{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T19:43:58Z","timestamp":1765827838179,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Outlier Ventures"},{"name":"PSRC Standard Research Studentship (DTP)","award":["EP\/R513052\/1"],"award-info":[{"award-number":["EP\/R513052\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354221","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"1485-1502","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Balance"],"prefix":"10.1145","author":[{"given":"Dominik","family":"Harz","sequence":"first","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]},{"given":"Lewis","family":"Gudgeon","sequence":"additional","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]},{"given":"Arthur","family":"Gervais","sequence":"additional","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]},{"given":"William J.","family":"Knottenbelt","sequence":"additional","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095816"},{"key":"e_1_3_2_2_2_1","volume-title":"Token Curated Registries - A Game Theoretic Approach. (2018), 16 pages.arxiv","author":"Asgaonkar Aditya","year":"1809","unstructured":"Aditya Asgaonkar and Bhaskar Krishnamachari . 2018. Token Curated Registries - A Game Theoretic Approach. (2018), 16 pages.arxiv : 1809 .01756 http:\/\/arxiv.org\/abs\/1809.01756 Aditya Asgaonkar and Bhaskar Krishnamachari. 2018. Token Curated Registries - A Game Theoretic Approach. (2018), 16 pages.arxiv: 1809.01756 http:\/\/arxiv.org\/abs\/1809.01756"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243848"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_11"},{"key":"e_1_3_2_2_5_1","volume-title":"Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Breidenbach Lorenz","year":"2018","unstructured":"Lorenz Breidenbach , Phil Daian , Floriantra Er , and Ari Juels . 2018 . Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts. In 27th USENIX Security Symposium (USENIX Security 18) . 1335--1352. https:\/\/thehydra.io\/paper.pdf Lorenz Breidenbach, Phil Daian, Floriantra Er, and Ari Juels. 2018. Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts. In 27th USENIX Security Symposium (USENIX Security 18). 1335--1352. https:\/\/thehydra.io\/paper.pdf"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/296806.296824"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813674"},{"key":"e_1_3_2_2_8_1","volume-title":"Transaction Reordering, and Consensus Instability in Decentralized Exchanges.","author":"Daian Philip","year":"2019","unstructured":"Philip Daian , Steven Goldfeder , Tyler Kell , Yunqi Li , Xueyuan Zhao , Iddo Bentov , Lorenz Breidenbach , and Ari Juels . 2019. Flash Boys 2.0 : Frontrunning , Transaction Reordering, and Consensus Instability in Decentralized Exchanges. ( 2019 ). arxiv: 1904.05234 http:\/\/arxiv.org\/abs\/1904.05234 Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, and Ari Juels. 2019. Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges. (2019). arxiv: 1904.05234 http:\/\/arxiv.org\/abs\/1904.05234"},{"key":"e_1_3_2_2_9_1","volume-title":"Aggelos Kiayias, and Alexander Russell.","author":"David Bernardo","year":"2018","unstructured":"Bernardo David , Peter Gavz i , Aggelos Kiayias, and Alexander Russell. 2018 . Ouroboros Praos : An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain. In Advances in Cryptology - EUROCRYPT 2018, Jesper Buus Nielsen and Vincent Rijmen (Eds.), Vol. 46 . Springer International Publishing , Cham, 66--98. https:\/\/doi.org\/10.1007\/978--3--319--78375--8_3 10.1007\/978--3--319--78375--8_3 Bernardo David, Peter Gavz i, Aggelos Kiayias, and Alexander Russell. 2018. Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain. In Advances in Cryptology - EUROCRYPT 2018, Jesper Buus Nielsen and Vincent Rijmen (Eds.), Vol. 46. Springer International Publishing, Cham, 66--98. https:\/\/doi.org\/10.1007\/978--3--319--78375--8_3"},{"key":"e_1_3_2_2_10_1","unstructured":"Simon de la Rouviere. 2017. Introducing Curation Markets: Trade Popularity of Memes & Information (with code)! https:\/\/medium.com\/@simondlr\/introducing-curation-markets-trade-popularity-of-memes-information-with-code-70bf6fed9881  Simon de la Rouviere. 2017. Introducing Curation Markets: Trade Popularity of Memes & Information (with code)! https:\/\/medium.com\/@simondlr\/introducing-curation-markets-trade-popularity-of-memes-information-with-code-70bf6fed9881"},{"key":"e_1_3_2_2_11_1","volume-title":"2013 IEEE Thirteenth International Conference on. IEEE, 1--10","author":"Decker Christian","year":"2013","unstructured":"Christian Decker and Roger Wattenhofer . 2013 . Information propagation in the bitcoin network. In Peer-to-Peer Computing (P2P) , 2013 IEEE Thirteenth International Conference on. IEEE, 1--10 . https:\/\/tik-old.ee.ethz.ch\/file\/\/49318d3f56c1d525aabf7fda78b23fc0\/P2P2013_041.pdf Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on. IEEE, 1--10. https:\/\/tik-old.ee.ethz.ch\/file\/\/49318d3f56c1d525aabf7fda78b23fc0\/P2P2013_041.pdf"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243857"},{"key":"e_1_3_2_2_13_1","volume-title":"Financial Cryptography and Data Security","author":"Eyal Ittay","year":"2014","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer . 2014. Majority Is Not Enough: Bitcoin Mining Is Vulnerable . In Financial Cryptography and Data Security 2014 , Vol. 8437 . Berlin , Heidelberg , 436--454. https:\/\/doi.org\/10.1007\/978--3--662--45472--5_28 10.1007\/978--3--662--45472--5_28 Ittay Eyal and Emin G\u00fcn Sirer. 2014. Majority Is Not Enough: Bitcoin Mining Is Vulnerable. In Financial Cryptography and Data Security 2014, Vol. 8437. Berlin, Heidelberg, 436--454. https:\/\/doi.org\/10.1007\/978--3--662--45472--5_28"},{"key":"e_1_3_2_2_14_1","unstructured":"St. Louis Fed. 2019. 10-Year Treasury Constant Maturity Rate DGS10. Available at: https:\/\/fred.stlouisfed.org\/series\/DGS10.  St. Louis Fed. 2019. 10-Year Treasury Constant Maturity Rate DGS10. Available at: https:\/\/fred.stlouisfed.org\/series\/DGS10."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1257\/jel.40.2.351"},{"key":"e_1_3_2_2_16_1","unstructured":"Sebastian Gajek. 2018. Graded Token-Curated Decisions with Up-\/Downvoting. https:\/\/medium.com\/coinmonks\/graded-token-curated-decisions-with-up-downvoting-designing-cryptoeconomic-ranking-and-2ce7c000bb51  Sebastian Gajek. 2018. Graded Token-Curated Decisions with Up-\/Downvoting. https:\/\/medium.com\/coinmonks\/graded-token-curated-decisions-with-up-downvoting-designing-cryptoeconomic-ranking-and-2ce7c000bb51"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813655"},{"key":"e_1_3_2_2_20_1","volume-title":"The Scalability of Trustless Trust. In 2nd Workshop on Trusted Smart Contracts (Financial Cryptography and Data Security). 279--293","author":"Harz Dominik","year":"2019","unstructured":"Dominik Harz and Magnus Boman . 2019 . The Scalability of Trustless Trust. In 2nd Workshop on Trusted Smart Contracts (Financial Cryptography and Data Security). 279--293 . https:\/\/doi.org\/10.1007\/978--3--662--58820--8_19 arxiv: 1801.09535 10.1007\/978--3--662--58820--8_19 Dominik Harz and Magnus Boman. 2019. The Scalability of Trustless Trust. In 2nd Workshop on Trusted Smart Contracts (Financial Cryptography and Data Security). 279--293. https:\/\/doi.org\/10.1007\/978--3--662--58820--8_19 arxiv: 1801.09535"},{"key":"e_1_3_2_2_21_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman , Alison Kendler , Aviv Zohar , and Sharon Goldberg . 2015 . Eclipse Attacks on Bitcoin's Peer-to-Peer Network . In 24th USENIX Security Symposium (USENIX Security 15) . 129--144. https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity15\/sec15-paper-heilman.pdf Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In 24th USENIX Security Symposium (USENIX Security 15). 129--144. https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity15\/sec15-paper-heilman.pdf"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2014.08.004"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"e_1_3_2_2_24_1","volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium. USENIX Association, 1353--1370","author":"Kalodner Harry","year":"2018","unstructured":"Harry Kalodner , Steven Goldfeder , Xiaoqi Chen , S Matthew Weinberg , and Edward W Felten . 2018 . Arbitrum: Scalable, private smart contracts . In Proceedings of the 27th USENIX Conference on Security Symposium. USENIX Association, 1353--1370 . Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S Matthew Weinberg, and Edward W Felten. 2018. Arbitrum: Scalable, private smart contracts. In Proceedings of the 27th USENIX Conference on Security Symposium. USENIX Association, 1353--1370."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134033"},{"key":"e_1_3_2_2_27_1","first-page":"642","article-title":"NOCUST--A Securely Scalable Commit-Chain","volume":"2018","author":"Khalil Rami","year":"2018","unstructured":"Rami Khalil , Arthur Gervais , and Guillaume Felley . 2018 . NOCUST--A Securely Scalable Commit-Chain . IACR Cryptology ePrint Archive , Vol. 2018 (2018), 642 . Rami Khalil, Arthur Gervais, and Guillaume Felley. 2018. NOCUST--A Securely Scalable Commit-Chain. IACR Cryptology ePrint Archive, Vol. 2018 (2018), 642.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_28_1","first-page":"265","article-title":"TEX-A Securely Scalable Trustless Exchange","volume":"2019","author":"Khalil Rami","year":"2019","unstructured":"Rami Khalil , Arthur Gervais , and Guillaume Felley . 2019 . TEX-A Securely Scalable Trustless Exchange . IACR Cryptology ePrint Archive , Vol. 2019 (2019), 265 . Rami Khalil, Arthur Gervais, and Guillaume Felley. 2019. TEX-A Securely Scalable Trustless Exchange. IACR Cryptology ePrint Archive, Vol. 2019 (2019), 265.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660380"},{"key":"e_1_3_2_2_31_1","volume-title":"Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015)","author":"Lewenberg Yoad","year":"2015","unstructured":"Yoad Lewenberg , Yoram Bachrach , Yonatan Sompolinsky , Aviv Zohar , and Jeffrey S Rosenschein . 2015 . Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis Categories and Subject Descriptors . Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015) (2015), 919--927. Yoad Lewenberg, Yoram Bachrach, Yonatan Sompolinsky, Aviv Zohar, and Jeffrey S Rosenschein. 2015. Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis Categories and Subject Descriptors. Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015) (2015), 919--927."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Orfeas Stefanos Thyfronitis Litos and Dionysis Zindros. 2017. Trust Is Risk: A Decentralized Financial Trust Platform. (2017) bibinfonumpages156 pages.  Orfeas Stefanos Thyfronitis Litos and Dionysis Zindros. 2017. Trust Is Risk: A Decentralized Financial Trust Platform. (2017) bibinfonumpages156 pages.","DOI":"10.1007\/978-3-319-70972-7_19"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813659"},{"key":"e_1_3_2_2_34_1","unstructured":"Trent McConaghy. 2018. The Layered TCR. https:\/\/blog.oceanprotocol.com\/the-layered-tcr-56cc5b4cdc45  Trent McConaghy. 2018. The Layered TCR. https:\/\/blog.oceanprotocol.com\/the-layered-tcr-56cc5b4cdc45"},{"key":"e_1_3_2_2_35_1","volume-title":"Pisa: Arbitration Outsourcing for State Channels.","author":"McCorry P","year":"2018","unstructured":"P McCorry , S Bakshi , I Bentov , Andrew Miller , and ... 2018 a. Pisa: Arbitration Outsourcing for State Channels. (2018). https:\/\/www.cs.cornell.edu\/ iddo\/pisa.pdf P McCorry, S Bakshi, I Bentov, Andrew Miller, and ... 2018a. Pisa: Arbitration Outsourcing for State Channels. (2018). https:\/\/www.cs.cornell.edu\/ iddo\/pisa.pdf"},{"key":"e_1_3_2_2_36_1","volume-title":"Financial Cryptography and Data Security. FC","author":"McCorry Patrick","year":"2018","unstructured":"Patrick McCorry , Alexander Hicks , and Sarah Meiklejohn . 2018b. Smart Contracts for Bribing Miners . In Financial Cryptography and Data Security. FC 2018 ., Vol. 10958 . Springer Berlin Heidelberg , 3--18. https:\/\/doi.org\/10.1007\/978--3--662--58820--8_1 10.1007\/978--3--662--58820--8_1 Patrick McCorry, Alexander Hicks, and Sarah Meiklejohn. 2018b. Smart Contracts for Bribing Miners. In Financial Cryptography and Data Security. FC 2018., Vol. 10958. Springer Berlin Heidelberg, 3--18. https:\/\/doi.org\/10.1007\/978--3--662--58820--8_1"},{"key":"e_1_3_2_2_37_1","volume-title":"bibinfonumpages10 pages. https:\/\/medium.com\/@ilovebagels\/token-curated-registries-1-0--61a232f8dac7","author":"Goldin Mike","year":"2017","unstructured":"Mike Goldin . 2017. Token-Curated Registries 1.0. ( 2017 ), bibinfonumpages10 pages. https:\/\/medium.com\/@ilovebagels\/token-curated-registries-1-0--61a232f8dac7 Mike Goldin. 2017. Token-Curated Registries 1.0. (2017), bibinfonumpages10 pages. https:\/\/medium.com\/@ilovebagels\/token-curated-registries-1-0--61a232f8dac7"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_2_39_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 25--33","author":"Christin Tyler","year":"2013","unstructured":"Moore, Tyler and Christin , Nicolas. 2013 . Beware the middleman: Empirical analysis of Bitcoin-exchange risk . In International Conference on Financial Cryptography and Data Security. Springer, 25--33 . Moore, Tyler and Christin, Nicolas. 2013. Beware the middleman: Empirical analysis of Bitcoin-exchange risk. In International Conference on Financial Cryptography and Data Security. Springer, 25--33."},{"key":"e_1_3_2_2_40_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf. https:\/\/bitcoin.org\/bitcoin.pdf Accessed: 2015-07-01.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf. https:\/\/bitcoin.org\/bitcoin.pdf Accessed: 2015-07-01. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf. https:\/\/bitcoin.org\/bitcoin.pdf Accessed: 2015-07-01."},{"key":"e_1_3_2_2_41_1","volume-title":"Vazirani","author":"Nisan Noam","year":"2007","unstructured":"Noam Nisan , Tim Roughgarden , Eva Tardos , and Vijay V . Vazirani . 2007 . Algorithmic Game Theory. Vol. 1 . Cambridge University Press , Cambridge. 1--754 pages. https:\/\/doi.org\/10.1017\/CBO9780511800481 arxiv: 0907.4385 10.1017\/CBO9780511800481 Noam Nisan, Tim Roughgarden, Eva Tardos, and Vijay V. Vazirani. 2007. Algorithmic Game Theory. Vol. 1. Cambridge University Press, Cambridge. 1--754 pages. https:\/\/doi.org\/10.1017\/CBO9780511800481 arxiv: 0907.4385"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-011-9277-z"},{"key":"e_1_3_2_2_44_1","unstructured":"Joseph Poon and Thaddeus Dryja. 2016. The bitcoin lightning network. https:\/\/lightning.network\/lightning-network-paper.pdf. https:\/\/lightning.network\/lightning-network-paper.pdf Accessed: 2016-07-07.  Joseph Poon and Thaddeus Dryja. 2016. The bitcoin lightning network. https:\/\/lightning.network\/lightning-network-paper.pdf. https:\/\/lightning.network\/lightning-network-paper.pdf Accessed: 2016-07-07."},{"key":"e_1_3_2_2_45_1","unstructured":"Achill Rudolph. 2018. Ranking Token Curated Registries. https:\/\/medium.com\/coinmonks\/ranking-token-curated-registries-e9a92dc85b31  Achill Rudolph. 2018. Ranking Token Curated Registries. https:\/\/medium.com\/coinmonks\/ranking-token-curated-registries-e9a92dc85b31"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1006\/game.2000.0831"},{"key":"e_1_3_2_2_47_1","unstructured":"Tendermint. 2016. Introduction to Tendermint - Tendermint. https:\/\/tendermint.com\/intro  Tendermint. 2016. Introduction to Tendermint - Tendermint. https:\/\/tendermint.com\/intro"},{"key":"e_1_3_2_2_48_1","unstructured":"Jason Teutsch and Christian Reitwie\u00dfner. 2017. A scalable verification solution for blockchains. (2017) bibinfonumpages44 pages.  Jason Teutsch and Christian Reitwie\u00dfner. 2017. A scalable verification solution for blockchains. (2017) bibinfonumpages44 pages."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_3_2_2_50_1","unstructured":"Gavin Wood. 2014. Ethereum: a secure decentralised generalised transaction ledger. (2014) bibinfonumpages32 pages.  Gavin Wood. 2014. Ethereum: a secure decentralised generalised transaction ledger. (2014) bibinfonumpages32 pages."},{"key":"e_1_3_2_2_51_1","volume-title":"An Introduction to MultiAgent Systems","author":"Wooldridge Michael","unstructured":"Michael Wooldridge . 2009. An Introduction to MultiAgent Systems 2 nd ed.). Wiley Publishing . Michael Wooldridge. 2009. An Introduction to MultiAgent Systems 2nd ed.). Wiley Publishing.","edition":"2"},{"key":"e_1_3_2_2_52_1","volume-title":"RepuCoin: Your Reputation is Your Power","author":"Yu Jiangshan","year":"2019","unstructured":"Jiangshan Yu , David Kozhaya , Jeremie Decouchant , and Paulo Verissimo . 2019. RepuCoin: Your Reputation is Your Power . IEEE Trans. Comput . ( 2019 ), 1--1. https:\/\/doi.org\/10.1109\/TC.2019.2900648 10.1109\/TC.2019.2900648 Jiangshan Yu, David Kozhaya, Jeremie Decouchant, and Paulo Verissimo. 2019. RepuCoin: Your Reputation is Your Power. IEEE Trans. Comput. (2019), 1--1. https:\/\/doi.org\/10.1109\/TC.2019.2900648"},{"key":"e_1_3_2_2_53_1","volume-title":"Cryptocurrency-Backed Assets. In Proceedings of the IEEE Symposium on Security & Privacy","author":"Zamyatin Alexei","year":"2019","unstructured":"Alexei Zamyatin , Dominik Harz , Joshua Lind , Panayiotis Panayiotou , Arthur Gervais , and William J. Knottenbelt . 2019. XCLAIM: Trustless, Interoperable , Cryptocurrency-Backed Assets. In Proceedings of the IEEE Symposium on Security & Privacy , May 2019 . 1254--1271. https:\/\/doi.org\/10.1109\/SP.2019.00085 10.1109\/SP.2019.00085 Alexei Zamyatin, Dominik Harz, Joshua Lind, Panayiotis Panayiotou, Arthur Gervais, and William J. Knottenbelt. 2019. XCLAIM: Trustless, Interoperable, Cryptocurrency-Backed Assets. In Proceedings of the IEEE Symposium on Security & Privacy, May 2019. 1254--1271. https:\/\/doi.org\/10.1109\/SP.2019.00085"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"key":"e_1_3_2_2_55_1","volume-title":"Enigma: Decentralized computation platform with guaranteed privacy. arXiv preprint arXiv:1506.03471. https:\/\/arxiv.org\/pdf\/1506.03471.pdf Accessed: 2017-08--22.","author":"Zyskind Guy","year":"2015","unstructured":"Guy Zyskind , Oz Nathan , and Alex Pentland . 2015 . Enigma: Decentralized computation platform with guaranteed privacy. arXiv preprint arXiv:1506.03471. https:\/\/arxiv.org\/pdf\/1506.03471.pdf Accessed: 2017-08--22. Guy Zyskind, Oz Nathan, and Alex Pentland. 2015. Enigma: Decentralized computation platform with guaranteed privacy. arXiv preprint arXiv:1506.03471. https:\/\/arxiv.org\/pdf\/1506.03471.pdf Accessed: 2017-08--22."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354221","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:03Z","timestamp":1750202643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354221"}},"subtitle":["Dynamic Adjustment of Cryptocurrency Deposits"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":55,"alternative-id":["10.1145\/3319535.3354221","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354221","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}