{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:43:08Z","timestamp":1757626988762,"version":"3.44.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031944475"},{"type":"electronic","value":"9783031944482"}],"license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-94448-2_13","type":"book-chapter","created":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T19:08:35Z","timestamp":1756667315000},"page":"248-268","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Incentive Mechanism for\u00a0Enhancing Transaction Privacy Based on\u00a0Reputation Perception and\u00a0Double Auction"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-3796-2153","authenticated-orcid":false,"given":"Hai","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7444-3115","authenticated-orcid":false,"given":"Fangqiong","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1551-9744","authenticated-orcid":false,"given":"Hongye","family":"Peng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6386-1644","authenticated-orcid":false,"given":"Tianxi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,1]]},"reference":[{"key":"13_CR1","unstructured":"The Boston Consulting Group: Global payments report 2023 (2023)"},{"key":"13_CR2","unstructured":"Worldpay from Fidelity National Information Services: The global payments report 2023 (2023)"},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"100934","DOI":"10.1016\/j.jfs.2021.100934","volume":"56","author":"E Borgonovo","year":"2021","unstructured":"Borgonovo, E., Caselli, S., Cillo, A., et al.: Money, privacy, anonymity: what do experiments tell us? J. Financ. Stab. 56, 100934 (2021)","journal-title":"J. Financ. Stab."},{"issue":"9","key":"13_CR4","doi-asserted-by":"publisher","first-page":"e5779","DOI":"10.1002\/cpe.5779","volume":"34","author":"B Xu","year":"2022","unstructured":"Xu, B., Huang, D., Mi, B.: Research on the application of mobile payment security system based on the Internet of Things. Concurrency Comput. Pract. Exp. 34(9), e5779 (2022)","journal-title":"Concurrency Comput. Pract. Exp."},{"issue":"15","key":"13_CR5","doi-asserted-by":"publisher","first-page":"17289","DOI":"10.1007\/s10489-022-03378-7","volume":"52","author":"F Zola","year":"2022","unstructured":"Zola, F., Segurola-Gil, L., Bruse, J.L., et al.: Attacking Bitcoin anonymity: generative adversarial networks for improving Bitcoin entity classification. Appl. Intell. 52(15), 17289\u201317314 (2022)","journal-title":"Appl. Intell."},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"104751","DOI":"10.1016\/j.jpdc.2023.104751","volume":"182","author":"M Luo","year":"2023","unstructured":"Luo, M., Zhou, J., Yang, P.: RATS: a regulatory anonymous transaction system based on blockchain. J. Parallel Distrib. Comput. 182, 104751 (2023)","journal-title":"J. Parallel Distrib. Comput."},{"key":"13_CR7","unstructured":"Noether, S., Noether, S., Mackenzie, A.: A Note on Chain Reactions in Traceability in CryptoNote 2.0 (2014)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Miers, I., Garman, C., Green, M., et al.: Zerocoin: anonymous distributed e-cash from bitcoin. In: 2013 IEEE Symposium on Security and Privacy, pp. 397\u2013411. IEEE (2013)","DOI":"10.1109\/SP.2013.34"},{"key":"13_CR9","unstructured":"Sasson, E.B., Chiesa, A., Garman, C., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459\u2013474. IEEE (2014)"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Narayanan, A., Miller, A., et al.: Mixcoin: anonymity for bitcoin with accountable mixes. In: Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, 3\u20137 March 2014, Revised Selected Papers 18, pp. 486\u2013504. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-662-45472-5_31"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Valenta, L., Rowan, B.: Blindcoin: blinded, accountable mixes for bitcoin. In: Financial Cryptography and Data Security, FC 2015, International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, 30 January 2015, pp. 112\u2013126, Revised Selected Papers. Springer, Heidelberg (2015)","DOI":"10.1007\/978-3-662-48051-9_9"},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"23261","DOI":"10.1109\/ACCESS.2018.2827163","volume":"6","author":"Y Liu","year":"2018","unstructured":"Liu, Y., Liu, X., Tang, C., et al.: Unlinkable coin mixing scheme for transaction privacy enhancement of bitcoin. IEEE Access 6, 23261\u201323270 (2018)","journal-title":"IEEE Access"},{"issue":"3","key":"13_CR13","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s10207-019-00459-6","volume":"19","author":"Z Bao","year":"2020","unstructured":"Bao, Z., Shi, W., Kumari, S., et al.: Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity. Int. J. Inf. Secur. 19(3), 311\u2013321 (2020)","journal-title":"Int. J. Inf. Secur."},{"key":"13_CR14","unstructured":"Maxwell, G.: CoinJoin: bitcoin privacy for the real world. In: Post on Bitcoin Forum, vol. 3, p. 110 (2013)"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Heilman, E., Baldimtsi, F., Goldberg, S.: Blindly signed contracts: anonymous on-blockchain and off-blockchain bitcoin transactions. In: International Conference on Financial Cryptography and Data Security, pp. 43\u201360. Springer, Heidelberg (2016)","DOI":"10.1007\/978-3-662-53357-4_4"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Heilman, E., Alshenibr, L., Baldimtsi, F., et al.: TumbleBit: an untrusted bitcoin-compatible anonymous payment hub. In: Network and Distributed System Security Symposium (2017)","DOI":"10.14722\/ndss.2017.23086"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Ruffing, T., Moreno-Sanchez, P., Kate, A.: P2P mixing and unlinkable bitcoin transactions. Cryptology ePrint Archive (2016)","DOI":"10.14722\/ndss.2017.23415"},{"key":"13_CR18","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1016\/j.future.2016.05.018","volume":"80","author":"JH Ziegeldorf","year":"2018","unstructured":"Ziegeldorf, J.H., Matzutt, R., Henze, M., et al.: Secure and anonymous decentralized Bitcoin mixing. Futur. Gener. Comput. Syst. 80, 448\u2013466 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"3","key":"13_CR19","doi-asserted-by":"publisher","first-page":"1974","DOI":"10.1109\/TDSC.2020.3043366","volume":"19","author":"N Lu","year":"2020","unstructured":"Lu, N., Chang, Y., Shi, W., et al.: CoinLayering: an efficient coin mixing scheme for large scale bitcoin transactions. IEEE Trans. Dependable Secure Comput. 19(3), 1974\u20131987 (2020)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Chatzigiannis, P., Baldimtsi, F.: MiniLedger: compact-sized anonymous and auditable distributed payments. In: European Symposium on Research in Computer Security, pp. 407\u2013429. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-88418-5_20"},{"key":"13_CR21","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/s12083-021-01241-z","volume":"15","author":"F Franzoni","year":"2022","unstructured":"Franzoni, F., Daza, V.: Clover: an anonymous transaction relay protocol for the bitcoin P2P network. Peer-to-Peer Netw. Appl. 15, 290\u2013303 (2022)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Qi, S., Zheng, Y., Chen, X., et al.: Double-edged sword: incentivized verifiable product path query for RFID-enabled supply chain. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 414\u2013424. IEEE (2017)","DOI":"10.1109\/ICDCS.2017.265"},{"key":"13_CR23","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.future.2019.08.005","volume":"102","author":"EK Wang","year":"2020","unstructured":"Wang, E.K., Liang, Z., Chen, C.M., et al.: PoRX: a reputation incentive scheme for blockchain consensus of IIoT. Futur. Gener. Comput. Syst. 102, 140\u2013151 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"2","key":"13_CR24","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/s12083-020-00985-4","volume":"14","author":"F Zeng","year":"2021","unstructured":"Zeng, F., Chen, Y., Yao, L., et al.: A novel reputation incentive mechanism and game theory analysis for service caching in software-defined vehicle edge computing. Peer-to-Peer Netw. Appl. 14(2), 467\u2013481 (2021)","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"7","key":"13_CR25","doi-asserted-by":"publisher","first-page":"5524","DOI":"10.1109\/JIOT.2021.3111999","volume":"9","author":"L Xie","year":"2021","unstructured":"Xie, L., Luan, T.H., Su, Z., et al.: A game-theoretical approach for secure crowdsourcing-based indoor navigation system with reputation mechanism. IEEE Internet Things J. 9(7), 5524\u20135536 (2021)","journal-title":"IEEE Internet Things J."},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, J., Wu, Y., Pan, R.: Incentive mechanism for horizontal federated learning based on reputation and reverse auction. In: Proceedings of the Web Conference 2021, pp. 947\u2013956 (2021)","DOI":"10.1145\/3442381.3449888"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Wang, Y., Yuan, L., Jiao, W., et al.: A fast and secured vehicle-to-vehicle energy trading based on blockchain consensus in the internet of electric vehicles. IEEE Trans. Veh. Technol. (2023)","DOI":"10.1109\/TVT.2023.3239990"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Xiao, H., Cai, L., Feng, J., et al.: Resource optimization of MAB-based reputation management for data trading in vehicular edge computing. IEEE Trans. Wirel. Commun. (2023)","DOI":"10.1109\/TWC.2022.3233035"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94448-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T00:23:36Z","timestamp":1757463816000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94448-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,1]]},"ISBN":["9783031944475","9783031944482"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94448-2_13","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2025,9,1]]},"assertion":[{"value":"1 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}