{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T17:27:30Z","timestamp":1769189250551,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T00:00:00Z","timestamp":1548028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,21]]},"DOI":"10.1145\/3287624.3287656","type":"proceedings-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T21:45:18Z","timestamp":1547847918000},"page":"615-620","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["ReRAM-based processing-in-memory architecture for blockchain platforms"],"prefix":"10.1145","author":[{"given":"Fang","family":"Wang","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University"}]},{"given":"Zhaoyan","family":"Shen","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao Shandong"}]},{"given":"Lei","family":"Han","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University"}]},{"given":"Zili","family":"Shao","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2019,1,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"A. Dorri et al. \"Blockchain for IoT security and privacy: The case study of a smart home \" in PerCom 2017.  A. Dorri et al. \"Blockchain for IoT security and privacy: The case study of a smart home \" in PerCom 2017.","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"S. Morishima et al. \"Accelerating Blockchain Search of Full Nodes Using GPUs \" in PDP 2018.  S. Morishima et al. \"Accelerating Blockchain Search of Full Nodes Using GPUs \" in PDP 2018.","DOI":"10.1109\/PDP2018.2018.00041"},{"key":"e_1_3_2_1_3_1","unstructured":"I. Lin et al. \"A Survey of Blockchain Security Issues and Challenges \" in IJ Network Security 2017.  I. Lin et al. \"A Survey of Blockchain Security Issues and Challenges \" in IJ Network Security 2017."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3120895.3120897"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.13"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"L. Song et al. \"Graphr: accelerating graph processing using reram \" in HPCA 2018.  L. Song et al. \"Graphr: accelerating graph processing using reram \" in HPCA 2018.","DOI":"10.1109\/HPCA.2018.00052"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3177916"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"G. Zyskind et al. \"Decentralizing privacy: Using blockchain to protectpersonal data \" in SPW 2015.   G. Zyskind et al. \"Decentralizing privacy: Using blockchain to protectpersonal data \" in SPW 2015.","DOI":"10.1109\/SPW.2015.27"},{"key":"e_1_3_2_1_9_1","unstructured":"Z. Xiong et al. \"When mobile blockchain meets edge computing:challenges and applications \" in arXiv 2017.  Z. Xiong et al. \"When mobile blockchain meets edge computing:challenges and applications \" in arXiv 2017."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"H. Akinaga et al. \"Resistive random access memory (reram) basedon metal oxides \" in Proceedings of the IEEE 2010.  H. Akinaga et al. \"Resistive random access memory (reram) basedon metal oxides \" in Proceedings of the IEEE 2010.","DOI":"10.1109\/JPROC.2010.2070830"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"M. Imani et al. \"Mpim: Multi-purpose in-memory processing using configurable resistive memory \" in ASP-DAC 2017.  M. Imani et al. \"Mpim: Multi-purpose in-memory processing using configurable resistive memory \" in ASP-DAC 2017.","DOI":"10.1109\/ASPDAC.2017.7858415"},{"key":"e_1_3_2_1_12_1","unstructured":"Y. Zheng et al. \"Modeling framework for cross-point resistive-memory design emphasizing reliability and variability issues \" in ASP-DAC 2015.  Y. Zheng et al. \"Modeling framework for cross-point resistive-memory design emphasizing reliability and variability issues \" in ASP-DAC 2015."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2012.2185930"},{"key":"e_1_3_2_1_14_1","unstructured":"S. Ali et al. \"Isaac: a convolutional neural network acceleratorwith in-situ analog arithmetic in crossbars \" in SIGARCH 2016.  S. Ali et al. \"Isaac: a convolutional neural network acceleratorwith in-situ analog arithmetic in crossbars \" in SIGARCH 2016."},{"key":"e_1_3_2_1_15_1","unstructured":"S. Nakamoto et al. \"Bitcoin: A peer-to-peer electronic cash system \" 2008.  S. Nakamoto et al. \"Bitcoin: A peer-to-peer electronic cash system \" 2008."}],"event":{"name":"ASPDAC '19: 24th Asia and South Pacific Design Automation Conference","location":"Tokyo Japan","acronym":"ASPDAC '19","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEICE ESS Institute of Electronics, Information and Communication Engineers, Engineering Sciences Society","IEEE CAS","IEEE CEDA","IPSJ SIG-SLDM Information Processing Society of Japan, SIG System LSI Design Methodology"]},"container-title":["Proceedings of the 24th Asia and South Pacific Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287624.3287656","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287624.3287656","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:04Z","timestamp":1750208884000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287624.3287656"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,21]]},"references-count":15,"alternative-id":["10.1145\/3287624.3287656","10.1145\/3287624"],"URL":"https:\/\/doi.org\/10.1145\/3287624.3287656","relation":{},"subject":[],"published":{"date-parts":[[2019,1,21]]},"assertion":[{"value":"2019-01-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}