{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:33Z","timestamp":1750221033335,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,27]],"date-time":"2018-09-27T00:00:00Z","timestamp":1538006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,27]]},"DOI":"10.1145\/3240719.3241790","type":"proceedings-article","created":{"date-parts":[[2018,9,18]],"date-time":"2018-09-18T12:11:39Z","timestamp":1537272699000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Authenticated modular maps in Haskell"],"prefix":"10.1145","author":[{"given":"Victor Cacciari","family":"Miraldo","sequence":"first","affiliation":[{"name":"Utrecht University, Netherlands"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Harold","family":"Carr","sequence":"additional","affiliation":[{"name":"Oracle Labs, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alex","family":"Kogan","sequence":"additional","affiliation":[{"name":"Oracle Labs, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mark","family":"Moir","sequence":"additional","affiliation":[{"name":"Oracle Labs, New Zealand"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maurice","family":"Herlihy","sequence":"additional","affiliation":[{"name":"Brown University, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2018,9,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. auth-adt. (2018). https:\/\/github.com\/adjoint-io\/auth-adt  2018. auth-adt. (2018). https:\/\/github.com\/adjoint-io\/auth-adt"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040306"},{"key":"e_1_3_2_1_5_1","volume-title":"C. Stein","author":"Cormen T.H.","year":"2001","unstructured":"T.H. Cormen , T.H. Cormen , C.E. Leiserson , R.L. Rivest , Massachusetts Institute of Technology , C. Stein , Inc Books24x7, MIT Press, and McGraw-Hill Publishing Company. 2001 . Introduction To Algorithms. MIT Press . T.H. Cormen, T.H. Cormen, C.E. Leiserson, R.L. Rivest, Massachusetts Institute of Technology, C. Stein, Inc Books24x7, MIT Press, and McGraw-Hill Publishing Company. 2001. Introduction To Algorithms. MIT Press."},{"key":"e_1_3_2_1_6_1","unstructured":"Cryptographic hash functions 2018. Cryptographic hash functions. (2018). https:\/\/en.wikipedia.org\/wiki\/Cryptographic_hash_function.  Cryptographic hash functions 2018. Cryptographic hash functions. (2018). https:\/\/en.wikipedia.org\/wiki\/Cryptographic_hash_function."},{"key":"e_1_3_2_1_7_1","volume-title":"Ahmed","author":"Eisenberg Richard A.","year":"2016","unstructured":"Richard A. Eisenberg , Stephanie Weirich , and Hamidhasan G . Ahmed . 2016 . Visible Type Application. In Programming Languages and Systems, Peter Thiemann (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg, 229-254. Richard A. Eisenberg, Stephanie Weirich, and Hamidhasan G. Ahmed. 2016. Visible Type Application. In Programming Languages and Systems, Peter Thiemann (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 229-254."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/downloads.haskell.org\/~ghc\/8.4.1\/docs\/html\/users_guide\/","author":"Team GHC","year":"2018","unstructured":"GHC Team . 2018. GHC 8.4.1 User's Guide . ( 2018 ). https:\/\/downloads.haskell.org\/~ghc\/8.4.1\/docs\/html\/users_guide\/ . GHC Team. 2018. GHC 8.4.1 User's Guide. (2018). https:\/\/downloads.haskell.org\/~ghc\/8.4.1\/docs\/html\/users_guide\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/199448.199528"},{"volume-title":"Advances in Cryptology -- CRYPTO '87","author":"Merkle Ralph C.","key":"e_1_3_2_1_10_1","unstructured":"Ralph C. Merkle . 1988. A Digital Signature Based on a Conventional Encryption Function . In Advances in Cryptology -- CRYPTO '87 , Carl Pomerance (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 369-378. Ralph C. Merkle. 1988. A Digital Signature Based on a Conventional Encryption Function. In Advances in Cryptology -- CRYPTO '87, Carl Pomerance (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 369-378."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808098.2808099"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2578855.2535851"},{"key":"e_1_3_2_1_13_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2009","unstructured":"Satoshi Nakamoto . 2009 . Bitcoin: A peer-to-peer electronic cash system. (2009). http:\/\/www.bitcoin.org\/bitcoin.pdf Satoshi Nakamoto. 2009. Bitcoin: A peer-to-peer electronic cash system. (2009). http:\/\/www.bitcoin.org\/bitcoin.pdf"},{"key":"e_1_3_2_1_14_1","unstructured":"P\u00e9ter Szil\u00e1gyi. 2015. eth\/63 fast synchronization algorithm #1889. (2015). https:\/\/github.com\/ethereum\/go-ethereum\/pull\/1889  P\u00e9ter Szil\u00e1gyi. 2015. eth\/63 fast synchronization algorithm #1889. (2015). https:\/\/github.com\/ethereum\/go-ethereum\/pull\/1889"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103786.2103795"}],"event":{"name":"ICFP '18: 23nd ACM SIGPLAN International Conference on Functional Programming","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"St. Louis MO USA","acronym":"ICFP '18"},"container-title":["Proceedings of the 3rd ACM SIGPLAN International Workshop on Type-Driven Development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240719.3241790","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3240719.3241790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:33Z","timestamp":1750207413000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240719.3241790"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,27]]},"references-count":14,"alternative-id":["10.1145\/3240719.3241790","10.1145\/3240719"],"URL":"https:\/\/doi.org\/10.1145\/3240719.3241790","relation":{},"subject":[],"published":{"date-parts":[[2018,9,27]]},"assertion":[{"value":"2018-09-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}