{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:29:24Z","timestamp":1742992164283,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031211300"},{"type":"electronic","value":"9783031211317"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-21131-7_39","type":"book-chapter","created":{"date-parts":[[2023,1,25]],"date-time":"2023-01-25T18:04:15Z","timestamp":1674669855000},"page":"495-508","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Analysis of\u00a0Bitcoin Dust Through Authenticated Queries"],"prefix":"10.1007","author":[{"given":"Matteo","family":"Loporchio","sequence":"first","affiliation":[]},{"given":"Anna","family":"Bernasconi","sequence":"additional","affiliation":[]},{"given":"Damiano","family":"Di Francesco Maesa","sequence":"additional","affiliation":[]},{"given":"Laura","family":"Ricci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,26]]},"reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"Bartoletti, M., Pompianu, L.: An analysis of Bitcoin OP_RETURN metadata. In: Financial Cryptography and Data Security. pp. 218\u2013230. Springer International Publishing, Cham (2017)","DOI":"10.1007\/978-3-319-70278-0_14"},{"key":"39_CR2","unstructured":"Bitcoin Wiki.: Privacy\u2014forced address reuse. https:\/\/en.bitcoin.it\/wiki\/Privacy#Forced_address_reuse. Accessed 12 June 2022"},{"key":"39_CR3","unstructured":"Bitcoin Wiki.: Satoshi Dice. https:\/\/en.bitcoin.it\/wiki\/Satoshi_Dice. Accessed 12 June 2022"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Delgado-Segura, S., P\u00e9rez-Sol\u00e0, C., Navarro-Arribas, G., Herrera-Joancomart\u00ed, J.: Analysis of the Bitcoin UTXO set. In: Financial Cryptography and Data Security. pp. 78\u201391. Springer Berlin Heidelberg, Berlin, Heidelberg (2019)","DOI":"10.1007\/978-3-662-58820-8_6"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Kumar, A., Lafourcade, P., Lauradoux, C.: Performances of cryptographic accumulators. In: IEEE 39th Conference on Local Computer Networks, LCN 2014, Edmonton, AB, Canada, 8\u201311 Sept 2014. pp. 366\u2013369. IEEE Computer Society (2014)","DOI":"10.1109\/LCN.2014.6925793"},{"key":"39_CR6","doi-asserted-by":"publisher","first-page":"163363","DOI":"10.1109\/ACCESS.2021.3132990","volume":"9","author":"M Loporchio","year":"2021","unstructured":"Loporchio, M., Bernasconi, A., Di Francesco Maesa, D., Ricci, L.: Authenticating spatial queries on blockchain systems. IEEE Access 9, 163363\u2013163378 (2021)","journal-title":"IEEE Access"},{"key":"39_CR7","unstructured":"Menezes, A., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1996)"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: Protocols for public key cryptosystems. In: Proceedings of the 1980 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 14\u201316, 1980. pp. 122\u2013134. IEEE Computer Society (1980)","DOI":"10.1109\/SP.1980.10006"},{"key":"39_CR9","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf (2008). Accessed 12 June 2022"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Tamassia, R.: Authenticated data structures. In: Algorithms \u2014 ESA 2003, 11th Annual European Symposium, Budapest, Hungary, 16\u201319 Sept 2003. Proceedings. Lecture Notes in Computer Science, vol. 2832, pp. 2\u20135. Springer (2003)","DOI":"10.1007\/978-3-540-39658-1_2"},{"key":"39_CR11","unstructured":"The Bitcoin Core developers: Bitcoin Dust Limit. https:\/\/github.com\/bitcoin\/bitcoin\/blob\/c536dfbcb00fb15963bf5d507b7017c241718bf6\/src\/policy\/policy.cpp. Accessed 12 June 2022"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Wang, Y., Yang, J., Li, T., Zhu, F., Zhou, X.: Anti-dust: a method for identifying and preventing blockchain\u2019s dust attacks. In: 2018 International Conference on Information Systems and Computer Aided Education (ICISCAE). pp. 274\u2013280 (2018)","DOI":"10.1109\/ICISCAE.2018.8666834"},{"issue":"2014","key":"39_CR13","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Paper 151(2014), 1\u201332 (2014)","journal-title":"Ethereum Proj. Yellow Paper"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"Xie, M., Wang, H., Yin, J., Meng, X.: Providing freshness guarantees for outsourced databases. In: EDBT 2008, 11th International Conference on Extending Database Technology, Nantes, France, 25\u201329 March 2008, Proceedings. ACM International Conference Proceeding Series, vol. 261, pp. 323\u2013332. ACM (2008)","DOI":"10.1145\/1353343.1353384"},{"key":"39_CR15","doi-asserted-by":"crossref","unstructured":"Xu, C., Zhang, C., Xu, J.: vChain: enabling verifiable boolean range queries over blockchain databases. In: Proceedings of the 2019 International Conference on Management of Data, SIGMOD Conference 2019, Amsterdam, The Netherlands, 30 June \u2013 5 July 2019. pp. 141\u2013158. ACM (2019)","DOI":"10.1145\/3299869.3300083"},{"issue":"3","key":"39_CR16","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/s00778-008-0113-2","volume":"18","author":"Y Yang","year":"2009","unstructured":"Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Authenticated indexing for outsourced spatial databases. VLDB J. 18(3), 631\u2013648 (2009)","journal-title":"VLDB J."},{"key":"39_CR17","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Zhang, Z., Jin, C., Zhou, A.: Enabling generic verifiable aggregate query on blockchain systems. In: 26th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2020, Hong Kong, 2\u20134 Dec 2020. pp. 456\u2013465. IEEE (2020)","DOI":"10.1109\/ICPADS51040.2020.00066"}],"container-title":["Studies in Computational Intelligence","Complex Networks and Their Applications XI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21131-7_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,25]],"date-time":"2023-01-25T18:09:09Z","timestamp":1674670149000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21131-7_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031211300","9783031211317"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21131-7_39","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COMPLEX NETWORKS 2016","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Complex Networks and Their Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Palermo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwcna2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.complexnetworks.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}