{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T17:13:06Z","timestamp":1724519586527},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T00:00:00Z","timestamp":1606176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T00:00:00Z","timestamp":1606176000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T00:00:00Z","timestamp":1606176000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,24]]},"DOI":"10.1109\/nca51143.2020.9306715","type":"proceedings-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T23:22:37Z","timestamp":1609888957000},"source":"Crossref","is-referenced-by-count":4,"title":["Permissionless Consensus based on Proof-of-Eligibility"],"prefix":"10.1109","author":[{"given":"Geoffrey","family":"Saunois","sequence":"first","affiliation":[]},{"given":"Frederique","family":"Robin","sequence":"additional","affiliation":[]},{"given":"Emmanuelle","family":"Anceaume","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Sericola","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref3","article-title":"Ouroboros praos: An adaptively-secure, semi-synchronous proof-of-stake blockchain","author":"bernardo","year":"2018","journal-title":"International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT)"},{"key":"ref10","article-title":"Proofs of space-time and rational proofs of storage","author":"moran","year":"2016","journal-title":"Cryptology ePrint Archive Report 2016\/035"},{"key":"ref6","year":"2019","journal-title":"EOS IO Technical White Paper v2"},{"key":"ref11","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31277-0_10"},{"key":"ref8","year":"2019","journal-title":"Intel Hyperledger Sawtooth description"},{"key":"ref7","first-page":"5168","article-title":"Algorand: Scaling byzantine agreements for cryptocur-rencies","author":"gilad","year":"2017","journal-title":"Proceedings of the 26th Symposium on Operating Systems Principles (SOSP) SOSP 17"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10879-7_31"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SFFCS.1999.814584"},{"key":"ref1","article-title":"The blockchain consensus layer and bft","author":"abraham","year":"2017","journal-title":"Bulletin of the European Association for Theoretical Computer Science"}],"event":{"name":"2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)","location":"Cambridge, MA, USA","start":{"date-parts":[[2020,11,24]]},"end":{"date-parts":[[2020,11,27]]}},"container-title":["2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9306506\/9306688\/09306715.pdf?arnumber=9306715","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:51:30Z","timestamp":1656453090000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9306715\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,24]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/nca51143.2020.9306715","relation":{},"subject":[],"published":{"date-parts":[[2020,11,24]]}}}