{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:01:31Z","timestamp":1777892491288,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":90,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T00:00:00Z","timestamp":1572134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Mel Berlin Cyber-Security Scholarship"},{"name":"Israel Science Foundation"},{"name":"US-Israel Binational Science Foundation (BSF)"},{"name":"Engima MPC Inc"},{"name":"US National Science Foundation (NSF)"},{"name":"Israel Cyber Bureau"},{"name":"European Union"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,27]]},"DOI":"10.1145\/3341301.3359627","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"63-79","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":136,"title":["Teechain"],"prefix":"10.1145","author":[{"given":"Joshua","family":"Lind","sequence":"first","affiliation":[{"name":"Imperial College London"}]},{"given":"Oded","family":"Naor","sequence":"additional","affiliation":[{"name":"Israel Institute of Technology"}]},{"given":"Ittay","family":"Eyal","sequence":"additional","affiliation":[{"name":"Israel Institute of Technology"}]},{"given":"Florian","family":"Kelbert","sequence":"additional","affiliation":[{"name":"Imperial College London"}]},{"given":"Emin G\u00fcn","family":"Sirer","sequence":"additional","affiliation":[{"name":"Cornell University"}]},{"given":"Peter","family":"Pietzuch","sequence":"additional","affiliation":[{"name":"Imperial College London"}]}],"member":"320","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Syed Taha Ali Dylan Clarke and Patrick McCorry. 2017. The Nuts and Bolts of Micropayments: a Survey. Preprint arXiv:1710.02964.  Syed Taha Ali Dylan Clarke and Patrick McCorry. 2017. The Nuts and Bolts of Micropayments: a Survey. Preprint arXiv:1710.02964."},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon. 2019. https:\/\/www.amazon.com\/.  Amazon. 2019. https:\/\/www.amazon.com\/."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP","volume":"13","author":"Anati Ittai","year":"2013","unstructured":"Ittai Anati , Shay Gueron , Simon Johnson , and Vincent Scarlata . 2013 . Innovative Technology for CPU Based Attestation and Sealing . In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP , Vol. 13 . Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative Technology for CPU Based Attestation and Sealing. In Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP, Vol. 13."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Elli Androulaki Artem Barger Vita Bortnikov Christian Cachin Konstantinos Christidis Angelo De Caro David Enyeart Christopher Ferris Gennady Laventman Yacov Manevich Srinivasan Muralidharan Chet Murthy Binh Nguyen Manish Sethi Gari Singh Keith Smith Alessandro Sorniotti Chrysoula Stathakopoulou Marko Vukoli\u0107 Sharon Weed Cocco and Jason Yellick. 2018. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. In EuroSys.  Elli Androulaki Artem Barger Vita Bortnikov Christian Cachin Konstantinos Christidis Angelo De Caro David Enyeart Christopher Ferris Gennady Laventman Yacov Manevich Srinivasan Muralidharan Chet Murthy Binh Nguyen Manish Sethi Gari Singh Keith Smith Alessandro Sorniotti Chrysoula Stathakopoulou Marko Vukoli\u0107 Sharon Weed Cocco and Jason Yellick. 2018. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. In EuroSys.","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/www.arm.com\/products\/security-on-arm\/trustzone. Accessed","author":"Ltd ARM","year":"2017","unstructured":"ARM Ltd . 2017. TrustZone. https:\/\/www.arm.com\/products\/security-on-arm\/trustzone. Accessed May 2017 . ARM Ltd. 2017. TrustZone. https:\/\/www.arm.com\/products\/security-on-arm\/trustzone. Accessed May 2017."},{"key":"e_1_3_2_1_6_1","first-page":"1153","article-title":"Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware","volume":"2017","author":"Bentov Iddo","year":"2017","unstructured":"Iddo Bentov , Yan Ji , Fan Zhang , Yunqi Li , Xueyuan Zhao , Lorenz Breidenbach , Philip Daian , and Ari Juels . 2017 . Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware . IACR Cryptology ePrint Archive 2017 , 1153 . Iddo Bentov, Yan Ji, Fan Zhang, Yunqi Li, Xueyuan Zhao, Lorenz Breidenbach, Philip Daian, and Ari Juels. 2017. Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware. IACR Cryptology ePrint Archive 2017, 1153.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_8_1","volume-title":"Average Confirmation Time. https:\/\/blockchain.info\/charts\/avg-confirmation-time?timespan=all&daysAverageString=7. Accessed","year":"2018","unstructured":"blockchain.info. 2018. Average Confirmation Time. https:\/\/blockchain.info\/charts\/avg-confirmation-time?timespan=all&daysAverageString=7. Accessed May 2018 . blockchain.info. 2018. Average Confirmation Time. https:\/\/blockchain.info\/charts\/avg-confirmation-time?timespan=all&daysAverageString=7. Accessed May 2018."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58618-0_66"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.45"},{"key":"e_1_3_2_1_11_1","unstructured":"Ferdinand Brasser Urs M\u00fcller Alexandra Dmitrienko Kari Kostiainen Srdjan Capkun and Ahmad-Reza Sadeghi. 2017. Software grand exposure: SGX cache attacks are practical. arXiv:1702.07521 33.  Ferdinand Brasser Urs M\u00fcller Alexandra Dmitrienko Kari Kostiainen Srdjan Capkun and Ahmad-Reza Sadeghi. 2017. Software grand exposure: SGX cache attacks are practical. arXiv:1702.07521 33."},{"key":"e_1_3_2_1_12_1","volume-title":"Scalable Funding of Bitcoin Micropayment Channel Networks. In International Symposium on Stabilization, Safety, and Security of Distributed Systems. Springer, 361--377","author":"Burchert Conrad","year":"2017","unstructured":"Conrad Burchert , Christian Decker , and Roger Wattenhofer . 2017 . Scalable Funding of Bitcoin Micropayment Channel Networks. In International Symposium on Stabilization, Safety, and Security of Distributed Systems. Springer, 361--377 . Conrad Burchert, Christian Decker, and Roger Wattenhofer. 2017. Scalable Funding of Bitcoin Micropayment Channel Networks. In International Symposium on Stabilization, Safety, and Security of Distributed Systems. Springer, 361--377."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/874063.875553"},{"key":"e_1_3_2_1_14_1","first-page":"173","article-title":"Practical Byzantine Fault Tolerance","volume":"99","author":"Castro Miguel","year":"1999","unstructured":"Miguel Castro , Barbara Liskov , 1999 . Practical Byzantine Fault Tolerance . In OSDI , Vol. 99. 173 -- 186 . Miguel Castro, Barbara Liskov, et al. 1999. Practical Byzantine Fault Tolerance. In OSDI, Vol. 99. 173--186.","journal-title":"OSDI"},{"key":"e_1_3_2_1_15_1","volume-title":"Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. Preprint arXiv:1804.05141.","author":"Cheng Raymond","year":"2018","unstructured":"Raymond Cheng , Fan Zhang , Jernej Kos , Warren He , Nicholas Hynes , Noah Johnson , Ari Juels , Andrew Miller , and Dawn Song . 2018 . Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. Preprint arXiv:1804.05141. Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah Johnson, Ari Juels, Andrew Miller, and Dawn Song. 2018. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. Preprint arXiv:1804.05141."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.1996.11518281"},{"key":"e_1_3_2_1_17_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Costan Victor","year":"2016","unstructured":"Victor Costan , Ilia Lebedev , and Srinivas Devadas . 2016 . Sanctum: Minimal hardware extensions for strong software isolation . In 25th USENIX Security Symposium (USENIX Security 16) . 857--874. Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal hardware extensions for strong software isolation. In 25th USENIX Security Symposium (USENIX Security 16). 857--874."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21741-3_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_20_1","unstructured":"Tadge Dryja. 2015. Scalability of lightning with different bips and some back-of-the-envelope calculations. http:\/\/diyhpl.us\/wiki\/transcripts\/scalingbitcoin\/hong-kong\/overview-of-bips-necessary-for-lightning\/.  Tadge Dryja. 2015. Scalability of lightning with different bips and some back-of-the-envelope calculations. http:\/\/diyhpl.us\/wiki\/transcripts\/scalingbitcoin\/hong-kong\/overview-of-bips-necessary-for-lightning\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Thaddeus Dryja. 2016. Unlinkable outsourced channel monitoring. https:\/\/youtu.be\/Gzg_u9gHc5Q?t=2875.  Thaddeus Dryja. 2016. Unlinkable outsourced channel monitoring. https:\/\/youtu.be\/Gzg_u9gHc5Q?t=2875."},{"key":"e_1_3_2_1_22_1","volume-title":"Why DwarfPool mines mostly empty blocks and only few ones with transactions. https:\/\/www.reddit.com\/r\/ethereum\/comments\/57c1yn\/why_dwarfpool_mines_mostly_empty_blocks_and_only\/. Accessed","year":"2018","unstructured":"DwarfPool. 2016. Why DwarfPool mines mostly empty blocks and only few ones with transactions. https:\/\/www.reddit.com\/r\/ethereum\/comments\/57c1yn\/why_dwarfpool_mines_mostly_empty_blocks_and_only\/. Accessed Feb 2018 . DwarfPool. 2016. Why DwarfPool mines mostly empty blocks and only few ones with transactions. https:\/\/www.reddit.com\/r\/ethereum\/comments\/57c1yn\/why_dwarfpool_mines_mostly_empty_blocks_and_only\/. Accessed Feb 2018."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.955100"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243856"},{"key":"e_1_3_2_1_25_1","unstructured":"Ebay. 2019. https:\/\/www.ebay.com\/.  Ebay. 2019. https:\/\/www.ebay.com\/."},{"key":"e_1_3_2_1_26_1","volume-title":"Bitcoin-NG: A Scalable Blockchain Protocol. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal , Adem Efe Gencer , Emin G\u00fcn Sirer , and Robbert Van Renesse . 2016 . Bitcoin-NG: A Scalable Blockchain Protocol. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2016). Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A Scalable Blockchain Protocol. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2016)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_1_28_1","unstructured":"Gideon Greenspan. 2015. MultiChain private blockchain---White paper. http:\/\/www.multichain.com\/download\/MultiChain-White-Paper.pdf.  Gideon Greenspan. 2015. MultiChain private blockchain---White paper. http:\/\/www.multichain.com\/download\/MultiChain-White-Paper.pdf."},{"key":"e_1_3_2_1_30_1","unstructured":"Mike Hearn and Jeremy Spilman. 2015. Rapidly-adjusted micropayments to a pre-determined party. https:\/\/en.bitcoin.it\/wiki\/Contract.  Mike Hearn and Jeremy Spilman. 2015. Rapidly-adjusted micropayments to a pre-determined party. https:\/\/en.bitcoin.it\/wiki\/Contract."},{"key":"e_1_3_2_1_31_1","volume-title":"24th USENIX Security Symposium, USENIX Security 15","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman , Alison Kendler , Aviv Zohar , and Sharon Goldberg . 2015 . Eclipse Attacks on Bitcoin's Peer-to-Peer Network . In 24th USENIX Security Symposium, USENIX Security 15 , Washington, D.C., USA, August 12--14 , 2015. 129--144. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/heilman Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12--14, 2015. 129--144. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/heilman"},{"key":"e_1_3_2_1_32_1","volume-title":"Multizone: The first Trusted Execution Environment for RISC-V. https:\/\/hex-five.com\/.","author":"Security Hex-Five","year":"2018","unstructured":"Hex-Five Security . 2018 . Multizone: The first Trusted Execution Environment for RISC-V. https:\/\/hex-five.com\/. Hex-Five Security. 2018. Multizone: The first Trusted Execution Environment for RISC-V. https:\/\/hex-five.com\/."},{"key":"e_1_3_2_1_33_1","volume-title":"Product Change Notification. https:\/\/qdms.intel.com\/dm\/i.aspx\/5A160770-FC47-47A0-BF8A-062540456F0A\/PCN114074-00.pdf. Accessed","year":"2018","unstructured":"Intel. 2015. Product Change Notification. https:\/\/qdms.intel.com\/dm\/i.aspx\/5A160770-FC47-47A0-BF8A-062540456F0A\/PCN114074-00.pdf. Accessed May 2018 . Intel. 2015. Product Change Notification. https:\/\/qdms.intel.com\/dm\/i.aspx\/5A160770-FC47-47A0-BF8A-062540456F0A\/PCN114074-00.pdf. Accessed May 2018."},{"key":"e_1_3_2_1_34_1","volume-title":"Intel SGX SDK for Linux. https:\/\/download.01.org\/intel-sgx\/linux-1.8\/docs\/Intel_SGX_SDK_Developer_Reference_Linux_1.8_Open_Source.pdf. Accessed","year":"2017","unstructured":"Intel. 2017. Intel SGX SDK for Linux. https:\/\/download.01.org\/intel-sgx\/linux-1.8\/docs\/Intel_SGX_SDK_Developer_Reference_Linux_1.8_Open_Source.pdf. Accessed May 2017 . Intel. 2017. Intel SGX SDK for Linux. https:\/\/download.01.org\/intel-sgx\/linux-1.8\/docs\/Intel_SGX_SDK_Developer_Reference_Linux_1.8_Open_Source.pdf. Accessed May 2017."},{"key":"e_1_3_2_1_35_1","unstructured":"Intel Corp. 2014. Software Guard Extensions Programming Reference Ref. 329298-002US. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf  Intel Corp. 2014. Software Guard Extensions Programming Reference Ref. 329298-002US. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf"},{"key":"e_1_3_2_1_36_1","volume-title":"Intel Software Guard Extensions Remote Attestation End-to-End Example. https:\/\/software.intel.com\/en-us\/articles\/intel-software-guard-extensions-remote-attestation-end-to-end-example. Accessed","author":"Intel Inc. 2016.","year":"2017","unstructured":"Intel Inc. 2016. Intel Software Guard Extensions Remote Attestation End-to-End Example. https:\/\/software.intel.com\/en-us\/articles\/intel-software-guard-extensions-remote-attestation-end-to-end-example. Accessed May 2017 . Intel Inc. 2016. Intel Software Guard Extensions Remote Attestation End-to-End Example. https:\/\/software.intel.com\/en-us\/articles\/intel-software-guard-extensions-remote-attestation-end-to-end-example. Accessed May 2017."},{"key":"e_1_3_2_1_37_1","volume-title":"sgx_create_monotonic_counter. https:\/\/software.intel.com\/en-us\/node\/709160. Accessed","author":"Intel Inc. 2017.","year":"2017","unstructured":"Intel Inc. 2017. sgx_create_monotonic_counter. https:\/\/software.intel.com\/en-us\/node\/709160. Accessed May 2017 . Intel Inc. 2017. sgx_create_monotonic_counter. https:\/\/software.intel.com\/en-us\/node\/709160. Accessed May 2017."},{"key":"e_1_3_2_1_38_1","volume-title":"Simon et al","author":"Johnson","year":"2016","unstructured":"Johnson , Simon et al . 2016 . Intel\u00ae Software Guard Extensions: EPID Provisioning and Attestation Services . https:\/\/software.intel.com\/en-us\/blogs\/2016\/03\/09\/intel-sgx-epid-provisioning-and-attestation-services. Johnson, Simon et al. 2016. Intel\u00ae Software Guard Extensions: EPID Provisioning and Attestation Services. https:\/\/software.intel.com\/en-us\/blogs\/2016\/03\/09\/intel-sgx-epid-provisioning-and-attestation-services."},{"key":"e_1_3_2_1_39_1","volume-title":"WikiLeaks Is Now a Target In the Massive Spam Attack on Bitcoin. https:\/\/motherboard.vice.com\/en_us\/article\/ezvw7z\/wikileaks-is-now-a-target-in-the-massive-spam-attack-on-bitcoin. Accessed","author":"Pearson Jordan","year":"2018","unstructured":"Jordan Pearson . 2015. WikiLeaks Is Now a Target In the Massive Spam Attack on Bitcoin. https:\/\/motherboard.vice.com\/en_us\/article\/ezvw7z\/wikileaks-is-now-a-target-in-the-massive-spam-attack-on-bitcoin. Accessed Feb 2018 . Jordan Pearson. 2015. WikiLeaks Is Now a Target In the Massive Spam Attack on Bitcoin. https:\/\/motherboard.vice.com\/en_us\/article\/ezvw7z\/wikileaks-is-now-a-target-in-the-massive-spam-attack-on-bitcoin. Accessed Feb 2018."},{"key":"e_1_3_2_1_40_1","volume-title":"Analyst: Suspicious Bitcoin Mempool Activity, Transaction Fees Spike to 16. https:\/\/cointelegraph.com\/news\/analyst-suspicious-bitcoin-mempool-activity-transaction-fees-spike-to-16. Accessed","author":"Young Joseph","year":"2017","unstructured":"Joseph Young . 2017 . Analyst: Suspicious Bitcoin Mempool Activity, Transaction Fees Spike to 16. https:\/\/cointelegraph.com\/news\/analyst-suspicious-bitcoin-mempool-activity-transaction-fees-spike-to-16. Accessed Feb 2018. Joseph Young. 2017. Analyst: Suspicious Bitcoin Mempool Activity, Transaction Fees Spike to 16. https:\/\/cointelegraph.com\/news\/analyst-suspicious-bitcoin-mempool-activity-transaction-fees-spike-to-16. Accessed Feb 2018."},{"key":"e_1_3_2_1_41_1","volume-title":"F2Pool Allegedly Prevented Users From Investing in Status ICO. https:\/\/themerkle.com\/f2pool-allegedly-prevented-users-from-investing-in-status-ico\/. Accessed","author":"Buntinx JP","year":"2018","unstructured":"JP Buntinx . 2017. F2Pool Allegedly Prevented Users From Investing in Status ICO. https:\/\/themerkle.com\/f2pool-allegedly-prevented-users-from-investing-in-status-ico\/. Accessed Feb 2018 . JP Buntinx. 2017. F2Pool Allegedly Prevented Users From Investing in Status ICO. https:\/\/themerkle.com\/f2pool-allegedly-prevented-users-from-investing-in-status-ico\/. Accessed Feb 2018."},{"key":"e_1_3_2_1_42_1","unstructured":"David Kaplan Jeremy Powell and Tom Woller. 2016. AMD Memory Encryption. White paper.  David Kaplan Jeremy Powell and Tom Woller. 2016. AMD Memory Encryption. White paper."},{"key":"e_1_3_2_1_43_1","volume-title":"Keystone: Open-source Secure Hardware Enclave. https:\/\/keystone-enclave.org\/.","author":"Project Keystone","year":"2018","unstructured":"Keystone Project . 2018 . Keystone: Open-source Secure Hardware Enclave. https:\/\/keystone-enclave.org\/. Keystone Project. 2018. Keystone: Open-source Secure Hardware Enclave. https:\/\/keystone-enclave.org\/."},{"key":"e_1_3_2_1_44_1","first-page":"400","article-title":"Revive","volume":"200","author":"Khalil Rami","year":"2017","unstructured":"Rami Khalil and Arthur Gervais . 2017 . Revive : Rebalancing Off-Blockchain Payment Networks. Gas 200 , 400 . Rami Khalil and Arthur Gervais. 2017. Revive: Rebalancing Off-Blockchain Payment Networks. Gas 200, 400.","journal-title":"Rebalancing Off-Blockchain Payment Networks. Gas"},{"key":"e_1_3_2_1_45_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Kogias Eleftherios Kokoris","year":"2016","unstructured":"Eleftherios Kokoris Kogias , Philipp Jovanovic , Nicolas Gailly , Ismail Khoffi , Linus Gasser , and Bryan Ford . 2016 . Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing . In 25th USENIX Security Symposium (USENIX Security 16) . Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing. In 25th USENIX Security Symposium (USENIX Security 16)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_24"},{"key":"e_1_3_2_1_48_1","unstructured":"Leslie Lamport et al. 2001. Paxos made simple. ACM Sigact News. Dec 2001 32 4 18--25.  Leslie Lamport et al. 2001. Paxos made simple. ACM Sigact News. Dec 2001 32 4 18--25."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Yoad Lewenberg Yonatan Sompolinsky and Aviv Zohar. 2015. Inclusive Block Chain Protocols. In Financial Cryptography. Puerto Rico.  Yoad Lewenberg Yonatan Sompolinsky and Aviv Zohar. 2015. Inclusive Block Chain Protocols. In Financial Cryptography. Puerto Rico.","DOI":"10.1007\/978-3-662-47854-7_33"},{"key":"e_1_3_2_1_50_1","volume-title":"Lightning Network Daemon. https:\/\/github.com\/lightningnetwork\/lnd. Accessed","author":"Lightning Network","year":"2017","unstructured":"Lightning Network community. 2017. Lightning Network Daemon. https:\/\/github.com\/lightningnetwork\/lnd. Accessed May 2017 . Lightning Network community. 2017. Lightning Network Daemon. https:\/\/github.com\/lightningnetwork\/lnd. Accessed May 2017."},{"key":"e_1_3_2_1_51_1","unstructured":"Linaro. 2014. Open Portable Trusted Execution Environment. https:\/\/www.op-tee.org\/.  Linaro. 2014. Open Portable Trusted Execution Environment. https:\/\/www.op-tee.org\/."},{"key":"e_1_3_2_1_52_1","volume-title":"Teechan: Payment channels using trusted execution environments. Preprint arXiv:1612.07766.","author":"Lind Joshua","year":"2016","unstructured":"Joshua Lind , Ittay Eyal , Peter Pietzuch , and Emin G\u00fcn Sirer . 2016 . Teechan: Payment channels using trusted execution environments. Preprint arXiv:1612.07766. Joshua Lind, Ittay Eyal, Peter Pietzuch, and Emin G\u00fcn Sirer. 2016. Teechan: Payment channels using trusted execution environments. Preprint arXiv:1612.07766."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Giulio Malavolta Pedro Moreno-Sanchez Aniket Kate Matteo Maffei and Srivatsan Ravi. 2017. Concurrency and privacy with payment-channel networks.  Giulio Malavolta Pedro Moreno-Sanchez Aniket Kate Matteo Maffei and Srivatsan Ravi. 2017. Concurrency and privacy with payment-channel networks.","DOI":"10.1145\/3133956.3134096"},{"key":"e_1_3_2_1_55_1","first-page":"236","article-title":"Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network","volume":"2018","author":"Marcus Yuval","year":"2018","unstructured":"Yuval Marcus , Ethan Heilman , and Sharon Goldberg . 2018 . Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network . IACR Cryptology ePrint Archive 2018 , 236 . Yuval Marcus, Ethan Heilman, and Sharon Goldberg. 2018. Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network. IACR Cryptology ePrint Archive 2018, 236.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_56_1","volume-title":"ROTE: Rollback Protection for Trusted Execution. Cryptology ePrint Archive, Report 2017\/048","author":"Matetic Sinisa","year":"2017","unstructured":"Sinisa Matetic , Mansoor Ahmed , Kari Kostiainen , Aritra Dhar , David Sommer , Arthur Gervais , Ari Juels , and Srdjan Capkun . 2017 . ROTE: Rollback Protection for Trusted Execution. Cryptology ePrint Archive, Report 2017\/048 . http:\/\/eprint.iacr.org\/2017\/048. Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. 2017. ROTE: Rollback Protection for Trusted Execution. Cryptology ePrint Archive, Report 2017\/048. http:\/\/eprint.iacr.org\/2017\/048."},{"key":"e_1_3_2_1_57_1","unstructured":"David Mazieres. 2015. The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus. https:\/\/www.stellar.org\/papers\/stellar-consensus-protocol.pdf.  David Mazieres. 2015. The Stellar Consensus Protocol: A Federated Model for Internet-level Consensus. https:\/\/www.stellar.org\/papers\/stellar-consensus-protocol.pdf."},{"key":"e_1_3_2_1_58_1","first-page":"582","article-title":"Pisa: Arbitration Outsourcing for State Channels","volume":"2018","author":"McCorry Patrick","year":"2018","unstructured":"Patrick McCorry , Surya Bakshi , Iddo Bentov , Andrew Miller , and Sarah Meiklejohn . 2018 . Pisa: Arbitration Outsourcing for State Channels . IACR Cryptology ePrint Archive 2018 , 582 . Patrick McCorry, Surya Bakshi, Iddo Bentov, Andrew Miller, and Sarah Meiklejohn. 2018. Pisa: Arbitration Outsourcing for State Channels. IACR Cryptology ePrint Archive 2018, 582.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_59_1","unstructured":"Patrick McCorry Chris Buckland Surya Bakshi Karl W\u00fcst and Andrew Miller. 2018. You sank my battleship! A case study to evaluate state channels as a scaling solution for cryptocurrencies.  Patrick McCorry Chris Buckland Surya Bakshi Karl W\u00fcst and Andrew Miller. 2018. You sank my battleship! A case study to evaluate state channels as a scaling solution for cryptocurrencies."},{"key":"e_1_3_2_1_60_1","volume-title":"Sprites: Payment channels that go faster than lightning. CoRR abs\/1702.05812.","author":"Miller Andrew","year":"2017","unstructured":"Andrew Miller , Iddo Bentov , Ranjit Kumaresan , and Patrick McCorry . 2017 . Sprites: Payment channels that go faster than lightning. CoRR abs\/1702.05812. Andrew Miller, Iddo Bentov, Ranjit Kumaresan, and Patrick McCorry. 2017. Sprites: Payment channels that go faster than lightning. CoRR abs\/1702.05812."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"e_1_3_2_1_63_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System . http:\/\/www.bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. http:\/\/www.bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_64_1","unstructured":"Open Enclave SDK Community. 2018. Open Enclave SDK. https:\/\/openenclave.io\/sdk\/.  Open Enclave SDK Community. 2018. Open Enclave SDK. https:\/\/openenclave.io\/sdk\/."},{"key":"e_1_3_2_1_65_1","unstructured":"Dan O'Keeffe Divya Muthukumaran Pierre-Louis Aublin Florian Kelbert Christian Priebe Josh Lind Huanzhou Zhu and Peter Pietzuch. 2018. Spectre attack against SGX enclave.  Dan O'Keeffe Divya Muthukumaran Pierre-Louis Aublin Florian Kelbert Christian Priebe Josh Lind Huanzhou Zhu and Peter Pietzuch. 2018. Spectre attack against SGX enclave."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"e_1_3_2_1_67_1","volume-title":"Hybrid Consensus: Efficient Consensus in the Permissionless Model. ePrint Archive, Report 2016\/917.","author":"Pass Rafael","year":"2016","unstructured":"Rafael Pass and Elaine Shi . 2016 . Hybrid Consensus: Efficient Consensus in the Permissionless Model. ePrint Archive, Report 2016\/917. Rafael Pass and Elaine Shi. 2016. Hybrid Consensus: Efficient Consensus in the Permissionless Model. ePrint Archive, Report 2016\/917."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_1"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_10"},{"key":"e_1_3_2_1_70_1","volume-title":"Plasma: Scalable autonomous smart contracts.","author":"Poon Joseph","year":"2017","unstructured":"Joseph Poon and Vitalik Buterin . 2017 . Plasma: Scalable autonomous smart contracts. Joseph Poon and Vitalik Buterin. 2017. Plasma: Scalable autonomous smart contracts."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_73_1","volume-title":"How the winner got Fomo3D prize --- A Detailed Explanation. https:\/\/medium.com\/coinmonks\/how-the-winner-got-fomo3d-prize-a-detailed-explanation-b30a69b7813f. Accessed","author":"SECBIT.","year":"2018","unstructured":"SECBIT. 2018. How the winner got Fomo3D prize --- A Detailed Explanation. https:\/\/medium.com\/coinmonks\/how-the-winner-got-fomo3d-prize-a-detailed-explanation-b30a69b7813f. Accessed Sep 2018 . SECBIT. 2018. How the winner got Fomo3D prize --- A Detailed Explanation. https:\/\/medium.com\/coinmonks\/how-the-winner-got-fomo3d-prize-a-detailed-explanation-b30a69b7813f. Accessed Sep 2018."},{"key":"e_1_3_2_1_74_1","unstructured":"Istv\u00e1n Andr\u00e1s Seres L\u00e1szl\u00f3 Guly\u00e1s D\u00e1niel A Nagy and P\u00e9ter Burcsi. 2019. Topological Analysis of Bitcoin's Lightning Network. Preprint arXiv:1901.04972.  Istv\u00e1n Andr\u00e1s Seres L\u00e1szl\u00f3 Guly\u00e1s D\u00e1niel A Nagy and P\u00e9ter Burcsi. 2019. Topological Analysis of Bitcoin's Lightning Network. Preprint arXiv:1901.04972."},{"key":"e_1_3_2_1_75_1","unstructured":"Alex Shamis Amaury Chamayou Christine Avanessians Christoph M. Wintersteiger Edward Ashton Felix Schuster C\u00e9dric Fournet Julien Maffre Kartik Nayak Mark Russinovich Matthew Kerner Miguel Castro Thomas Moscibroda Olga Vrousgou Roy Schwartz Sid Krishna Sylvan Clebsch and Olya Ohrimenko. 2019. CCF: A Framework for Building Confidential Verifiable Replicated Services. Technical Report MSR-TR-2019-16. Microsoft. https:\/\/www.microsoft.com\/en-us\/research\/publication\/ccf-a-framework-for-building-confidential-verifiable-replicated-services\/  Alex Shamis Amaury Chamayou Christine Avanessians Christoph M. Wintersteiger Edward Ashton Felix Schuster C\u00e9dric Fournet Julien Maffre Kartik Nayak Mark Russinovich Matthew Kerner Miguel Castro Thomas Moscibroda Olga Vrousgou Roy Schwartz Sid Krishna Sylvan Clebsch and Olya Ohrimenko. 2019. CCF: A Framework for Building Confidential Verifiable Replicated Services. Technical Report MSR-TR-2019-16. Microsoft. https:\/\/www.microsoft.com\/en-us\/research\/publication\/ccf-a-framework-for-building-confidential-verifiable-replicated-services\/"},{"key":"e_1_3_2_1_76_1","unstructured":"Yonatan Sompolinsky and Aviv Zohar. 2015. Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees Not Chains. In Financial Cryptography. Puerto Rico.  Yonatan Sompolinsky and Aviv Zohar. 2015. Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees Not Chains. In Financial Cryptography. Puerto Rico."},{"key":"e_1_3_2_1_77_1","volume-title":"An electronic purse: Specification, refinement and proof","author":"Stepney Susan","unstructured":"Susan Stepney , David Cooper , and Jim Woodcock . 2000. An electronic purse: Specification, refinement and proof . Oxford University . Susan Stepney, David Cooper, and Jim Woodcock. 2000. An electronic purse: Specification, refinement and proof. Oxford University."},{"key":"e_1_3_2_1_78_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Strackx Raoul","year":"2016","unstructured":"Raoul Strackx and Frank Piessens . 2016 . Ariadne: A Minimal Approach to State Continuity . In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 875--892. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/strackx Raoul Strackx and Frank Piessens. 2016. Ariadne: A Minimal Approach to State Continuity. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 875--892. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/strackx"},{"key":"e_1_3_2_1_79_1","volume-title":"BTC Spam attack. 200,000 unconfirmed transactions halts bitcoin. https:\/\/steemit.com\/cryptocurrency\/@superfreek\/btc-spam-attack-200-000-unconfirmed-transactions-halts-bitcoin. Accessed","year":"2018","unstructured":"superfreek. 2017. BTC Spam attack. 200,000 unconfirmed transactions halts bitcoin. https:\/\/steemit.com\/cryptocurrency\/@superfreek\/btc-spam-attack-200-000-unconfirmed-transactions-halts-bitcoin. Accessed Feb 2018 . superfreek. 2017. BTC Spam attack. 200,000 unconfirmed transactions halts bitcoin. https:\/\/steemit.com\/cryptocurrency\/@superfreek\/btc-spam-attack-200-000-unconfirmed-transactions-halts-bitcoin. Accessed Feb 2018."},{"key":"e_1_3_2_1_80_1","unstructured":"NickSzabo. 1997. The idea of smart contracts. Nick Szabo's Papers and Concise Tutorials 6.  NickSzabo. 1997. The idea of smart contracts. Nick Szabo's Papers and Concise Tutorials 6."},{"key":"e_1_3_2_1_81_1","unstructured":"Team Rocket. 2018. Snowflake to Avalanche: A Novel Metastable Consensus Protocol Family for Cryptocurrencies. https:\/\/ipfs.io\/ipfs\/QmUy4jh5mGNZvLkjies1RWM4YuvJh5-o2FYopNPVYwrRVGV.  Team Rocket. 2018. Snowflake to Avalanche: A Novel Metastable Consensus Protocol Family for Cryptocurrencies. https:\/\/ipfs.io\/ipfs\/QmUy4jh5mGNZvLkjies1RWM4YuvJh5-o2FYopNPVYwrRVGV."},{"key":"e_1_3_2_1_82_1","unstructured":"The Bitcoin Community. 2013. libsecp256k1. https:\/\/github.com\/bitcoin-core\/secp256k1.  The Bitcoin Community. 2013. libsecp256k1. https:\/\/github.com\/bitcoin-core\/secp256k1."},{"key":"e_1_3_2_1_83_1","volume-title":"Bitcoin Core version 0.13.1 released. https:\/\/bitcoin.org\/en\/release\/v0.13.1. Accessed","author":"Community The Bitcoin","year":"2017","unstructured":"The Bitcoin Community . 2016. Bitcoin Core version 0.13.1 released. https:\/\/bitcoin.org\/en\/release\/v0.13.1. Accessed May 2017 . The Bitcoin Community. 2016. Bitcoin Core version 0.13.1 released. https:\/\/bitcoin.org\/en\/release\/v0.13.1. Accessed May 2017."},{"key":"e_1_3_2_1_84_1","volume-title":"https:\/\/bitcoin.org\/en\/glossary\/multisig. Accessed","author":"Multisig The Bitcoin","year":"2017","unstructured":"The Bitcoin community. 2017. M-of-N Multisig , Multisig Output . https:\/\/bitcoin.org\/en\/glossary\/multisig. Accessed May 2017 . The Bitcoin community. 2017. M-of-N Multisig, Multisig Output. https:\/\/bitcoin.org\/en\/glossary\/multisig. Accessed May 2017."},{"key":"e_1_3_2_1_85_1","volume-title":"Ethereum White Paper. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper. Accessed","author":"The Ethereum","year":"2017","unstructured":"The Ethereum community. 2017. Ethereum White Paper. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper. Accessed May 2017 . The Ethereum community. 2017. Ethereum White Paper. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper. Accessed May 2017."},{"key":"e_1_3_2_1_86_1","unstructured":"The Linux-SGX community. 2016. Intel(R) Software Guard Extensions for Linux OS. https:\/\/github.com\/intel\/linux-sgx.  The Linux-SGX community. 2016. Intel(R) Software Guard Extensions for Linux OS. https:\/\/github.com\/intel\/linux-sgx."},{"key":"e_1_3_2_1_87_1","volume-title":"The Raiden Network. https:\/\/raiden.network\/. Accessed","author":"The Raiden","year":"2017","unstructured":"The Raiden Network community. 2017. The Raiden Network. https:\/\/raiden.network\/. Accessed October 2017 . The Raiden Network community. 2017. The Raiden Network. https:\/\/raiden.network\/. Accessed October 2017."},{"key":"e_1_3_2_1_89_1","first-page":"974","article-title":"Obscuro: A Bitcoin Mixer using Trusted Execution Environments","volume":"2017","author":"Tran Muoi","year":"2017","unstructured":"Muoi Tran , Loi Luu , Min Suk Kang , Iddo Bentov , and Prateek Saxena . 2017 . Obscuro: A Bitcoin Mixer using Trusted Execution Environments . IACR Cryptology ePrint Archive 2017 , 974 . Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, and Prateek Saxena. 2017. Obscuro: A Bitcoin Mixer using Trusted Execution Environments. IACR Cryptology ePrint Archive 2017, 974.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_90_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas F Wenisch , Yuval Yarom , and Raoul Strackx . 2018 . FORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution . In 27th USENIX Security Symposium (USENIX Security 18) . Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F Wenisch, Yuval Yarom, and Raoul Strackx. 2018. FORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In 27th USENIX Security Symposium (USENIX Security 18)."},{"key":"e_1_3_2_1_91_1","volume-title":"6th Symposium on Operating Systems Design and Implementation","volume":"4","author":"Renesse Robbert Van","year":"2004","unstructured":"Robbert Van Renesse and Fred B Schneider . 2004 . Chain Replication for Supporting High Throughput and Availability .. In 6th Symposium on Operating Systems Design and Implementation , Vol. 4 . 91--104. Robbert Van Renesse and Fred B Schneider. 2004. Chain Replication for Supporting High Throughput and Availability.. In 6th Symposium on Operating Systems Design and Implementation, Vol. 4. 91--104."},{"key":"e_1_3_2_1_92_1","volume-title":"International Workshop on Open Problems in Network Security. Springer, 112--125","author":"Vukoli\u0107 Marko","year":"2015","unstructured":"Marko Vukoli\u0107 . 2015 . The quest for scalable blockchain fabric: Proof-of-Work vs. BFT replication . In International Workshop on Open Problems in Network Security. Springer, 112--125 . Marko Vukoli\u0107. 2015. The quest for scalable blockchain fabric: Proof-of-Work vs. BFT replication. In International Workshop on Open Problems in Network Security. Springer, 112--125."},{"key":"e_1_3_2_1_93_1","volume-title":"Ethereum: A Secure Decentralised Generalised Transaction Ledger (EIP-150)","author":"Wood Gavin","year":"2016","unstructured":"Gavin Wood . 2016 . Ethereum: A Secure Decentralised Generalised Transaction Ledger (EIP-150) . http:\/\/gavwood.com\/Paper.pdf. Gavin Wood. 2016. Ethereum: A Secure Decentralised Generalised Transaction Ledger (EIP-150). http:\/\/gavwood.com\/Paper.pdf."},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"key":"e_1_3_2_1_95_1","volume-title":"Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrencies and More.","author":"Zhang Fan","year":"2017","unstructured":"Fan Zhang , Philip Daian , Gabriel Kaptchuk , Iddo Bentov , Ian Miers , and Ari Juels . 2017 . Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrencies and More. Fan Zhang, Philip Daian, Gabriel Kaptchuk, Iddo Bentov, Ian Miers, and Ari Juels. 2017. Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrencies and More."}],"event":{"name":"SOSP '19: ACM SIGOPS 27th Symposium on Operating Systems Principles","location":"Huntsville Ontario Canada","acronym":"SOSP '19","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 27th ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341301.3359627","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341301.3359627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:26Z","timestamp":1750202606000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341301.3359627"}},"subtitle":["a secure payment network with asynchronous blockchain access"],"short-title":[],"issued":{"date-parts":[[2019,10,27]]},"references-count":90,"alternative-id":["10.1145\/3341301.3359627","10.1145\/3341301"],"URL":"https:\/\/doi.org\/10.1145\/3341301.3359627","relation":{},"subject":[],"published":{"date-parts":[[2019,10,27]]},"assertion":[{"value":"2019-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}