{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:33:11Z","timestamp":1772641991613,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030249069","type":"print"},{"value":"9783030249076","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_20","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T19:02:46Z","timestamp":1562785366000},"page":"261-276","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Characteristics of Bitcoin Transactions on Cryptomarkets"],"prefix":"10.1007","author":[{"given":"Xucan","family":"Chen","sequence":"first","affiliation":[]},{"given":"Mohammad Al","family":"Hasan","sequence":"additional","affiliation":[]},{"given":"Xintao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Pavel","family":"Skums","sequence":"additional","affiliation":[]},{"given":"Mohammad Javad","family":"Feizollahi","sequence":"additional","affiliation":[]},{"given":"Marie","family":"Ouellet","sequence":"additional","affiliation":[]},{"given":"Eric L.","family":"Sevigny","sequence":"additional","affiliation":[]},{"given":"David","family":"Maimon","sequence":"additional","affiliation":[]},{"given":"Yubao","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"20_CR1","unstructured":"Bitcoin-blockchain-parser. \n                    https:\/\/github.com\/alecalve\/python-bitcoin-blockchain-parser\n                    \n                  . Accessed 10 Mar 2019"},{"key":"20_CR2","unstructured":"Bitcoin core. \n                    https:\/\/bitcoin.org\/en\/bitcoin-core\/\n                    \n                  . Accessed 10 Mar 2019"},{"key":"20_CR3","unstructured":"Five surprising facts about bitcoin. \n                    https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2013\/08\/21\/five-surprising-facts-about-bitcoin\n                    \n                  . Accessed 10 Mar 2019"},{"key":"20_CR4","unstructured":"How bitcoin lets you spy on careless companies. \n                    http:\/\/https:\/\/web.archive.org\/web\/20140209202222\/www.wired.co.uk\/news\/archive\/2013-06\/06\/bitcoin-retail\n                    \n                  . Accessed 10 Mar 2019"},{"key":"20_CR5","unstructured":"How to parse the bitcoin blockchain. \n                    http:\/\/codesuppository.blogspot.com\/2014\/01\/how-to-parse-bitcoin-blockchain.html\n                    \n                  . Accessed 10 Mar 2019"},{"key":"20_CR6","unstructured":"Mapping the bitcoin economy could reveal users\u2019 identities. \n                    https:\/\/www.technologyreview.com\/s\/518816\n                    \n                  . Accessed 10 Mar 2019"},{"key":"20_CR7","unstructured":"Running a full node. \n                    https:\/\/bitcoin.org\/en\/full-node#what-is-a-full-node\n                    \n                  . Accessed 10 Mar 2019"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-39884-1_4","volume-title":"Financial Cryptography and Data Security","author":"E Androulaki","year":"2013","unstructured":"Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34\u201351. Springer, Heidelberg (2013). \n                    https:\/\/doi.org\/10.1007\/978-3-642-39884-1_4"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-319-70290-2_18","volume-title":"Secure IT Systems","author":"T Balthasar de","year":"2017","unstructured":"de Balthasar, T., Hernandez-Castro, J.: An analysis of bitcoin laundry services. In: Lipmaa, H., Mitrokotsa, A., Matulevi\u010dius, R. (eds.) NordSec 2017. LNCS, vol. 10674, pp. 297\u2013312. Springer, Cham (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-70290-2_18"},{"key":"20_CR10","unstructured":"Fleder, M., Kester, M.S., Pillai, S.: Bitcoin transaction graph analysis. arXiv preprint \n                    arXiv:1502.01657\n                    \n                   (2015)"},{"issue":"6","key":"20_CR11","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/3132696","volume":"61","author":"D Genkin","year":"2018","unstructured":"Genkin, D., Papadopoulos, D., Papamanthou, C.: Privacy in decentralized cryptocurrencies. Commun. ACM 61(6), 78\u201388 (2018)","journal-title":"Commun. ACM"},{"key":"20_CR12","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.drugpo.2017.05.052","volume":"46","author":"M Gilbert","year":"2017","unstructured":"Gilbert, M., Dasgupta, N.: Silicon to syringe: cryptomarkets and disruptive innovation in opioid supply chains. Int. J. Drug Policy 46, 160\u2013167 (2017)","journal-title":"Int. J. Drug Policy"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Harrigan, M., Fretter, C.: The unreasonable effectiveness of address clustering. In: 2016 International IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld), pp. 368\u2013373. IEEE (2016)","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0071"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., et al.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127\u2013140. ACM (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"20_CR15","unstructured":"Nakamoto, S., et al.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013). \n                    https:\/\/doi.org\/10.1007\/978-3-642-39884-1_2"},{"key":"20_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-319-11212-1_20","volume-title":"Computer Security - ESORICS 2014","author":"T Ruffing","year":"2014","unstructured":"Ruffing, T., Moreno-Sanchez, P., Kate, A.: CoinShuffle: practical decentralized coin mixing for bitcoin. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8713, pp. 345\u2013364. Springer, Cham (2014). \n                    https:\/\/doi.org\/10.1007\/978-3-319-11212-1_20"},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-662-45472-5_29","volume-title":"Financial Cryptography and Data Security","author":"M Spagnuolo","year":"2014","unstructured":"Spagnuolo, M., Maggi, F., Zanero, S.: BitIodine: extracting intelligence from the bitcoin network. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 457\u2013468. Springer, Heidelberg (2014). \n                    https:\/\/doi.org\/10.1007\/978-3-662-45472-5_29"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Ziegeldorf, J.H., Grossmann, F., Henze, M., Inden, N., Wehrle, K.: CoinParty: secure multi-party mixing of bitcoins. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 75\u201386. ACM (2015)","DOI":"10.1145\/2699026.2699100"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T19:06:17Z","timestamp":1562785577000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}