{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T10:59:26Z","timestamp":1769165966788,"version":"3.49.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/iccad45719.2019.8942056","type":"proceedings-article","created":{"date-parts":[[2020,1,3]],"date-time":"2020-01-03T00:44:25Z","timestamp":1578012265000},"page":"1-8","source":"Crossref","is-referenced-by-count":16,"title":["Re-Tangle: A ReRAM-based Processing-in-Memory Architecture for Transaction-based Blockchain"],"prefix":"10.1109","author":[{"given":"Qian","family":"Wang","sequence":"first","affiliation":[{"name":"Shandong University,Qingdao,China"}]},{"given":"Tianyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Shandong University,Qingdao,China"}]},{"given":"Zhaoyan","family":"Shen","sequence":"additional","affiliation":[{"name":"Shandong University,Qingdao,China"}]},{"given":"Zhiping","family":"Jia","sequence":"additional","affiliation":[{"name":"Shandong University,Qingdao,China"}]},{"given":"Mengying","family":"Zhao","sequence":"additional","affiliation":[{"name":"Shandong University,Qingdao,China"}]},{"given":"Zili","family":"Shao","sequence":"additional","affiliation":[{"name":"Chinese University of Hong Kong,Hong Kong,China"}]}],"member":"263","reference":[{"key":"ref1","author":"Nakamoto","year":"2008","journal-title":"Bitcoin: A peer-to-peer electronic cash system"},{"key":"ref2","volume-title":"The tangle, iota whitepaper","author":"Popov","year":"2018"},{"key":"ref3","volume-title":"Iota-benchmark-tool","year":"2019"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PDP2018.2018.00041"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3120895.3120897"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3287624.3287656"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2013.6691092"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486401"},{"issue":"6","key":"ref9","first-page":"1211","article-title":"Blockchain distributed ledger technologies for biomedical and health care applications","volume":"24","author":"K.","year":"2017","journal-title":"JAMIA"},{"key":"ref10","article-title":"Decentralizing privacy: Using blockchain to protect personal data","volume-title":"IEEE Security and Privacy Workshops (SPW\u201915)","author":"Z.","year":"2015"},{"issue":"370695","key":"ref11","first-page":"13","article-title":"Zenith certifier: A framework to authenticate academic verifications using tangle","volume":"2018","author":"Wahab","year":"2018","journal-title":"Journal of Software and Systems Development"},{"key":"ref12","volume-title":"The first glance at the simulation of the tangle: discrete model","author":"Kusmierz","year":"2017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644201"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3177916"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/make1010005"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056056"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001140"},{"key":"ref18","volume-title":"Extracting tangle properties in continuous time via large-scale simulations","author":"Kusmierz","year":"2018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2017.7858415"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.202"},{"issue":"30","key":"ref21","article-title":"Keccak sponge function family main document","volume":"3","author":"Bertoni","year":"2009","journal-title":"Submission to NIST (Round 2)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2012.2185930"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00052"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001139"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1021\/nn501824r"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2017.2681458"},{"key":"ref27","volume-title":"Intel processor i5\u20136260u","year":"2018"}],"event":{"name":"2019 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)","location":"Westminster, CO, USA","start":{"date-parts":[[2019,11,4]]},"end":{"date-parts":[[2019,11,7]]}},"container-title":["2019 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8931666\/8942037\/08942056.pdf?arnumber=8942056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T00:41:04Z","timestamp":1706056864000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8942056\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iccad45719.2019.8942056","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}