{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:23:29Z","timestamp":1774365809633,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Sciences and Engineering Research Council","award":["Discovery grant #2014-04870"],"award-info":[{"award-number":["Discovery grant #2014-04870"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354237","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"817-831","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":72,"title":["Erlay"],"prefix":"10.1145","author":[{"given":"Gleb","family":"Naumenko","sequence":"first","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Gregory","family":"Maxwell","sequence":"additional","affiliation":[{"name":"Independent, None, CA, USA"}]},{"given":"Pieter","family":"Wuille","sequence":"additional","affiliation":[{"name":"Blockstream, Mountain View, CA, USA"}]},{"given":"Alexandra","family":"Fedorova","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Ivan","family":"Beschastnikh","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"International Conference on Computer-Aided Industrial Design and Conceptual Design. 1--6. https:\/\/doi.org\/10","author":"Ai W.","year":"2006","unstructured":"W. Ai , L. Xinsong , and L. Kejian . 2006. Efficient flooding in peer-to-peer networks . In International Conference on Computer-Aided Industrial Design and Conceptual Design. 1--6. https:\/\/doi.org\/10 .1109\/CAIDCD. 2006 .329410 10.1109\/CAIDCD.2006.329410 W. Ai, L. Xinsong, and L. Kejian. 2006. Efficient flooding in peer-to-peer networks. In International Conference on Computer-Aided Industrial Design and Conceptual Design. 1--6. https:\/\/doi.org\/10.1109\/CAIDCD.2006.329410"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.47"},{"key":"e_1_3_2_2_3_1","volume-title":"Error and attack tolerance of complex networks. Nature","author":"Albert R\u00e9ka","year":"2000","unstructured":"R\u00e9ka Albert , Hawoong Jeong , and Albert-L\u00e1szl\u00f3 Barab\u00e1si . 2000. Error and attack tolerance of complex networks. Nature , Vol. 406 (27 07 2000 ), 378 EP - -. https:\/\/doi.org\/10.1038\/35019019 10.1038\/35019019 R\u00e9ka Albert, Hawoong Jeong, and Albert-L\u00e1szl\u00f3 Barab\u00e1si. 2000. Error and attack tolerance of complex networks. Nature, Vol. 406 (27 07 2000), 378 EP --. https:\/\/doi.org\/10.1038\/35019019"},{"key":"e_1_3_2_2_4_1","volume-title":"On the Malleability of Bitcoin Transactions","author":"Andrychowicz Marcin","unstructured":"Marcin Andrychowicz , Stefan Dziembowski , Daniel Malinowski , and \u0141ukasz Mazurek . 2015. On the Malleability of Bitcoin Transactions . In Financial Cryptography and Data Security, Michael Brenner, Nicolas Christin, Benjamin Johnson, and Kurt Rohloff (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 1--18. Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, and \u0141ukasz Mazurek. 2015. On the Malleability of Bitcoin Transactions. In Financial Cryptography and Data Security, Michael Brenner, Nicolas Christin, Benjamin Johnson, and Kurt Rohloff (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1--18."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_2"},{"key":"e_1_3_2_2_7_1","volume-title":"Multi-Party Set Reconciliation Using Characteristic Polynomials. CoRR","author":"Boral Anudhyan","year":"2014","unstructured":"Anudhyan Boral and Michael Mitzenmacher . 2014. Multi-Party Set Reconciliation Using Characteristic Polynomials. CoRR , Vol. abs\/ 1410 .2645 ( 2014 ). Anudhyan Boral and Michael Mitzenmacher. 2014. Multi-Party Set Reconciliation Using Characteristic Polynomials. CoRR, Vol. abs\/1410.2645 (2014)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/829502.830043"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/829502.830043"},{"key":"e_1_3_2_2_10_1","volume-title":"Hong","author":"Clarke Ian","year":"2001","unstructured":"Ian Clarke , Oskar Sandberg , Brandon Wiley , and Theodore W . Hong . 2001 . Freenet : A Distributed Anonymous Information Storage and Retrieval System .Springer Berlin Heidelberg, Berlin, Heidelberg , 46--66. https:\/\/doi.org\/10.1007\/3--540--44702--4_4 10.1007\/3--540--44702--4_4 Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. 2001. Freenet: A Distributed Anonymous Information Storage and Retrieval System .Springer Berlin Heidelberg, Berlin, Heidelberg, 46--66. https:\/\/doi.org\/10.1007\/3--540--44702--4_4"},{"key":"e_1_3_2_2_11_1","unstructured":"Matt Corallo. 2016. BIP 152: Compact block relay. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0152.mediawiki.  Matt Corallo. 2016. BIP 152: Compact block relay. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0152.mediawiki."},{"key":"e_1_3_2_2_12_1","unstructured":"corbixgwelt. 2011. Timejacking and bitcoin. http:\/\/culubas.blogspot.de\/2011\/05\/timejacking-bitcoin802.html.  corbixgwelt. 2011. Timejacking and bitcoin. http:\/\/culubas.blogspot.de\/2011\/05\/timejacking-bitcoin802.html."},{"key":"e_1_3_2_2_13_1","volume-title":"Norcross","author":"Dearle Alan","year":"2010","unstructured":"Alan Dearle , Graham N. C. Kirby , and Stuart J . Norcross . 2010 . Hosting Byzantine Fault Tolerant Services on a Chord Ring. CoRR , Vol. abs\/ 1006 .3465 (2010). Alan Dearle, Graham N. C. Kirby, and Stuart J. Norcross. 2010. Hosting Byzantine Fault Tolerant Services on a Chord Ring. CoRR, Vol. abs\/1006.3465 (2010)."},{"key":"#cr-split#-e_1_3_2_2_14_1.1","doi-asserted-by":"crossref","unstructured":"C. Decker and R. Wattenhofer. 2013. Information propagation in the Bitcoin network. In IEEE P2P 2013 Proceedings. 1--10. https:\/\/doi.org\/10.1109\/P2P.2013.6688704 10.1109\/P2P.2013.6688704","DOI":"10.1109\/P2P.2013.6688704"},{"key":"#cr-split#-e_1_3_2_2_14_1.2","doi-asserted-by":"crossref","unstructured":"C. Decker and R. Wattenhofer. 2013. Information propagation in the Bitcoin network. In IEEE P2P 2013 Proceedings. 1--10. https:\/\/doi.org\/10.1109\/P2P.2013.6688704","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_3_2_2_15_1","volume-title":"Bitcoin Transaction Malleability and MtGox. CoRR","author":"Decker Christian","year":"2014","unstructured":"Christian Decker and Roger Wattenhofer . 2014. Bitcoin Transaction Malleability and MtGox. CoRR , Vol. abs\/ 1403 .6676 ( 2014 ). Christian Decker and Roger Wattenhofer. 2014. Bitcoin Transaction Malleability and MtGox. CoRR, Vol. abs\/1403.6676 (2014)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Sergi Delgado Segura Surya Bakshi Cristina P\u00e9rez-Sol\u00e0 James Litton Andrew Pachulski Andrew Miller and Bobby Bhattacharjee. 2019. TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions. In Financial Cryptography (FC) .  Sergi Delgado Segura Surya Bakshi Cristina P\u00e9rez-Sol\u00e0 James Litton Andrew Pachulski Andrew Miller and Bobby Bhattacharjee. 2019. TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions. In Financial Cryptography (FC) .","DOI":"10.1007\/978-3-030-32101-7_32"},{"key":"e_1_3_2_2_17_1","volume-title":"Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In Advances in Cryptology - EUROCRYPT","author":"Dodis Yevgeniy","year":"2004","unstructured":"Yevgeniy Dodis , Leonid Reyzin , and Adam Smith . 2004 . Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In Advances in Cryptology - EUROCRYPT 2004, Christian Cachin and Jan L. Camenisch (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 523--540. Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. 2004. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In Advances in Cryptology - EUROCRYPT 2004, Christian Cachin and Jan L. Camenisch (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 523--540."},{"key":"e_1_3_2_2_18_1","volume-title":"The Sybil Attack. In International Workshop on Peer-to-Peer Systems (IPTPS).","author":"Douceur John R.","year":"2002","unstructured":"John R. Douceur . 2002 . The Sybil Attack. In International Workshop on Peer-to-Peer Systems (IPTPS). John R. Douceur. 2002. The Sybil Attack. In International Workshop on Peer-to-Peer Systems (IPTPS)."},{"key":"e_1_3_2_2_19_1","volume-title":"Bitcoin-NG: A Scalable Blockchain Protocol. In Usenix Conference on Networked Systems Design and Implementation (NSDI).","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal , Adem Efe Gencer , Emin G\u00fcn Sirer , and Robbert Van Renesse . 2016 . Bitcoin-NG: A Scalable Blockchain Protocol. In Usenix Conference on Networked Systems Design and Implementation (NSDI). Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A Scalable Blockchain Protocol. In Usenix Conference on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_3_2_2_20_1","volume-title":"Majority is not Enough: Bitcoin Mining is Vulnerable. CoRR","author":"Eyal Ittay","year":"2013","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer . 2013. Majority is not Enough: Bitcoin Mining is Vulnerable. CoRR , Vol. abs\/ 1311 .0243 ( 2013 ). Ittay Eyal and Emin G\u00fcn Sirer. 2013. Majority is not Enough: Bitcoin Mining is Vulnerable. CoRR, Vol. abs\/1311.0243 (2013)."},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of the Eleventh International Network Conference (INC","author":"Fadhil Muntadher","year":"2016","unstructured":"Muntadher Fadhil , Gareth Owen , and Mo Adda . 2016 . Bitcoin network measurements for simulation validation and parameterisation . In Proceedings of the Eleventh International Network Conference (INC 2016). University of Plymouth, 109--114. Muntadher Fadhil, Gareth Owen, and Mo Adda. 2016. Bitcoin network measurements for simulation validation and parameterisation. In Proceedings of the Eleventh International Network Conference (INC 2016). University of Plymouth, 109--114."},{"key":"e_1_3_2_2_22_1","volume-title":"Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, and Pramod Viswanath.","author":"Fanti Giulia C.","year":"2018","unstructured":"Giulia C. Fanti , Shaileshh Bojja Venkatakrishnan , Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, and Pramod Viswanath. 2018 . Dandelion Giulia C. Fanti, Shaileshh Bojja Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, and Pramod Viswanath. 2018. Dandelion"},{"key":"e_1_3_2_2_23_1","volume-title":"Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees. CoRR","year":"2018","unstructured":": Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees. CoRR , Vol. abs\/ 1805 .11060 ( 2018 ). arxiv: 1805.11060 http:\/\/arxiv.org\/abs\/1805.11060 : Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees. CoRR, Vol. abs\/1805.11060 (2018). arxiv: 1805.11060 http:\/\/arxiv.org\/abs\/1805.11060"},{"key":"e_1_3_2_2_24_1","volume-title":"Proceedings of the 40th Annual Symposium on Foundations of Computer Science (FOCS '99)","author":"Feigenbaum J.","unstructured":"J. Feigenbaum , S. Kannan , M. Strauss , and M. Viswanathan . 1999. An Approximate L1-Difference Algorithm for Massive Data Streams . In Proceedings of the 40th Annual Symposium on Foundations of Computer Science (FOCS '99) . IEEE Computer Society, Washington, DC, USA, 501--. http:\/\/dl.acm.org\/citation.cfm?id=795665.796530 J. Feigenbaum, S. Kannan, M. Strauss, and M. Viswanathan. 1999. An Approximate L1-Difference Algorithm for Massive Data Streams. In Proceedings of the 40th Annual Symposium on Foundations of Computer Science (FOCS '99). IEEE Computer Society, Washington, DC, USA, 501--. http:\/\/dl.acm.org\/citation.cfm?id=795665.796530"},{"key":"e_1_3_2_2_25_1","first-page":"1","article-title":"An Approximate L1-Difference Algorithm for Massive Data Streams","volume":"32","author":"Feigenbaum Joan","year":"2003","unstructured":"Joan Feigenbaum , Sampath Kannan , Martin J. Strauss , and Mahesh Viswanathan . 2003 . An Approximate L1-Difference Algorithm for Massive Data Streams . SIAM J. Comput. , Vol. 32 , 1 (Jan. 2003), 131--151. https:\/\/doi.org\/10.1137\/S0097539799361701 10.1137\/S0097539799361701 Joan Feigenbaum, Sampath Kannan, Martin J. Strauss, and Mahesh Viswanathan. 2003. An Approximate L1-Difference Algorithm for Massive Data Streams. SIAM J. Comput., Vol. 32, 1 (Jan. 2003), 131--151. https:\/\/doi.org\/10.1137\/S0097539799361701","journal-title":"SIAM J. Comput."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11561071_71"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"e_1_3_2_2_29_1","volume-title":"Tampering with the Delivery of Blocks and Transactions in Bitcoin. In ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Gervais Arthur","year":"2015","unstructured":"Arthur Gervais , Hubert Ritzdorf , Ghassan O. Karame , and Srdjan Capkun . 2015 . Tampering with the Delivery of Blocks and Transactions in Bitcoin. In ACM SIGSAC Conference on Computer and Communications Security (CCS). Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, and Srdjan Capkun. 2015. Tampering with the Delivery of Blocks and Transactions in Bitcoin. In ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"Matthias Grundmann Till Neudecker and Hannes Hartenstein. 2018. Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin.  Matthias Grundmann Till Neudecker and Hannes Hartenstein. 2018. Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin.","DOI":"10.1007\/978-3-662-58820-8_9"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831152"},{"key":"e_1_3_2_2_32_1","unstructured":"Stan Higgins. 2016. South Africa's eBay Bidorbuy Adds Bitcoin Payments. https:\/\/www.coindesk.com\/south-africas-ebay-bidorbuy-adds-bitcoin-payments  Stan Higgins. 2016. South Africa's eBay Bidorbuy Adds Bitcoin Payments. https:\/\/www.coindesk.com\/south-africas-ebay-bidorbuy-adds-bitcoin-payments"},{"key":"e_1_3_2_2_33_1","volume-title":"Bandwidth- and Latency-Aware Peer-to-Peer Instant Friendcast for Online Social Networks. In 2010 IEEE 16th International Conference on Parallel and Distributed Systems. 829--834","author":"Jiang J.","year":"2010","unstructured":"J. Jiang , C. Hung , and J. Wu . 2010 . Bandwidth- and Latency-Aware Peer-to-Peer Instant Friendcast for Online Social Networks. In 2010 IEEE 16th International Conference on Parallel and Distributed Systems. 829--834 . https:\/\/doi.org\/10.1109\/ICPADS. 2010 .101 10.1109\/ICPADS.2010.101 J. Jiang, C. Hung, and J. Wu. 2010. Bandwidth- and Latency-Aware Peer-to-Peer Instant Friendcast for Online Social Networks. In 2010 IEEE 16th International Conference on Parallel and Distributed Systems. 829--834. https:\/\/doi.org\/10.1109\/ICPADS.2010.101"},{"key":"e_1_3_2_2_34_1","volume-title":"Re: Blocksonly mode BW savings, the limits of efficient block xfer, and better relay. https:\/\/bit.ly\/2VmcgeM.","year":"2016","unstructured":"jl777. 2016 . Re: Blocksonly mode BW savings, the limits of efficient block xfer, and better relay. https:\/\/bit.ly\/2VmcgeM. jl777. 2016. Re: Blocksonly mode BW savings, the limits of efficient block xfer, and better relay. https:\/\/bit.ly\/2VmcgeM."},{"key":"e_1_3_2_2_35_1","volume-title":"Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools","author":"Johnson Benjamin","unstructured":"Benjamin Johnson , Aron Laszka , Jens Grossklags , Marie Vasek , and Tyler Moore . 2014. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools . In Financial Cryptography and Data Security, Rainer B\u00f6hme, Michael Brenner, Tyler Moore, and Matthew Smith (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 72--86. Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, and Tyler Moore. 2014. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools. In Financial Cryptography and Data Security, Rainer B\u00f6hme, Michael Brenner, Tyler Moore, and Matthew Smith (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 72--86."},{"key":"e_1_3_2_2_36_1","volume-title":"An Analysis of Anonymity in Bitcoin Using P2P Network Traffic","author":"Koshy Philip","unstructured":"Philip Koshy , Diana Koshy , and Patrick McDaniel . 2014. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic . In Financial Cryptography and Data Security, Nicolas Christin and Reihaneh Safavi-Naini (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 469--485. Philip Koshy, Diana Koshy, and Patrick McDaniel. 2014. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic. In Financial Cryptography and Data Security, Nicolas Christin and Reihaneh Safavi-Naini (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 469--485."},{"key":"e_1_3_2_2_37_1","volume-title":"ICHSN'05","author":"Kumar P.","year":"2005","unstructured":"P. Kumar , G. Sridhar , and V. Sridhar . 2005. Bandwidth and latency model for DHT based peer-to-peer networks under variable churn. In 2005 Systems Communications (ICW'05 , ICHSN'05 , ICMCS'05, SENET'05). 320--325. https:\/\/doi.org\/10.1109\/ICW. 2005 .31 10.1109\/ICW.2005.31 P. Kumar, G. Sridhar, and V. Sridhar. 2005. Bandwidth and latency model for DHT based peer-to-peer networks under variable churn. In 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05). 320--325. https:\/\/doi.org\/10.1109\/ICW.2005.31"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/17445760.2012.724067"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/PTP.2003.1231532"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354237","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354237","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:03Z","timestamp":1750202643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354237"}},"subtitle":["Efficient Transaction Relay for Bitcoin"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":40,"alternative-id":["10.1145\/3319535.3354237","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354237","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}