{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T10:35:19Z","timestamp":1760524519129,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031324147"},{"type":"electronic","value":"9783031324154"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-32415-4_12","type":"book-chapter","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T20:25:45Z","timestamp":1689971145000},"page":"164-194","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["User-Perceived Privacy in\u00a0Blockchain"],"prefix":"10.1007","author":[{"given":"Simin","family":"Ghesmati","sequence":"first","affiliation":[]},{"given":"Walid","family":"Fdhila","sequence":"additional","affiliation":[]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,22]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Tikhomirov, S.: Deanonymization and linkability of cryptocurrency transactions based on network analysis. In: 2019 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 172\u2013184. IEEE (2019)","DOI":"10.1109\/EuroSP.2019.00022"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/978-3-662-45472-5_31","volume-title":"Financial Cryptography and Data Security","author":"J Bonneau","year":"2014","unstructured":"Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J.A., Felten, E.W.: Mixcoin: anonymity for bitcoin with accountable mixes. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 486\u2013504. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_31"},{"key":"12_CR3","unstructured":"Coindesk: Details of \\$5 million bitstamp hack revealed. https:\/\/www.coindesk.com\/markets\/2015\/07\/01\/details-of-5-million-bitstamp-hack-revealed\/. Accessed 17 Jan 2022"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"English, S.M., Nezhadian, E.: Conditions of full disclosure: the blockchain remuneration model. In: 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 64\u201367. IEEE (2017)","DOI":"10.1109\/EuroSPW.2017.52"},{"key":"12_CR5","unstructured":"Fabian, B., Ermakova, T., Sander, U.: Anonymity in bitcoin?-the users\u2019 perspective (2016)"},{"key":"12_CR6","unstructured":"Fics\u00f3r, \u00c1, Kogman, Y., Seres, I.A.: Wabisabi. https:\/\/github.com\/zkSNACKs\/WabiSabi\/releases\/download\/build-70d01424bbce06389d2f0536ba155776eb1d8344\/WabiSabi.pdf. Accessed 3 Feb 2021"},{"key":"12_CR7","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-030-85867-4_7","volume-title":"Business Process Management: Blockchain and Robotic Process Automation Forum","author":"S Ghesmati","year":"2021","unstructured":"Ghesmati, S., Fdhila, W., Weippl, E.: Studying bitcoin privacy attacks and their impact on bitcoin-based identity methods. In: Gonz\u00e1lez Enr\u00edquez, J., Debois, S., Fettke, P., Plebani, P., van de Weerd, I., Weber, I. (eds.) BPM 2021. LNBIP, vol. 428, pp. 85\u2013101. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-85867-4_7"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Ghesmati, S., Fdhila, W., Weippl, E.: SoK: how private is bitcoin? Classification and evaluation of bitcoin privacy techniques. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, pp. 1\u201314 (2022)","DOI":"10.1145\/3538969.3538971"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Ghesmati, S., Fdhila, W., Weippl, E.: Usability of cryptocurrency wallets providing coinjoin transactions. Cryptology ePrint Archive (2022)","DOI":"10.14722\/usec.2022.23037"},{"key":"12_CR10","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-030-78642-7_56","volume-title":"HCI International 2021 - Posters","author":"S Ghesmati","year":"2021","unstructured":"Ghesmati, S., Kern, A., Judmayer, A., Stifter, N., Weippl, E.: Unnecessary input heuristics and PayJoin transactions. In: Stephanidis, C., Antona, M., Ntoa, S. (eds.) HCII 2021. CCIS, vol. 1420, pp. 416\u2013424. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-78642-7_56"},{"key":"12_CR11","unstructured":"Joinmarket: Joinmarket. https:\/\/github.com\/JoinMarket-Org\/ joinmarket-clientserver (2015)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Keller, P., Florian, M., B\u00f6hme, R.: Collaborative deanonymization. arXiv preprint arXiv:2005.03535 (2020)","DOI":"10.1007\/978-3-662-63958-0_3"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/978-3-662-54970-4_33","volume-title":"Financial Cryptography and Data Security","author":"K Krombholz","year":"2017","unstructured":"Krombholz, K., Judmayer, A., Gusenbauer, M., Weippl, E.: The other side of the coin: user experiences with bitcoin security and privacy. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 555\u2013580. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54970-4_33"},{"key":"12_CR14","unstructured":"Lazar, J., Feng, J.H., Hochheiser, H.: Research Methods in Human-Computer Interaction. Morgan Kaufmann (2017)"},{"key":"12_CR15","unstructured":"Mai, A., Pfeffer, K., Gusenbauer, M., Weippl, E., Krombholz, K.: User mental models of cryptocurrency systems-a grounded theory approach. In: Sixteenth Symposium on Usable Privacy and Security ($$\\{$$SOUPS$$\\}$$ 2020), pp. 341\u2013358 (2020)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., et al.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127\u2013140 (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"12_CR17","unstructured":"Pfeffer, K., et al.: On the usability of authenticity checks for hardware security tokens. In: 30th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 2021) (2021)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Sabry, F., Labda, W., Erbad, A., Al Jawaheri, H., Malluhi, Q.: Anonymity and privacy in bitcoin escrow trades. In: Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, pp. 211\u2013220 (2019)","DOI":"10.1145\/3338498.3358639"},{"key":"12_CR19","unstructured":"Samourai: Samourai wallet. https:\/\/samouraiwallet.com\/whirlpool (2015)"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/978-3-030-51280-4_32","volume-title":"Financial Cryptography and Data Security","author":"A Voskobojnikov","year":"2020","unstructured":"Voskobojnikov, A., Obada-Obieh, B., Huang, Y., Beznosov, K.: Surviving the cryptojungle: perception and management of risk among north American cryptocurrency (non)users. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 595\u2013614. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_32"},{"key":"12_CR21","unstructured":"Wasabi: Wasabiwallet (2018). https:\/\/wasabiwallet.io\/"},{"key":"12_CR22","unstructured":"Wiki: Mt. gox. https:\/\/en.wikipedia.org\/wiki\/Mt._Gox. Accessed 17 Jan 2022"},{"key":"12_CR23","unstructured":"Wired: Hack brief: Hackers stole \\$40 million from binance cryptocurrency exchange. https:\/\/www.wired.com\/story\/hack-binance-cryptocurrency-exchange\/. Accessed 17 Jan 2022"},{"key":"12_CR24","unstructured":"Yousaf, H., Kappos, G., Meiklejohn, S.: Tracing transactions across cryptocurrency ledgers. In: 28th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 2019), pp. 837\u2013850 (2019)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security. FC 2022 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-32415-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T20:27:25Z","timestamp":1689971245000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-32415-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031324147","9783031324154"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-32415-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"22 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc22.ifca.ai\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Hotcrp","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}