{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:52:29Z","timestamp":1774122749727,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T00:00:00Z","timestamp":1648166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Beijing Natural Science Foundation","award":["M21032"],"award-info":[{"award-number":["M21032"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,3,25]]},"DOI":"10.1145\/3532640.3532646","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T14:04:53Z","timestamp":1657202693000},"page":"37-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Dos and Don\u2019ts in Blockchain Research and Development"],"prefix":"10.1145","author":[{"given":"Wenbing","family":"Zhao","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Cleveland State University, USA"}]},{"given":"Shunkun","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Reliability and Systems Engineering, Beihang University, China"}]},{"given":"Xiong","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing, China"}]},{"given":"Jiong","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Humanities, Economics, and Law, Northwestern Polytechnical University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI.2017.34"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3390566.3391673"},{"key":"e_1_3_2_1_3_1","volume-title":"Mastering bitcoin: Programming the open blockchain. O\u2019Reilly Media","author":"Antonopoulos M","unstructured":"Andreas\u00a0 M Antonopoulos . 2017. Mastering bitcoin: Programming the open blockchain. O\u2019Reilly Media , Inc., Sebastopol, CA. Andreas\u00a0M Antonopoulos. 2017. Mastering bitcoin: Programming the open blockchain. O\u2019Reilly Media, Inc., Sebastopol, CA."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_10"},{"key":"e_1_3_2_1_5_1","unstructured":"Vitalik Buterin 2013. Ethereum white paper. https:\/\/ethereum.org\/en\/whitepaper\/.  Vitalik Buterin 2013. Ethereum white paper. https:\/\/ethereum.org\/en\/whitepaper\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Vitalik Buterin and Virgil Griffith. 2017. Casper the friendly finality gadget. (2017).  Vitalik Buterin and Virgil Griffith. 2017. Casper the friendly finality gadget. (2017)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Quynh Dang. 2015. Secure Hash Stadard. https:\/\/doi.org\/10.6028\/NIST.FIPS.180-4 Federal Inf. Process. Stds.  Quynh Dang. 2015. Secure Hash Stadard. https:\/\/doi.org\/10.6028\/NIST.FIPS.180-4 Federal Inf. Process. Stds.","DOI":"10.6028\/NIST.FIPS.180-4"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"e_1_3_2_1_10_1","volume-title":"Guide to elliptic curve cryptography","author":"Hankerson Darrel","unstructured":"Darrel Hankerson , Alfred\u00a0 J Menezes , and Scott Vanstone . 2006. Guide to elliptic curve cryptography . Springer Science & Business Media , Berlin . Darrel Hankerson, Alfred\u00a0J Menezes, and Scott Vanstone. 2006. Guide to elliptic curve cryptography. Springer Science & Business Media, Berlin."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"e_1_3_2_1_13_1","first-page":"18","article-title":"Paxos made simple","volume":"32","author":"Lamport Leslie","year":"2001","unstructured":"Leslie Lamport 2001 . Paxos made simple . ACM Sigact News 32 , 4 (2001), 18 \u2013 25 . Leslie Lamport 2001. Paxos made simple. ACM Sigact News 32, 4 (2001), 18\u201325.","journal-title":"ACM Sigact News"},{"key":"e_1_3_2_1_14_1","volume-title":"Conference on the theory and application of cryptographic techniques. Springer-Verlag","author":"Merkle C","year":"1987","unstructured":"Ralph\u00a0 C Merkle . 1987 . A digital signature based on a conventional encryption function . In Conference on the theory and application of cryptographic techniques. Springer-Verlag , Berlin, 369\u2013378. Ralph\u00a0C Merkle. 1987. A digital signature based on a conventional encryption function. In Conference on the theory and application of cryptographic techniques. Springer-Verlag, Berlin, 369\u2013378."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1994.302392"},{"key":"e_1_3_2_1_16_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558989_19"},{"key":"e_1_3_2_1_18_1","volume-title":"Annual International Cryptology Conference. Springer","author":"Rackoff Charles","year":"1991","unstructured":"Charles Rackoff and Daniel\u00a0 R Simon . 1991 . Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack . In Annual International Cryptology Conference. Springer , Berlin, 433\u2013444. Charles Rackoff and Daniel\u00a0R Simon. 1991. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In Annual International Cryptology Conference. Springer, Berlin, 433\u2013444."},{"key":"e_1_3_2_1_19_1","unstructured":"Fabian Vogelsteller and Vitalik Buterin. 2015. EIP-20: Token Standard. https:\/\/eips.ethereum.org\/EIPS\/eip-20.  Fabian Vogelsteller and Vitalik Buterin. 2015. EIP-20: Token Standard. https:\/\/eips.ethereum.org\/EIPS\/eip-20."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896108"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/17445760.2015.1078802"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.11.006"},{"key":"e_1_3_2_1_23_1","volume-title":"From Traditional Fault Tolerance to Blockchain","author":"Zhao Wenbing","unstructured":"Wenbing Zhao . 2021. From Traditional Fault Tolerance to Blockchain . John Wiley & Sons, Hoboken, NJ , USA. Wenbing Zhao. 2021. From Traditional Fault Tolerance to Blockchain. John Wiley & Sons, Hoboken, NJ, USA."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3014864"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3390566.3391672"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320154.3320162"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartIoT49966.2020.00038"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460537.3460547"}],"event":{"name":"ICBCT'22: The 2022 4th International Conference on Blockchain Technology","location":"Shanghai China","acronym":"ICBCT'22"},"container-title":["The 2022 4th International Conference on Blockchain Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532640.3532646","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3532640.3532646","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:04Z","timestamp":1750182664000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532640.3532646"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,25]]},"references-count":28,"alternative-id":["10.1145\/3532640.3532646","10.1145\/3532640"],"URL":"https:\/\/doi.org\/10.1145\/3532640.3532646","relation":{},"subject":[],"published":{"date-parts":[[2022,3,25]]},"assertion":[{"value":"2022-07-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}