{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T20:17:40Z","timestamp":1764793060039,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031182822"},{"type":"electronic","value":"9783031182839"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-18283-9_35","type":"book-chapter","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T20:23:03Z","timestamp":1666383783000},"page":"694-704","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Short Paper: What Peer Announcements Tell Us About the\u00a0Size of\u00a0the\u00a0Bitcoin P2P Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1352-0625","authenticated-orcid":false,"given":"Matthias","family":"Grundmann","sequence":"first","affiliation":[]},{"given":"Hedwig","family":"Amberg","sequence":"additional","affiliation":[]},{"given":"Max","family":"Baumstark","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3441-3180","authenticated-orcid":false,"given":"Hannes","family":"Hartenstein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,22]]},"reference":[{"key":"35_CR1","doi-asserted-by":"publisher","unstructured":"Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of Clients in Bitcoin P2P Network. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 15\u201329. CCS 2014, Association for Computing Machinery, New York, NY, USA, November 2014. https:\/\/doi.org\/10.1145\/2660267.2660379","DOI":"10.1145\/2660267.2660379"},{"key":"35_CR2","unstructured":"Bitcoin-Developers: Bitcoin Reference (2019). https:\/\/developer.bitcoin.org\/reference\/index.html"},{"key":"35_CR3","unstructured":"Bitcoin-Developers: Bitcoin Glossary (2020). https:\/\/developer.bitcoin.org\/glossary.html"},{"key":"35_CR4","doi-asserted-by":"publisher","unstructured":"Delgado-Segura, S., P\u00e9rez-Sol\u00e0, C., Herrera-Joancomart\u00ed, J., Navarro-Arribas, G., Borrell, J.: Cryptocurrency Networks: A New P2P Paradigm. Mob. Inf. Syst. 2018(3), 1\u201316 (2018). https:\/\/doi.org\/10.1155\/2018\/2159082","DOI":"10.1155\/2018\/2159082"},{"key":"35_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-662-44774-1_7","volume-title":"Financial Cryptography and Data Security","author":"JA Donet Donet","year":"2014","unstructured":"Donet Donet, J.A., P\u00e9rez-Sol\u00e0, C., Herrera-Joancomart\u00ed, J.: The Bitcoin P2P network. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 87\u2013102. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44774-1_7"},{"key":"35_CR6","unstructured":"DSN: Bitcoin Network Monitoring (2021). https:\/\/dsn.kastel.kit.edu\/bitcoin\/"},{"key":"35_CR7","doi-asserted-by":"publisher","unstructured":"Franzoni, F., Daza, V.: Improving Bitcoin Transaction Propagation by Leveraging Unreachable Nodes. In: 2020 IEEE International Conference on Blockchain (Blockchain), pp. 196\u2013203 (2020). https:\/\/doi.org\/10.1109\/Blockchain50366.2020.00031","DOI":"10.1109\/Blockchain50366.2020.00031"},{"key":"35_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-662-46803-6_10","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"J Garay","year":"2015","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The Bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281\u2013310. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46803-6_10"},{"key":"35_CR9","unstructured":"Grundmann, M., Amberg, H., Hartenstein, H.: On the estimation of the number of unreachable peers in the Bitcoin P2P network by observation of peer announcements. arXiv preprint arXiv:2102.12774 (2021)"},{"key":"35_CR10","doi-asserted-by":"publisher","unstructured":"Grundmann, M., Baumstark, M., Hartenstein, H.: On the peer degree distribution of the Bitcoin P2P network. In: 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1\u20135 (2022). https:\/\/doi.org\/10.1109\/ICBC54727.2022.9805511","DOI":"10.1109\/ICBC54727.2022.9805511"},{"key":"35_CR11","unstructured":"Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on Bitcoin\u2019s peer-to-peer network. In: Proceedings of the 24th USENIX Conference on Security Symposium, pp. 129\u2013144. SEC2015, USENIX Association, USA (2015)"},{"issue":"2","key":"35_CR12","doi-asserted-by":"publisher","first-page":"1598","DOI":"10.1109\/TNSM.2021.3050428","volume":"18","author":"MA Imtiaz","year":"2021","unstructured":"Imtiaz, M.A., Starobinski, D., Trachtenberg, A., Younis, N.: Churn in the Bitcoin Network. IEEE Trans. Netw. Serv. Manage. 18(2), 1598\u20131615 (2021). https:\/\/doi.org\/10.1109\/TNSM.2021.3050428","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"35_CR13","unstructured":"Nick, J.: Guessing Bitcoin\u2019s P2P Connections (2015). https:\/\/jonasnick.github.io\/blog\/2015\/03\/06\/guessing-bitcoins-p2p-connections\/"},{"key":"35_CR14","unstructured":"van der Laan, W.J.: BIP 155: addrv2 message (2019). https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0155.mediawiki"},{"key":"35_CR15","unstructured":"Luke-Jr: Bitcoin Node Count History (2021). https:\/\/luke.dashjr.org\/programs\/bitcoin\/files\/charts\/historical.html"},{"key":"35_CR16","unstructured":"Miller, A., et al.: Discovering Bitcoin\u2019s Public Topology and Influential Nodes (2015)"},{"key":"35_CR17","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. Tech. rep. (2008)"},{"key":"35_CR18","doi-asserted-by":"publisher","unstructured":"Naumenko, G., Maxwell, G., Wuille, P., Fedorova, A., Beschastnikh, I.: Erlay: efficient transaction relay for Bitcoin. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS 2019, pp. 817\u2013831. ACM Press, London, United Kingdom (2019). https:\/\/doi.org\/10.1145\/3319535.3354237","DOI":"10.1145\/3319535.3354237"},{"key":"35_CR19","doi-asserted-by":"publisher","unstructured":"Neudecker, T., Andelfinger, P., Hartenstein, H.: Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network. In: Proceedings of the 13th IEEE International Conference on Advanced and Trusted Computing, pp. 358\u2013367 (2016). https:\/\/doi.org\/10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0070","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0070"},{"key":"35_CR20","doi-asserted-by":"publisher","unstructured":"Neudecker, T.: Characterization of the Bitcoin Peer-to-Peer Network (2015\u20132018) (2019). https:\/\/doi.org\/10.5445\/IR\/1000091933","DOI":"10.5445\/IR\/1000091933"},{"key":"35_CR21","doi-asserted-by":"publisher","first-page":"57009","DOI":"10.1109\/ACCESS.2019.2914098","volume":"7","author":"S Park","year":"2019","unstructured":"Park, S., Im, S., Seol, Y., Paek, J.: Nodes in the Bitcoin network: comparative measurement study and survey. IEEE Access 7, 57009\u201357022 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2914098","journal-title":"IEEE Access"},{"key":"35_CR22","doi-asserted-by":"publisher","unstructured":"Shahsavari, Y., Zhang, K., Talhi, C.: A theoretical model for block propagation analysis in Bitcoin network. IEEE Trans. Eng. Manage. PP(99), 1\u201318 (2020). https:\/\/doi.org\/10.1109\/TEM.2020.2989170","DOI":"10.1109\/TEM.2020.2989170"},{"key":"35_CR23","doi-asserted-by":"publisher","unstructured":"Tange, O.: GNU Parallel 20200522 (\u2018Kraftwerk\u2019) (2020). https:\/\/doi.org\/10.5281\/zenodo.3841377","DOI":"10.5281\/zenodo.3841377"},{"key":"35_CR24","unstructured":"Wang, L., Pustogarov, I.: Towards Better Understanding of Bitcoin Unreachable Peers. arXiv preprint arXiv:1709.06837 (2017)"},{"key":"35_CR25","unstructured":"Yeow, A.: Bitnodes (2021). https:\/\/bitnodes.io"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-18283-9_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T20:29:20Z","timestamp":1666384160000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-18283-9_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031182822","9783031182839"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-18283-9_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"22 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc22.ifca.ai\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Hotcrp","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}