{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T00:16:57Z","timestamp":1769300217334,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,26]],"date-time":"2021-09-26T00:00:00Z","timestamp":1632614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,26]]},"DOI":"10.1145\/3479722.3480999","type":"proceedings-article","created":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T17:35:26Z","timestamp":1637688926000},"page":"205-218","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["The velvet path to superlight blockchain clients"],"prefix":"10.1145","author":[{"given":"Aggelos","family":"Kiayias","sequence":"first","affiliation":[{"name":"University of Edinburgh"}]},{"given":"Andrianna","family":"Polydouri","sequence":"additional","affiliation":[{"name":"University of Athens"}]},{"given":"Dionysis","family":"Zindros","sequence":"additional","affiliation":[{"name":"University of Athens"}]}],"member":"320","published-online":{"date-parts":[[2021,11,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00049"},{"key":"e_1_3_2_1_3_1","unstructured":"Vitalik Buterin. 2017. Hard Forks Soft Forks Defaults and Coercion. https:\/\/vitalik.ca\/general\/2017\/03\/14\/forks_and_markets.html  Vitalik Buterin. 2017. Hard Forks Soft Forks Defaults and Coercion. https:\/\/vitalik.ca\/general\/2017\/03\/14\/forks_and_markets.html"},{"key":"e_1_3_2_1_4_1","unstructured":"Vitalik Buterin et al. 2014. A next-generation smart contract and decentralized application platform. https:\/\/blockchainlab.com\/pdf\/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalik-buterin.pdf  Vitalik Buterin et al. 2014. A next-generation smart contract and decentralized application platform. https:\/\/blockchainlab.com\/pdf\/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalik-buterin.pdf"},{"key":"e_1_3_2_1_5_1","first-page":"968","article-title":"Edrax: A Cryptocurrency with Stateless Transaction Validation","volume":"2018","author":"Chepurnoy Alexander","year":"2018","unstructured":"Alexander Chepurnoy , Charalampos Papamanthou , and Yupeng Zhang . 2018 . Edrax: A Cryptocurrency with Stateless Transaction Validation . IACR Cryptology ePrint Archive 2018 (2018), 968 . Alexander Chepurnoy, Charalampos Papamanthou, and Yupeng Zhang. 2018. Edrax: A Cryptocurrency with Stateless Transaction Validation. IACR Cryptology ePrint Archive 2018 (2018), 968.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_6_1","unstructured":"Elion Chin Philipp von Styp-Rekowsky and Robin Linus. 2018. Nimiq. Available at: https:\/\/nimiq.com. https:\/\/nimiq.com\/  Elion Chin Philipp von Styp-Rekowsky and Robin Linus. 2018. Nimiq. Available at: https:\/\/nimiq.com. https:\/\/nimiq.com\/"},{"key":"e_1_3_2_1_7_1","volume-title":"Enabling crosschain transactions using NIPoPoWs. Master's thesis","author":"Christoglou Georgios","unstructured":"Georgios Christoglou . 2018. Enabling crosschain transactions using NIPoPoWs. Master's thesis . Imperial College London . Georgios Christoglou. 2018. Enabling crosschain transactions using NIPoPoWs. Master's thesis. Imperial College London."},{"key":"e_1_3_2_1_8_1","first-page":"927","article-title":"A Gas-Efficient Superlight Bitcoin Client in Solidity","volume":"2020","author":"Daveas Stelios","year":"2020","unstructured":"Stelios Daveas , Kostis Karantias , Aggelos Kiayias , and Zindros Dionysis . 2020 . A Gas-Efficient Superlight Bitcoin Client in Solidity . IACR Cryptology ePrint Archive 2020 (2020), 927 . Stelios Daveas, Kostis Karantias, Aggelos Kiayias, and Zindros Dionysis. 2020. A Gas-Efficient Superlight Bitcoin Client in Solidity. IACR Cryptology ePrint Archive 2020 (2020), 927.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"C. Decker and R. Wattenhofer. 2013. Information propagation in the Bitcoin network. In IEEE P2P 2013 Proceedings. 1--10.  C. Decker and R. Wattenhofer. 2013. Information propagation in the Bitcoin network. In IEEE P2P 2013 Proceedings. 1--10.","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_3_2_1_10_1","volume-title":"Ergo: A Resilient Platform For Contractual Money. https:\/\/ergoplatform.org\/docs\/whitepaper.pdf.","author":"Developers ERGO","year":"2019","unstructured":"ERGO Developers . 2019 . Ergo: A Resilient Platform For Contractual Money. https:\/\/ergoplatform.org\/docs\/whitepaper.pdf. ERGO Developers. 2019. Ergo: A Resilient Platform For Contractual Money. https:\/\/ergoplatform.org\/docs\/whitepaper.pdf."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_12_1","volume-title":"Annual International Cryptology Conference. Springer, 139--147","author":"Dwork Cynthia","year":"1992","unstructured":"Cynthia Dwork and Moni Naor . 1992 . Pricing via processing or combatting junk mail . In Annual International Cryptology Conference. Springer, 139--147 . Cynthia Dwork and Moni Naor. 1992. Pricing via processing or combatting junk mail. In Annual International Cryptology Conference. Springer, 139--147."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"e_1_3_2_1_14_1","volume-title":"Conference on the theory and application of cryptographic techniques. Springer, 186--194","author":"Fiat Amos","year":"1986","unstructured":"Amos Fiat and Adi Shamir . 1986 . How to prove yourself: Practical solutions to identification and signature problems . In Conference on the theory and application of cryptographic techniques. Springer, 186--194 . Amos Fiat and Adi Shamir. 1986. How to prove yourself: Practical solutions to identification and signature problems. In Conference on the theory and application of cryptographic techniques. Springer, 186--194."},{"key":"e_1_3_2_1_15_1","volume-title":"The Bitcoin Backbone Protocol: Analysis and Applications (revised","author":"Garay Juan","year":"2019","unstructured":"Juan Garay , Aggelos Kiayias , and Nikos Leonardos . 2014. The Bitcoin Backbone Protocol: Analysis and Applications (revised 2019 ). Cryptology ePrint Archive, Report 2014\/765. https:\/\/eprint.iacr.org\/2014\/765. Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2014. The Bitcoin Backbone Protocol: Analysis and Applications (revised 2019). Cryptology ePrint Archive, Report 2014\/765. https:\/\/eprint.iacr.org\/2014\/765."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_17_1","volume-title":"The Bitcoin Backbone Protocol with Chains of Variable Difficulty. In Annual International Cryptology Conference (LNCS","volume":"323","author":"Garay Juan A.","year":"2017","unstructured":"Juan A. Garay , Aggelos Kiayias , and Nikos Leonardos . 2017 . The Bitcoin Backbone Protocol with Chains of Variable Difficulty. In Annual International Cryptology Conference (LNCS , Vol. 10401), Jonathan Katz and Hovav Shacham (Eds.). Springer, 291-- 323 . Juan A. Garay, Aggelos Kiayias, and Nikos Leonardos. 2017. The Bitcoin Backbone Protocol with Chains of Variable Difficulty. In Annual International Cryptology Conference (LNCS, Vol. 10401), Jonathan Katz and Hovav Shacham (Eds.). Springer, 291--323."},{"key":"e_1_3_2_1_18_1","volume-title":"USENIX Security Symposium. 129--144","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman , Alison Kendler , Aviv Zohar , and Sharon Goldberg . 2015 . Eclipse Attacks on Bitcoin's Peer-to-Peer Network .. In USENIX Security Symposium. 129--144 . Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network.. In USENIX Security Symposium. 129--144."},{"key":"e_1_3_2_1_19_1","volume-title":"Enabling NIPoPoW Applications on Bitcoin Cash. Master's thesis","author":"Karantias Kostis","unstructured":"Kostis Karantias . 2019. Enabling NIPoPoW Applications on Bitcoin Cash. Master's thesis . University of Ioannina , Ioannina, Greece . Kostis Karantias. 2019. Enabling NIPoPoW Applications on Bitcoin Cash. Master's thesis. University of Ioannina, Ioannina, Greece."},{"key":"e_1_3_2_1_20_1","first-page":"868","article-title":"SoK: A Taxonomy of Cryptocurrency Wallets","volume":"2020","author":"Karantias Kostis","year":"2020","unstructured":"Kostis Karantias . 2020 . SoK: A Taxonomy of Cryptocurrency Wallets . IACR Cryptology ePrint Archive 2020 (2020), 868 . Kostis Karantias. 2020. SoK: A Taxonomy of Cryptocurrency Wallets. IACR Cryptology ePrint Archive 2020 (2020), 868.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_21_1","volume-title":"Compact Storage of Superblocks for NIPoPoW Applications. In The 1st International Conference on Mathematical Research for Blockchain Economy. Springer Nature.","author":"Karantias Kostis","year":"2019","unstructured":"Kostis Karantias , Aggelos Kiayias , and Dionysis Zindros . 2019 . Compact Storage of Superblocks for NIPoPoW Applications. In The 1st International Conference on Mathematical Research for Blockchain Economy. Springer Nature. Kostis Karantias, Aggelos Kiayias, and Dionysis Zindros. 2019. Compact Storage of Superblocks for NIPoPoW Applications. In The 1st International Conference on Mathematical Research for Blockchain Economy. Springer Nature."},{"key":"e_1_3_2_1_22_1","volume-title":"Proof-of-Burn. In International Conference on Financial Cryptography and Data Security.","author":"Karantias Kostis","year":"2019","unstructured":"Kostis Karantias , Aggelos Kiayias , and Dionysis Zindros . 2019 . Proof-of-Burn. In International Conference on Financial Cryptography and Data Security. Kostis Karantias, Aggelos Kiayias, and Dionysis Zindros. 2019. Proof-of-Burn. In International Conference on Financial Cryptography and Data Security."},{"key":"e_1_3_2_1_23_1","volume-title":"Smart Contract Derivatives. In International Conference on Mathematical Research for Blockchain Economy. Imperial College London, Springer. https:\/\/eprint.iacr.org\/2020\/138","author":"Karantias Kostis","year":"2020","unstructured":"Kostis Karantias , Aggelos Kiayias , and Dionysis Zindros . 2020 . Smart Contract Derivatives. In International Conference on Mathematical Research for Blockchain Economy. Imperial College London, Springer. https:\/\/eprint.iacr.org\/2020\/138 .pdf Kostis Karantias, Aggelos Kiayias, and Dionysis Zindros. 2020. Smart Contract Derivatives. In International Conference on Mathematical Research for Blockchain Economy. Imperial College London, Springer. https:\/\/eprint.iacr.org\/2020\/138.pdf"},{"key":"e_1_3_2_1_24_1","volume-title":"Proof-of-Stake Sidechains. In IEEE Symposium on Security and Privacy. IEEE, IEEE.","author":"Kiayias Aggelos","year":"2019","unstructured":"Aggelos Kiayias , Peter Ga\u017ei , and Dionysis Zindros . 2019 . Proof-of-Stake Sidechains. In IEEE Symposium on Security and Privacy. IEEE, IEEE. Aggelos Kiayias, Peter Ga\u017ei, and Dionysis Zindros. 2019. Proof-of-Stake Sidechains. In IEEE Symposium on Security and Privacy. IEEE, IEEE."},{"key":"e_1_3_2_1_25_1","volume-title":"Proofs of Proofs of Work with Sublinear Complexity. In International Conference on Financial Cryptography and Data Security. Springer, 61--78","author":"Kiayias Aggelos","year":"2016","unstructured":"Aggelos Kiayias , Nikolaos Lamprou , and Aikaterini-Panagiota Stouka . 2016 . Proofs of Proofs of Work with Sublinear Complexity. In International Conference on Financial Cryptography and Data Security. Springer, 61--78 . Aggelos Kiayias, Nikolaos Lamprou, and Aikaterini-Panagiota Stouka. 2016. Proofs of Proofs of Work with Sublinear Complexity. In International Conference on Financial Cryptography and Data Security. Springer, 61--78."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Aggelos Kiayias Nikos Leonardos and Dionysis Zindros. 2020. Mining in Logarithmic Space. (2020). Unpublished Manuscript.  Aggelos Kiayias Nikos Leonardos and Dionysis Zindros. 2020. Mining in Logarithmic Space. (2020). Unpublished Manuscript.","DOI":"10.1145\/3460120.3484784"},{"key":"e_1_3_2_1_27_1","volume-title":"Non-Interactive Proofs of Proof-of-Work. In International Conference on Financial Cryptography and Data Security. Springer.","author":"Kiayias Aggelos","year":"2020","unstructured":"Aggelos Kiayias , Andrew Miller , and Dionysis Zindros . 2020 . Non-Interactive Proofs of Proof-of-Work. In International Conference on Financial Cryptography and Data Security. Springer. Aggelos Kiayias, Andrew Miller, and Dionysis Zindros. 2020. Non-Interactive Proofs of Proof-of-Work. In International Conference on Financial Cryptography and Data Security. Springer."},{"key":"e_1_3_2_1_28_1","volume-title":"Proof-of-Work Sidechains. In International Conference on Financial Cryptography and Data Security. Springer, Springer.","author":"Kiayias Aggelos","year":"2019","unstructured":"Aggelos Kiayias and Dionysis Zindros . 2019 . Proof-of-Work Sidechains. In International Conference on Financial Cryptography and Data Security. Springer, Springer. Aggelos Kiayias and Dionysis Zindros. 2019. Proof-of-Work Sidechains. In International Conference on Financial Cryptography and Data Security. Springer, Springer."},{"key":"e_1_3_2_1_29_1","volume-title":"Ethanos: Lightweight Bootstrapping for Ethereum. arXiv preprint arXiv:1911.05953","author":"Kim Jae-Yun","year":"2019","unstructured":"Jae-Yun Kim , Jun-Mo Lee , Yeon-Jae Koo , Sang-Hyeon Park , and Soo-Mook Moon . 2019 . Ethanos: Lightweight Bootstrapping for Ethereum. arXiv preprint arXiv:1911.05953 (2019). Jae-Yun Kim, Jun-Mo Lee, Yeon-Jae Koo, Sang-Hyeon Park, and Soo-Mook Moon. 2019. Ethanos: Lightweight Bootstrapping for Ethereum. arXiv preprint arXiv:1911.05953 (2019)."},{"key":"e_1_3_2_1_30_1","volume-title":"Proofs and refutations: The logic of mathematical discovery","author":"Lakatos Imre","unstructured":"Imre Lakatos . 2015. Proofs and refutations: The logic of mathematical discovery . Cambridge University Press . Imre Lakatos. 2015. Proofs and refutations: The logic of mathematical discovery. Cambridge University Press."},{"key":"e_1_3_2_1_31_1","volume-title":"RFC6962: Certificate Transparency. Request for Comments. IETF","author":"Laurie Ben","year":"2013","unstructured":"Ben Laurie , Adam Langley , and Emilia Kasper . 2013. RFC6962: Certificate Transparency. Request for Comments. IETF ( 2013 ). Ben Laurie, Adam Langley, and Emilia Kasper. 2013. RFC6962: Certificate Transparency. Request for Comments. IETF (2013)."},{"key":"e_1_3_2_1_32_1","unstructured":"Eric Lombrozo Johnson Lau and Pieter Wuille. 2015. BIP 0141: Segregated witness (consensus layer). Available at: https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0141.mediawiki.  Eric Lombrozo Johnson Lau and Pieter Wuille. 2015. BIP 0141: Segregated witness (consensus layer). Available at: https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0141.mediawiki."},{"key":"e_1_3_2_1_33_1","volume-title":"CODA: Decentralized Cryptocurrency at Scale.","author":"Meckler Izaak","year":"2018","unstructured":"Izaak Meckler and Evan Shapiro . 2018 . CODA: Decentralized Cryptocurrency at Scale. (2018). Izaak Meckler and Evan Shapiro. 2018. CODA: Decentralized Cryptocurrency at Scale. (2018)."},{"key":"e_1_3_2_1_34_1","volume-title":"Conference on the Theory and Application of Cryptographic Techniques. Springer, 369--378","author":"Merkle Ralph C","year":"1987","unstructured":"Ralph C Merkle . 1987 . A digital signature based on a conventional encryption function . In Conference on the Theory and Application of Cryptographic Techniques. Springer, 369--378 . Ralph C Merkle. 1987. A digital signature based on a conventional encryption function. In Conference on the Theory and Application of Cryptographic Techniques. Springer, 369--378."},{"key":"e_1_3_2_1_35_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto Satoshi","year":"2009","unstructured":"Satoshi Nakamoto . 2009 . Bitcoin: A peer-to-peer electronic cash system . http:\/\/www.bitcoin.org\/bitcoin.pdf Satoshi Nakamoto. 2009. Bitcoin: A peer-to-peer electronic cash system. http:\/\/www.bitcoin.org\/bitcoin.pdf"},{"key":"e_1_3_2_1_36_1","unstructured":"Ori Newman and Yonatan Sompolinsky. May 2021. FlyDAG. https:\/\/github.com\/kaspanet\/research\/issues\/3.  Ori Newman and Yonatan Sompolinsky. May 2021. FlyDAG. https:\/\/github.com\/kaspanet\/research\/issues\/3."},{"key":"e_1_3_2_1_37_1","unstructured":"Andrew Poelstra. 2016. Mimblewimble. (2016).  Andrew Poelstra. 2016. Mimblewimble. (2016)."},{"key":"e_1_3_2_1_38_1","first-page":"943","article-title":"Analysis of Nakamoto consensus","volume":"2019","author":"Ren Ling","year":"2019","unstructured":"Ling Ren . 2019 . Analysis of Nakamoto consensus . IACR Cryptology ePrint Archive 2019 (2019), 943 . Ling Ren. 2019. Analysis of Nakamoto consensus. IACR Cryptology ePrint Archive 2019 (2019), 943.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_39_1","volume-title":"Conference on the Theory and Application of Cryptology. Springer, 239--252","author":"Schnorr Claus-Peter","year":"1989","unstructured":"Claus-Peter Schnorr . 1989 . Efficient identification and signatures for smart cards . In Conference on the Theory and Application of Cryptology. Springer, 239--252 . Claus-Peter Schnorr. 1989. Efficient identification and signatures for smart cards. In Conference on the Theory and Application of Cryptology. Springer, 239--252."},{"key":"e_1_3_2_1_40_1","unstructured":"Peter Todd. October 2012. Merkle Mountain Ranges. https:\/\/github.com\/opentimestamps\/opentimestamps-server\/blob\/master\/doc\/merkle-mountain-range.md.  Peter Todd. October 2012. Merkle Mountain Ranges. https:\/\/github.com\/opentimestamps\/opentimestamps-server\/blob\/master\/doc\/merkle-mountain-range.md."},{"key":"e_1_3_2_1_41_1","unstructured":"Ying Tong Lai James Prestwich and Georgios Konstantopoulos. 2019. FlyClient - Consensus-Layer Changes. Available at: https:\/\/zips.z.cash\/zip-0221.  Ying Tong Lai James Prestwich and Georgios Konstantopoulos. 2019. FlyClient - Consensus-Layer Changes. Available at: https:\/\/zips.z.cash\/zip-0221."},{"key":"e_1_3_2_1_42_1","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood . 2014 . Ethereum: A secure decentralised generalised transaction ledger . Ethereum Project Yellow Paper 151 (2014), 1 -- 32 . Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151 (2014), 1--32.","journal-title":"Ethereum Project Yellow Paper"},{"key":"e_1_3_2_1_44_1","unstructured":"Alexei Zamyatin Mustafa Al-Bassam Dionysis Zindros Eleftherios Kokoris-Kogias Pedro Moreno-Sanchez Aggelos Kiayias and William J Knottenbelt. 2019. SoK: Communication across distributed ledgers.  Alexei Zamyatin Mustafa Al-Bassam Dionysis Zindros Eleftherios Kokoris-Kogias Pedro Moreno-Sanchez Aggelos Kiayias and William J Knottenbelt. 2019. SoK: Communication across distributed ledgers."},{"key":"e_1_3_2_1_45_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer. https:\/\/eprint.iacr.org\/2017\/963","author":"Zamyatin Alexei","year":"2018","unstructured":"Alexei Zamyatin , Nicholas Stifter , Aljosha Judmayer , Philipp Schindler , Edgar Weippl , William Knottenbelt , and Alexei Zamyatin . 2018 . A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice . In International Conference on Financial Cryptography and Data Security. Springer. https:\/\/eprint.iacr.org\/2017\/963 .pdf Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar Weippl, William Knottenbelt, and Alexei Zamyatin. 2018. A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice. In International Conference on Financial Cryptography and Data Security. Springer. https:\/\/eprint.iacr.org\/2017\/963.pdf"},{"key":"e_1_3_2_1_47_1","volume-title":"Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks. In International Conference on Financial Cryptography and Data Security. Springer, Springer.","author":"Zindros Dionysis","year":"2021","unstructured":"Dionysis Zindros . 2021 . Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks. In International Conference on Financial Cryptography and Data Security. Springer, Springer. Dionysis Zindros. 2021. Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks. In International Conference on Financial Cryptography and Data Security. Springer, Springer."}],"event":{"name":"AFT '21: 3rd ACM Conference on Advances in Financial Technologies","location":"Arlington Virginia","acronym":"AFT '21","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 3rd ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479722.3480999","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3479722.3480999","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:19:00Z","timestamp":1750191540000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479722.3480999"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,26]]},"references-count":45,"alternative-id":["10.1145\/3479722.3480999","10.1145\/3479722"],"URL":"https:\/\/doi.org\/10.1145\/3479722.3480999","relation":{},"subject":[],"published":{"date-parts":[[2021,9,26]]},"assertion":[{"value":"2021-11-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}