article","created":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T19:51:48Z","timestamp":1702324308000},"page":"359-360","source":"Crossref","is-referenced-by-count":5,"title":["CoMMA Protocol: Towards Complete Mitigation of Maximal Extractable Value (MEV) Attacks"],"prefix":"10.1109","author":[{"given":"Dev","family":"Churiwala","sequence":"first","affiliation":[{"name":"Viterbi School of Engineering, University of Southern California,Los Angeles,USA"}]},{"given":"Bhaskar","family":"Krishnamachari","sequence":"additional","affiliation":[{"name":"Viterbi School of Engineering, University of Southern California,Los Angeles,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00040"},{"key":"ref2","article-title":"Uniswap v3 core","volume-title":"Tech. rep., Uniswap, Tech. Rep.","author":"Adams","year":"2021"},{"volume-title":"Uniswap v3 trades %, 30d by origination","year":"2022","author":"Sui","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3406\/reco.1995.409747"},{"key":"ref5","article-title":"A2mm: Mitigating frontrunning, transaction reordering and consensus instability in decentralized ex-changes","author":"Zhou","year":"2021","journal-title":"arXiv preprint"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3494106.3528682"},{"key":"ref7","volume":"10","author":"Pillai","year":"2022","journal-title":"Blockchain MEV minimisation solution with price guarantee reward"},{"key":"ref8","article-title":"Maximal extractable value (mev) protection on a dag","author":"Malkhi","year":"2022","journal-title":"arXiv preprint"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054113"},{"journal-title":"Analyzing and preventing sandwich attacks in ethereum","year":"2021","author":"Z\u00fcst","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43725-1_13"}],"event":{"name":"2023 Fifth International Conference on Blockchain Computing and Applications (BCCA)","start":{"date-parts":[[2023,10,24]]},"location":"Kuwait, Kuwait","end":{"date-parts":[[2023,10,26]]}},"container-title":["2023 Fifth International Conference on Blockchain Computing and Applications (BCCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10338825\/10338826\/10338932.pdf?arnumber=10338932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T00:12:37Z","timestamp":1703031157000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10338932\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,24]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/bcca58897.2023.10338932","relation":{},"subject":[],"published":{"date-parts":[[2023,10,24]]}}}