{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:01:04Z","timestamp":1730286064790,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/noms.2018.8406309","type":"proceedings-article","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T23:09:23Z","timestamp":1531177763000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["DLCP: A protocol for securing light client operation in blockchains"],"prefix":"10.1109","author":[{"given":"Leonardo da","family":"Costa","sequence":"first","affiliation":[]},{"given":"Andre","family":"Neto","sequence":"additional","affiliation":[]},{"given":"Billy","family":"Pinheiro","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Araujo","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Abelem","sequence":"additional","affiliation":[]},{"given":"Weverton","family":"Cordeiro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2008","journal-title":"Available"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664267"},{"key":"ref10","first-page":"156","article-title":"Threshold-optimal DSA\/ECDSA signatures and an application to bitcoin wallet security","author":"gennaro","year":"2016","journal-title":"ACNS 2016"},{"journal-title":"Available","article-title":"A next-generation smart contract and decentralized application platform","year":"2017","key":"ref6"},{"key":"ref11","first-page":"522","article-title":"A threshold cryptosystem without a trusted party (extended abstract)","author":"pedersen","year":"1991","journal-title":"Advances in Cryptology-EUROCRYPT '91 Workshop on the Theory and Application of Cryptographic Techniques"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2008.139"},{"key":"ref8","first-page":"1062","article-title":"Catena: Preventing lies with bitcoin","volume":"2016","author":"tomescu","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_3"},{"key":"ref2","article-title":"Sok: Research perspectives and chal-lenges for bitcoin and cryptocur-rencies","author":"bonneau","year":"2015","journal-title":"SP 2015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660327"},{"key":"ref1","first-page":"181","article-title":"Blockstack: A global naming and storage system secured by blockchains","author":"ali","year":"2016","journal-title":"2016 USENIX Annual Technical Conference USENIX ATC 2016"}],"event":{"name":"NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2018,4,23]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2018,4,27]]}},"container-title":["NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8399136\/8406102\/08406309.pdf?arnumber=8406309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T14:30:42Z","timestamp":1643207442000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8406309\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/noms.2018.8406309","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}