{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:07:25Z","timestamp":1771330045635,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,3]]},"DOI":"10.1109\/icbc51069.2021.9461142","type":"proceedings-article","created":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T16:16:55Z","timestamp":1624551415000},"page":"1-3","source":"Crossref","is-referenced-by-count":6,"title":["Off-chain Execution and Verification of Computationally Intensive Smart Contracts"],"prefix":"10.1109","author":[{"given":"Emrah","family":"Sariboz","sequence":"first","affiliation":[]},{"given":"Kartick","family":"Kolachala","sequence":"additional","affiliation":[]},{"given":"Gaurav","family":"Panwar","sequence":"additional","affiliation":[]},{"given":"Roopa","family":"Vishwanathan","sequence":"additional","affiliation":[]},{"given":"Satyajayant","family":"Misra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"ref11","article-title":"Yoda: Enabling computationally intensive contracts on blockchains with byzantine and selfish nodes","author":"das","year":"2018"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/226643.226652"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/273865.273901"},{"key":"ref14","first-page":"279","article-title":"Secure distributed computing in a commercial environment","author":"golle","year":"2001","journal-title":"Financial Cryptography 5th International Conference FC 2001 Grand Cayman British West Indies February 19-22 2002 Proceedings"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_9"},{"key":"ref16","first-page":"601","article-title":"Query execution assurance for outsourced databases","author":"sion","year":"2005","journal-title":"Proceedings of the International Conference on Very Large Data Bases VLDB"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45353-9_31"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090245"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374396"},{"key":"ref28","article-title":"Ethereum Stats","year":"2020"},{"key":"ref4","first-page":"299","article-title":"High-resolution side channels for untrusted operating systems","author":"h\u00e4hnel","year":"2017","journal-title":"2017 USENIX Annual Technical Conference (USENIX ATC 17)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00199"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417243"},{"key":"ref6","first-page":"1041","article-title":"Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution","author":"van bulck","year":"2017","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"ref7","first-page":"557","article-title":"Inferring fine-grained control flow inside SGX enclaves with branch shadowing","author":"lee","year":"2017","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"key":"ref2","article-title":"Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contract execution","author":"cheng","year":"2018"},{"key":"ref9","article-title":"A Survey of Published Attacks on Intel SGX","author":"nilsson","year":"0"},{"key":"ref1","first-page":"801","article-title":"Fastkitten: practical smart contracts on bitcoin","author":"das","year":"2019","journal-title":"28th USENIX Security Symposium (USENIX Security 19)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.47"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_26"},{"key":"ref24","first-page":"253","article-title":"Taking proof-based verified computation a few steps closer to practicality","author":"setty","year":"2012","journal-title":"Proceedings of the 21th USENIX Security Symposium"},{"key":"ref23","article-title":"Making argument systems for outsourced computation practical (sometimes)","author":"setty","year":"2012","journal-title":"19th Annual Network & Distributed System Security Symposium"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090263"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.48"}],"event":{"name":"2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Sydney, Australia","start":{"date-parts":[[2021,5,3]]},"end":{"date-parts":[[2021,5,6]]}},"container-title":["2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9460986\/9461049\/09461142.pdf?arnumber=9461142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:42:44Z","timestamp":1652182964000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9461142\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,3]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icbc51069.2021.9461142","relation":{},"subject":[],"published":{"date-parts":[[2021,5,3]]}}}