{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:16Z","timestamp":1750221076529,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T00:00:00Z","timestamp":1541376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Technische Universit\u00e4t M\u00fcnchen \u00f0 Institute for Advanced Study, funded by the German Excellence Initiative and the European Union Seventh Framework Programme","award":["291763"],"award-info":[{"award-number":["291763"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,5]]},"DOI":"10.1145\/3240765.3240820","type":"proceedings-article","created":{"date-parts":[[2018,11,6]],"date-time":"2018-11-06T13:36:57Z","timestamp":1541511417000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["LeapChain"],"prefix":"10.1145","author":[{"given":"Emanuel","family":"Regnath","sequence":"first","affiliation":[{"name":"Technical University of Munich, Germany"}]},{"given":"Sebastian","family":"Steinhorst","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,11,5]]},"reference":[{"volume-title":"The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication","author":"Vukoli\u0107 Marko","key":"e_1_3_2_1_1_1","unstructured":"Marko Vukoli\u0107. 2016. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication. Springer International Publishing, Cham, 112--125."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2905005"},{"key":"e_1_3_2_1_3_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakomoto Satoshi","year":"2008","unstructured":"Satoshi Nakomoto. 2008. Bitcoin: A peer-to-peer electronic cash system."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1870-0"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241288"},{"volume-title":"Secure Wireless Automotive Software Updates Using Blockchains: A Proof of Concept","author":"Steger Marco","key":"e_1_3_2_1_7_1","unstructured":"Marco Steger, Ali Dorri, Salil S. Kanhere, Kay R\u00f6mer, Raja Jurdak, and Michael Karner. 2018. Secure Wireless Automotive Software Updates Using Blockchains: A Proof of Concept. Springer International Publishing, Cham, 137--149."},{"key":"e_1_3_2_1_8_1","unstructured":"Aggelos Kiayias Andrew Miller and Dionysis Zindros. 2017. Non-interactive proofs of proof-of-work. In Cryptology ePrint Archive."},{"volume-title":"EUROCRYPT (2)","author":"Garay Juan A","key":"e_1_3_2_1_9_1","unstructured":"Juan A Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The Bitcoin Backbone Protocol: Analysis and Applications. In EUROCRYPT (2). Springer Berlin Heidelberg, 281--310."},{"volume-title":"Financial Cryptography and Data Security","author":"Kiayias Aggelos","key":"e_1_3_2_1_10_1","unstructured":"Aggelos Kiayias, Nikolaos Lamprou, and Aikaterini-panagiota Stouka. 2016. Proofs of Proofs of Work with Sublinear Complexity. In Financial Cryptography and Data Security. Springer Berlin Heidelberg, Christ Church, Barbados, 61--78."},{"key":"e_1_3_2_1_11_1","volume-title":"Enabling Blockchain Innovations with Pegged Sidechains. (22 10","author":"Back Adam","year":"2014","unstructured":"Adam Back, Matt Corallo, Luke Dashjr, Mark Friedenbach, Gregory Maxwell, Andrew Miller, Andrew Poelstra, Jorge Tim\u00f3n, and Pieter Wuille. 2014. Enabling Blockchain Innovations with Pegged Sidechains. (22 10 2014)."},{"volume-title":"Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data","author":"Ghoshal Sanat","key":"e_1_3_2_1_12_1","unstructured":"Sanat Ghoshal and Goutam Paul. 2016. Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data. Springer International Publishing, 359--371."}],"event":{"name":"ICCAD '18: IEEE\/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN","sponsor":["IEEE-EDS Electronic Devices Society","IEEE CAS","IEEE CEDA"],"location":"San Diego California","acronym":"ICCAD '18"},"container-title":["Proceedings of the International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240765.3240820","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3240765.3240820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:33Z","timestamp":1750208253000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240765.3240820"}},"subtitle":["efficient blockchain verification for embedded IoT"],"short-title":[],"issued":{"date-parts":[[2018,11,5]]},"references-count":12,"alternative-id":["10.1145\/3240765.3240820","10.1145\/3240765"],"URL":"https:\/\/doi.org\/10.1145\/3240765.3240820","relation":{},"subject":[],"published":{"date-parts":[[2018,11,5]]},"assertion":[{"value":"2018-11-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}