{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:17:13Z","timestamp":1772644633958,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T00:00:00Z","timestamp":1544400000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,10]]},"DOI":"10.1145\/3284764.3284765","type":"proceedings-article","created":{"date-parts":[[2018,11,21]],"date-time":"2018-11-21T13:51:49Z","timestamp":1542808309000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["StreamChain"],"prefix":"10.1145","author":[{"given":"Zsolt","family":"Istv\u00e1n","sequence":"first","affiliation":[{"name":"IMDEA Software Institute and IBM Research - Zurich"}]},{"given":"Alessandro","family":"Sorniotti","sequence":"additional","affiliation":[{"name":"IBM Research - Zurich"}]},{"given":"Marko","family":"Vukoli\u0107","sequence":"additional","affiliation":[{"name":"IBM Research - Zurich"}]}],"member":"320","published-online":{"date-parts":[[2018,12,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2658994"},{"key":"e_1_3_2_1_3_1","volume-title":"Corda: An introduction. R3 CEV, August","author":"Brown Richard Gendal","year":"2016","unstructured":"Richard Gendal Brown , James Carlyle , Ian Grigg , and Mike Hearn . 2016 . Corda: An introduction. R3 CEV, August (2016). Richard Gendal Brown, James Carlyle, Ian Grigg, and Mike Hearn. 2016. Corda: An introduction. R3 CEV, August (2016)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2935634.2935638"},{"key":"e_1_3_2_1_6_1","volume-title":"NSDI'16","author":"Istv\u00e1n Zsolt","year":"2016","unstructured":"Zsolt Istv\u00e1n , David Sidler , Gustavo Alonso , and Marko Vukoli\u0107 . 2016 . Consensus in a Box: Inexpensive Coordination in Hardware .. In NSDI'16 . 425--438. Zsolt Istv\u00e1n, David Sidler, Gustavo Alonso, and Marko Vukoli\u0107. 2016. Consensus in a Box: Inexpensive Coordination in Hardware.. In NSDI'16. 425--438."},{"key":"e_1_3_2_1_7_1","first-page":"237","article-title":"All about Eve: Execute-Verify Replication for Multi-Core Servers","volume":"12","author":"Manos Kapritsos","year":"2012","unstructured":"Manos Kapritsos et al. 2012 . All about Eve: Execute-Verify Replication for Multi-Core Servers .. In OSDI , Vol. 12. 237 -- 250 . Manos Kapritsos et al. 2012. All about Eve: Execute-Verify Replication for Multi-Core Servers.. In OSDI, Vol. 12. 237--250.","journal-title":"OSDI"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749246.2749267"},{"key":"e_1_3_2_1_9_1","volume-title":"d.}. The tangle","author":"Popov Serguei","year":"2017","unstructured":"Serguei Popov . {n. d.}. The tangle ( 2017 ). URL https:\/\/iota. org\/IOTA_Whitepaper.pdf ({n. d.}). Serguei Popov. {n. d.}. The tangle (2017). URL https:\/\/iota. org\/IOTA_Whitepaper.pdf ({n. d.})."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00018"},{"key":"e_1_3_2_1_11_1","volume-title":"BFT Replication. In Open Problems in Network Security Workshop (iNetSec). 112--125","author":"Vukoli\u0107 Marko","year":"2015","unstructured":"Marko Vukoli\u0107 . 2015 . The Quest for Scalable Blockchain Fabric: Proof-of-Work vs . BFT Replication. In Open Problems in Network Security Workshop (iNetSec). 112--125 . Marko Vukoli\u0107. 2015. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication. In Open Problems in Network Security Workshop (iNetSec). 112--125."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055518.3055526"}],"event":{"name":"Middleware '18: 19th International Middleware Conference","location":"Rennes France","acronym":"Middleware '18","sponsor":["ACM Association for Computing Machinery","USENIX Assoc USENIX Assoc","IFIP International Federation for Information Processing"]},"container-title":["Proceedings of the 2nd Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3284764.3284765","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3284764.3284765","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:34Z","timestamp":1750207414000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3284764.3284765"}},"subtitle":["Do Blockchains Need Blocks?"],"short-title":[],"issued":{"date-parts":[[2018,12,10]]},"references-count":12,"alternative-id":["10.1145\/3284764.3284765","10.1145\/3284764"],"URL":"https:\/\/doi.org\/10.1145\/3284764.3284765","relation":{},"subject":[],"published":{"date-parts":[[2018,12,10]]},"assertion":[{"value":"2018-12-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}