{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T22:21:48Z","timestamp":1750026108943,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030366902"},{"type":"electronic","value":"9783030366919"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-36691-9_20","type":"book-chapter","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T17:02:52Z","timestamp":1576515772000},"page":"232-242","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Detecting Brute-Force Attacks on\u00a0Cryptocurrency Wallets"],"prefix":"10.1007","author":[{"given":"E. O.","family":"Kiktenko","sequence":"first","affiliation":[]},{"given":"M. A.","family":"Kudinov","sequence":"additional","affiliation":[]},{"given":"A. K.","family":"Fedorov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,17]]},"reference":[{"key":"20_CR1","volume-title":"Blockchain: Blueprint for a New Economy","author":"M Swan","year":"2015","unstructured":"Swan, M.: Blockchain: Blueprint for a New Economy. O\u2019Reilly Media Inc., Sebastopol (2015)"},{"unstructured":"White, J.H.: The blockchain: a gentle four page introduction, \narXiv:1612.06244","key":"20_CR2"},{"key":"20_CR3","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1038\/nature23461","volume":"549","author":"DJ Bernstein","year":"2017","unstructured":"Bernstein, D.J., Lange, T.: Post-quantum cryptography. Nature 549, 188\u2013194 (2017)","journal-title":"Nature"},{"key":"20_CR4","volume-title":"Applied Cryptography","author":"B Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography. John Wiley & Sons, New York (1996)"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-540-24654-1_13","volume-title":"Selected Areas in Cryptography","author":"H Gilbert","year":"2004","unstructured":"Gilbert, H., Handschuh, H.: Security analysis of SHA-256 and sisters. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 175\u2013193. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-24654-1_13"},{"unstructured":"Nakamoto S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)","key":"20_CR6"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.33166\/AETiC.2018.01.001","volume":"2","author":"MH Miraz","year":"2018","unstructured":"Miraz, M.H., Ali, M.: Applications of blockchain technology beyond cryptocurrency. AETiC 2, 1\u20136 (2018)","journal-title":"AETiC"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete log and factoring. SIAM J. Comput. 26, 1484 (1997)","journal-title":"SIAM J. Comput."},{"doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of 28th Annual ACM Symposium on the Theory of Computing, p. 212. ACM, New York (1996)","key":"20_CR9","DOI":"10.1145\/237814.237866"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1038\/d41586-018-07449-z","volume":"563","author":"AK Fedorov","year":"2018","unstructured":"Fedorov, A.K., Kiktenko, E.O., Lvovksy, A.I.: Quantum computers put blockchain security at risk. Nature 563, 465\u2013467 (2018)","journal-title":"Nature"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"68","DOI":"10.5195\/LEDGER.2018.127","volume":"3","author":"D Aggarwal","year":"2018","unstructured":"Aggarwal, D., Brennen, G.K., Lee, T., Santha, M., Tomamichel, M.: Quantum attacks on Bitcoin, and how to protect against them. Ledger 3, 68\u201390 (2018)","journal-title":"Ledger"},{"unstructured":"Large Bitcoin Collider. \nhttps:\/\/lbc.cryptoguru.org\/\n\n. Accessed 14 Apr 2019","key":"20_CR12"},{"doi-asserted-by":"crossref","unstructured":"Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems. Future Gener. Comput. Syst. (2017). \nhttps:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X17318332?via=ihub","key":"20_CR13","DOI":"10.1016\/j.future.2017.08.020"},{"unstructured":"Moubarak, J., Filiol, E., Chamoun, M.: On blockchain security and relevant attacks. In: IEEE Middle East and North Africa Communications Conference (MENACOMM), Jounieh, 2018, pp. 1\u20136 (2018)","key":"20_CR14"},{"key":"20_CR15","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/138859.138865","volume":"35","author":"S Vanstone","year":"1992","unstructured":"Vanstone, S.: Responses to NIST proposal. Commun. ACM 35, 50\u201352 (1992)","journal-title":"Commun. ACM"},{"unstructured":"Secp256k1 standard for ECDSA. \nhttps:\/\/en.bitcoin.it\/wiki\/Secp256k1\n\n. Accessed 11 Apr 2019","key":"20_CR16"},{"unstructured":"Base58Check encoding description. \nhttps:\/\/en.bitcoin.it\/wiki\/Base58Check_encoding\n\n. Accessed 11 Apr 2019","key":"20_CR17"},{"key":"20_CR18","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1007\/s10623-015-0094-2","volume":"77","author":"N Koblitz","year":"2015","unstructured":"Koblitz, N., Menezes, A.J.: The random oracle model: a twenty-year retrospective. Des. Codes Cryptogr. 77, 587\u2013610 (2015)","journal-title":"Des. Codes Cryptogr."},{"key":"20_CR19","volume-title":"An Introduction to Probability Theory and Its Applications","author":"W Feller","year":"1968","unstructured":"Feller, W.: An Introduction to Probability Theory and Its Applications, vol. 1, 3rd edn. Wiley, USA (1968)","edition":"3"}],"container-title":["Lecture Notes in Business Information Processing","Business Information Systems Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36691-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,17]],"date-time":"2019-12-17T05:12:12Z","timestamp":1576559532000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-36691-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030366902","9783030366919"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36691-9_20","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"17 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seville","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/bis.ue.poznan.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"223","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"From the BIS workshops 57 papers were accepted from 139 submissions","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}