{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:05:33Z","timestamp":1730286333413,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T00:00:00Z","timestamp":1618790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T00:00:00Z","timestamp":1618790400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T00:00:00Z","timestamp":1618790400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,19]]},"DOI":"10.1109\/ntms49979.2021.9432663","type":"proceedings-article","created":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T20:30:38Z","timestamp":1621369838000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["Towards the Identification of Security Tokens on Ethereum"],"prefix":"10.1109","author":[{"given":"Monika di","family":"Angelo","sequence":"first","affiliation":[]},{"given":"Gernot","family":"Salzer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"ERC-20 token standard","year":"2015","author":"vogelsteller","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPS49028.2020.00001"},{"article-title":"Characterizing code clones in the ethereum smart contract ecosystem","year":"2019","author":"he","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264596"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00024"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_7"},{"key":"ref4","article-title":"Blockchain-Based Token Sales, Initial Coin Offerings, and the Democratization of Public Capital Markets","volume":"70","author":"rohr","year":"2019","journal-title":"Hastings LJ"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1515\/ecfr-2018-0021"},{"year":"0","key":"ref6"},{"key":"ref5","article-title":"From Initial Coin Offerings to Security Tokens: A US Federal Securities Law Analysis","volume":"22","author":"mendelson","year":"2019","journal-title":"Stan Tech L Rev"},{"year":"0","key":"ref8","article-title":"MIFID II: directive 2014\/65\/EU"},{"year":"0","key":"ref7"},{"key":"ref2","article-title":"To token or not to token: Tools for understanding blockchain tokens","author":"oliveira","year":"2018","journal-title":"International Conference on Information Systems (ICIS)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.019"},{"year":"2019","key":"ref9","article-title":"Contract ABI Specification"}],"event":{"name":"2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2021,4,19]]},"location":"Paris, France","end":{"date-parts":[[2021,4,21]]}},"container-title":["2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9432489\/9432638\/09432663.pdf?arnumber=9432663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:41:45Z","timestamp":1652197305000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9432663\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,19]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ntms49979.2021.9432663","relation":{},"subject":[],"published":{"date-parts":[[2021,4,19]]}}}