{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T09:50:25Z","timestamp":1775296225556,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030054137","type":"print"},{"value":"9783030054144","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T00:00:00Z","timestamp":1543968000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-05414-4_44","type":"book-chapter","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T17:32:48Z","timestamp":1543944768000},"page":"547-558","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["The Graph Structure of Bitcoin"],"prefix":"10.1007","author":[{"given":"Damiano","family":"Di Francesco Maesa","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Marino","sequence":"additional","affiliation":[]},{"given":"Laura","family":"Ricci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"key":"44_CR1","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: International Conference on Financial Cryptography and Data Security, pp. 34\u201351. Springer (2013)","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"44_CR2","unstructured":"Blockchain Info Tags: https:\/\/blockchain.info\/tags"},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE Symposium on Security and Privacy (SP), pp. 104\u2013121. IEEE (2015)","DOI":"10.1109\/SP.2015.14"},{"issue":"1\u20136","key":"44_CR4","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/S1389-1286(00)00083-9","volume":"33","author":"A Broder","year":"2000","unstructured":"Broder, A., et al.: Graph structure in the web. Comput. Netw. 33(1\u20136), 309\u2013320 (2000)","journal-title":"Comput. Netw."},{"key":"44_CR5","doi-asserted-by":"crossref","unstructured":"Di Francesco Maesa, D., Marino, A., Ricci, : L.: Uncovering the bitcoin blockchain: an analysis of the full users graph. In: 2016 IEEE International Conference on Data Science and Advanced Analytices (DSAA), pp. 537\u2013546. IEEE (2016)","DOI":"10.1109\/DSAA.2016.52"},{"key":"44_CR6","doi-asserted-by":"crossref","unstructured":"Di Francesco Maesa, D., Marino, A.: Data-driven analysis of bitcoin properties: exploiting the users graph. Int. J. Data Sci. Anal. 1\u201318 (2017)","DOI":"10.1007\/s41060-017-0074-x"},{"key":"44_CR7","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.osnem.2017.10.006","volume":"3","author":"D Di Francesco Maesa","year":"2017","unstructured":"Di Francesco Maesa, D., Marino, A., Ricci, L.: Detecting artificial behaviours in the bitcoin users graph. Online Soc. Netw. Media 3, 63\u201374 (2017)","journal-title":"Online Soc. Netw. Media"},{"issue":"22","key":"44_CR8","doi-asserted-by":"crossref","first-page":"224,017","DOI":"10.1088\/1751-8113\/41\/22\/224017","volume":"41","author":"D Donato","year":"2008","unstructured":"Donato, D., Leonardi, S., Millozzi, S., Tsaparas, P.: Mining the inner structure of the web graph. J. Phys. A: Math. Theor. 41(22), 224,017 (2008)","journal-title":"J. Phys. A: Math. Theor."},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Fergal, R., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Proceeding of 2011 PASSAT\/SocialCom 2011, pp. 1318\u20131326. IEEE (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.79"},{"key":"44_CR10","doi-asserted-by":"crossref","unstructured":"Harrigan, M., Fretter, C.: The unreasonable effectiveness of address clustering. In: 13th IEEE International Conference on Advanced and Trusted Computing (ATC 2016) (2016)","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0071"},{"issue":"2","key":"44_CR11","doi-asserted-by":"crossref","first-page":"e86,197","DOI":"10.1371\/journal.pone.0086197","volume":"9","author":"D Kondor","year":"2014","unstructured":"Kondor, D., P\u00f3sfai, M., Csabai, I., Vattay, G.: Do the rich get richer? an empirical analysis of the bitcoin transaction network. PloS one 9(2), e86,197 (2014)","journal-title":"PloS one"},{"issue":"1","key":"44_CR12","doi-asserted-by":"crossref","first-page":"20160301","DOI":"10.3390\/fi8010007","volume":"8","author":"M Lischke","year":"2016","unstructured":"Lischke, M.: Analyzing the bitcoin network: The first four years. Futur. Internet 8(1), 20160301 (2016)","journal-title":"Futur. Internet"},{"issue":"2","key":"44_CR13","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1089\/big.2015.0056","volume":"4","author":"D McGinn","year":"2016","unstructured":"McGinn, D., Birch, D., Akroyd, D., Molina-Solana, M., Guo, Y., Knottenbelt, W.J.: Visualizing dynamic bitcoin transaction patterns. Big data 4(2), 109\u2013119 (2016)","journal-title":"Big data"},{"key":"44_CR14","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., et al.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Internet Measurement Conference, IMC 2013, Barcelona, Spain, 23\u201325 Oct 2013, pp. 127\u2013140 (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"Meusel, R., Vigna, S., Lehmberg, O., Bizer, : C.: Graph structure in the web\u2013revisited: a trick of the heavy tail. In: Proceedings of the 23rd International Conference on World Wide Wed, pp. 427\u2013432. ACM (2014)","DOI":"10.1145\/2567948.2576928"},{"key":"44_CR16","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)"},{"key":"44_CR17","doi-asserted-by":"crossref","unstructured":"Popuri, M.K., Gunes, M.H.: empirical analysis of crypto currencies. In: 7th Workshop on Complex Networks (CompleNet), Dijon, France, 23\u201325 Mar 2016 (2016)","DOI":"10.1007\/978-3-319-30569-1_21"},{"key":"44_CR18","doi-asserted-by":"crossref","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Financial Cryptography and Data Security - 17th International Conference, FC 2013, Okinawa, Japan, 1\u20135 Apr 2013. Revised Selected Papers, pp. 6\u201324 (2013)","DOI":"10.1007\/978-3-642-39884-1_2"}],"container-title":["Studies in Computational Intelligence","Complex Networks and Their Applications VII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05414-4_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T09:01:51Z","timestamp":1775293311000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05414-4_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,5]]},"ISBN":["9783030054137","9783030054144"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05414-4_44","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"value":"1860-949X","type":"print"},{"value":"1860-9503","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,5]]},"assertion":[{"value":"COMPLEX NETWORKS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Complex Networks and their Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cambridge","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwcna2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.complexnetworks.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}