{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T15:39:33Z","timestamp":1771256373626,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,28]],"date-time":"2018-11-28T00:00:00Z","timestamp":1543363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,28]]},"DOI":"10.1145\/3284869.3284870","type":"proceedings-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T18:42:31Z","timestamp":1547059351000},"page":"271-276","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Transparent Protection of Aggregate Computations from Byzantine Behaviours via Blockchain"],"prefix":"10.1145","author":[{"given":"Danilo","family":"Pianini","sequence":"first","affiliation":[{"name":"Universit\u00e0 di Bologna, Cesena, Italy"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Giovanni","family":"Ciatto","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Bologna, Cesena, Italy"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Roberto","family":"Casadei","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Bologna, Cesena, Italy"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Stefano","family":"Mariani","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Modena e Reggio Emilia, Reggio Emilia, Italy"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Mirko","family":"Viroli","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Bologna, Cesena, Italy"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Andrea","family":"Omicini","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Bologna, Cesena, Italy"}],"role":[{"role":"author","vocab":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2018,11,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2658994"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Giorgio Audrito Ferruccio Damiani Mirko Viroli and Roberto Casadei. 2016. Run-Time Management of Computation Domains in Field Calculus See {16} 192--197.  Giorgio Audrito Ferruccio Damiani Mirko Viroli and Roberto Casadei. 2016. Run-Time Management of Computation Domains in Field Calculus See {16} 192--197.","DOI":"10.1109\/FAS-W.2016.50"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-010-0382-8"},{"key":"e_1_3_2_1_5_1","unstructured":"Adam Back. 2002. Hashcash - A Denial of Service Counter-Measure. http:\/\/www.hashcash.org\/hashcash.pdf  Adam Back. 2002. Hashcash - A Denial of Service Counter-Measure. http:\/\/www.hashcash.org\/hashcash.pdf"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.261"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Jacob Beal Kyle Usbeck Joseph Loyall Mason Rowe and James Metzler. 2016. Adaptive Task Reallocation for Airborne Sensor Sharing See {16} 168--173.  Jacob Beal Kyle Usbeck Joseph Loyall Mason Rowe and James Metzler. 2016. Adaptive Task Reallocation for Airborne Sensor Sharing See {16} 168--173.","DOI":"10.1109\/FAS-W.2016.46"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3105758"},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies","volume":"3","author":"Boyd S.","unstructured":"S. Boyd , A. Ghosh , B. Prabhakar , and D. Shah . 2005. Gossip algorithms: design, analysis and applications . In IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies , Vol. 3 . IEEE, 1653--1664. S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah. 2005. Gossip algorithms: design, analysis and applications. In IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 3. IEEE, 1653--1664."},{"key":"e_1_3_2_1_10_1","volume-title":"Blockchain Consensus Protocols in the Wild. In 31st International Symposium on Distributed Computing (DISC 2017) (Leibniz International Proceedings in Informatics (LIPIcs)), Andr\u00e9a W. Richa (Ed.)","volume":"91","author":"Cachin Christian","year":"2017","unstructured":"Christian Cachin and Marko Vukoli\u0107 . 2017 . Blockchain Consensus Protocols in the Wild. In 31st International Symposium on Distributed Computing (DISC 2017) (Leibniz International Proceedings in Informatics (LIPIcs)), Andr\u00e9a W. Richa (Ed.) , Vol. 91 . Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, Article 1, 16 pages. Christian Cachin and Marko Vukoli\u0107. 2017. Blockchain Consensus Protocols in the Wild. In 31st International Symposium on Distributed Computing (DISC 2017) (Leibniz International Proceedings in Informatics (LIPIcs)), Andr\u00e9a W. Richa (Ed.), Vol. 91. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, Article 1, 16 pages."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2018.07.006"},{"key":"e_1_3_2_1_12_1","volume-title":"Modelling and Simulation of Opportunistic IoT Services with Aggregate Computing. Future Generation Computer Systems 91 (Feb","author":"Casadei Roberto","year":"2019","unstructured":"Roberto Casadei , Giancarlo Fortino , Danilo Pianini , Wilma Russo , Claudio Savaglio , and Mirko Viroli . 2019. Modelling and Simulation of Opportunistic IoT Services with Aggregate Computing. Future Generation Computer Systems 91 (Feb . 2019 ), 252--262. Roberto Casadei, Giancarlo Fortino, Danilo Pianini, Wilma Russo, Claudio Savaglio, and Mirko Viroli. 2019. Modelling and Simulation of Opportunistic IoT Services with Aggregate Computing. Future Generation Computer Systems 91 (Feb. 2019), 252--262."},{"key":"e_1_3_2_1_13_1","volume-title":"Simulating Large-scale Aggregate MASs with Alchemist and Scala. In 2016 Federated Conference on Computer Science and Information Systems, FedCSIS 2016","volume":"8","author":"Casadei Roberto","year":"2016","unstructured":"Roberto Casadei , Danilo Pianini , and Mirko Viroli . 2016 . Simulating Large-scale Aggregate MASs with Alchemist and Scala. In 2016 Federated Conference on Computer Science and Information Systems, FedCSIS 2016 , Gda\u0144sk, Poland , September 11-14, 2016. (ACSIS), Vol. 8 . Polish Information Processing Society, 1495--1504. Roberto Casadei, Danilo Pianini, and Mirko Viroli. 2016. Simulating Large-scale Aggregate MASs with Alchemist and Scala. In 2016 Federated Conference on Computer Science and Information Systems, FedCSIS 2016, Gda\u0144sk, Poland, September 11-14, 2016. (ACSIS), Vol. 8. Polish Information Processing Society, 1495--1504."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.092110.00088"},{"key":"e_1_3_2_1_15_1","volume-title":"The Sybil Attack. In 1st International Workshop on Peer-to-Peer Systems (IPTPS '01)","author":"Douceur John R.","year":"2002","unstructured":"John R. Douceur . 2002 . The Sybil Attack. In 1st International Workshop on Peer-to-Peer Systems (IPTPS '01) . Springer, 251--260. http:\/\/dl.acm.org\/citation.cfm?id=687813 Revised Papers. John R. Douceur. 2002. The Sybil Attack. In 1st International Workshop on Peer-to-Peer Systems (IPTPS '01). Springer, 251--260. http:\/\/dl.acm.org\/citation.cfm?id=687813 Revised Papers."},{"key":"e_1_3_2_1_16_1","volume-title":"1st International Workshops on Foundations and Applications of Self* Systems (FAS*W","author":"Elnikety Sameh","year":"2016","unstructured":"Sameh Elnikety , Peter R. Lewis , and Christian M\u00fcller-Schloer ( Eds .). 2016 . 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W 2016). IEEE. Sameh Elnikety, Peter R. Lewis, and Christian M\u00fcller-Schloer (Eds.). 2016. 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W 2016). IEEE."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.005"},{"key":"e_1_3_2_1_19_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System . http:\/\/bitcoin.org\/bitcoin.pdf Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"e_1_3_2_1_20_1","volume-title":"Coordination Models and Languages (LNCS), Alberto Lluch Lafuente and Jos\u00e9 Proen\u00e7a (Eds.)","author":"Pianini Danilo","unstructured":"Danilo Pianini , Jacob Beal , and Mirko Viroli . 2016. Improving Gossip Dynamics Through Overlapping Replicates . In Coordination Models and Languages (LNCS), Alberto Lluch Lafuente and Jos\u00e9 Proen\u00e7a (Eds.) , Vol. 9686 . Springer , 192--207. Danilo Pianini, Jacob Beal, and Mirko Viroli. 2016. Improving Gossip Dynamics Through Overlapping Replicates. In Coordination Models and Languages (LNCS), Alberto Lluch Lafuente and Jos\u00e9 Proen\u00e7a (Eds.), Vol. 9686. Springer, 192--207."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695913"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Robert W. Shirey. 2007. Internet Security Glossary Version 2. RFC 4949.  Robert W. Shirey. 2007. Internet Security Glossary Version 2. RFC 4949.","DOI":"10.17487\/rfc4949"},{"key":"e_1_3_2_1_24_1","volume-title":"A Higher-order Calculus of Computational Fields. CoRR abs\/1610.08116","author":"Viroli Mirko","year":"2016","unstructured":"Mirko Viroli , Giorgio Audrito , Ferruccio Damiani , Danilo Pianini , and Jacob Beal . 2016. A Higher-order Calculus of Computational Fields. CoRR abs\/1610.08116 ( 2016 ), 39. http:\/\/arxiv.org\/abs\/1610.08116 Mirko Viroli, Giorgio Audrito, Ferruccio Damiani, Danilo Pianini, and Jacob Beal. 2016. A Higher-order Calculus of Computational Fields. CoRR abs\/1610.08116 (2016), 39. http:\/\/arxiv.org\/abs\/1610.08116"},{"key":"e_1_3_2_1_25_1","volume-title":"Coordination Models and Languages, Giovanna Di Marzo Serugendo and Michele Loreti (Eds.). LNCS","author":"Viroli Mirko","unstructured":"Mirko Viroli , Jacob Beal , Ferruccio Damiani , Giorgio Audrito , Roberto Casadei , and Danilo Pianini . 2018. From Field-Based Coordination to Aggregate Computing . In Coordination Models and Languages, Giovanna Di Marzo Serugendo and Michele Loreti (Eds.). LNCS , Vol. 10852 . Springer , 252--279. Mirko Viroli, Jacob Beal, Ferruccio Damiani, Giorgio Audrito, Roberto Casadei, and Danilo Pianini. 2018. From Field-Based Coordination to Aggregate Computing. In Coordination Models and Languages, Giovanna Di Marzo Serugendo and Michele Loreti (Eds.). LNCS, Vol. 10852. Springer, 252--279."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968219.2979129"},{"key":"e_1_3_2_1_27_1","volume-title":"Open Problems in Network Security. LNCS","author":"Vukoli\u0107 Marko","unstructured":"Marko Vukoli\u0107 . 2016. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication . In Open Problems in Network Security. LNCS , Vol. 9591 . Springer , 112--125. Marko Vukoli\u0107. 2016. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication. In Open Problems in Network Security. LNCS, Vol. 9591. Springer, 112--125."},{"key":"e_1_3_2_1_28_1","unstructured":"Gavin Wood. 2014. Ethereum: a secure decentralised generalised transaction ledger. http:\/\/ethereum.github.io\/yellowpaper\/paper.pdf  Gavin Wood. 2014. Ethereum: a secure decentralised generalised transaction ledger. http:\/\/ethereum.github.io\/yellowpaper\/paper.pdf"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"}],"event":{"name":"Goodtechs '18: International Conference on Smart Objects and Technologies for Social Good","location":"Bologna Italy","acronym":"Goodtechs '18","sponsor":["EAI The European Alliance for Innovation"]},"container-title":["Proceedings of the 4th EAI International Conference on Smart Objects and Technologies for Social Good"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3284869.3284870","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3284869.3284870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:34Z","timestamp":1750207414000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3284869.3284870"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,28]]},"references-count":29,"alternative-id":["10.1145\/3284869.3284870","10.1145\/3284869"],"URL":"https:\/\/doi.org\/10.1145\/3284869.3284870","relation":{},"subject":[],"published":{"date-parts":[[2018,11,28]]},"assertion":[{"value":"2018-11-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}