{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:56:47Z","timestamp":1771700207959,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319155081","type":"print"},{"value":"9783319155098","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15509-8_22","type":"book-chapter","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T07:09:05Z","timestamp":1425366545000},"page":"290-302","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Exploring Miner Evolution in Bitcoin Network"],"prefix":"10.1007","author":[{"given":"Luqin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,4]]},"reference":[{"key":"22_CR1","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008). http:\/\/www.bitcoin.org\/bitcoin.pdf"},{"key":"22_CR2","unstructured":"bitcoin.org: Frequently asked questions. https:\/\/bitcoin.org\/en\/faq. Accessed 10 September 2014"},{"key":"22_CR3","unstructured":"Coinbase.com. https:\/\/www.coinbase.com. Accessed 10 September 2014"},{"key":"22_CR4","unstructured":"Bitstamp.com. https:\/\/www.bitstamp.net. Accessed 10 September 2014"},{"key":"22_CR5","unstructured":"F2Pool.com. https:\/\/www.f2pool.com. Accessed 10 September 2014"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Babaioff, M., Dobzinski, S., Oren, S., Zohar, A.: On Bitcoin and red balloons. In: Proceedings of the 13th ACM Conference on Electronic Commerce, pp. 56\u201373. ACM (2012)","DOI":"10.1145\/2229012.2229022"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Decker, C., Wattenhofer, R.: Information propagation in the Bitcoin network. In: 2013 IEEE Thirteenth International Conference on Peer-to-Peer Computing (P2P), pp. 1\u201310. IEEE (2013)","DOI":"10.1109\/P2P.2013.6688704"},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full Bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013)"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of Bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127\u2013140. ACM (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"22_CR10","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/978-1-4614-4139-7_10","volume-title":"Security and Privacy in Social Networks","author":"F Reid","year":"2013","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the Bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A.B., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197\u2013223. Springer, New York (2013)"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable (2013). arXiv preprint arXiv:1311.0243.","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"22_CR12","unstructured":"Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In: Proceedings of WEIS, vol. 2013 (2013)"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Huang, D.Y., Dharmdasani, H., Meiklejohn, S., Dave, V., Grier, C., McCoy, D., Savage, S., Weaver, N., Snoeren, A.C., Levchenko, K.: Botcoin: monetizing stolen cycles. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2014)","DOI":"10.14722\/ndss.2014.23044"},{"key":"22_CR14","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-642-39498-0_7","volume-title":"The Economics of Information Security and Privacy","author":"J Becker","year":"2013","unstructured":"Becker, J., Breuker, D., Heide, T., Holler, J., Rauer, H.P., B\u00f6hme, R.: Can we afford integrity by proof-of-work? Scenarios inspired by the Bitcoin currency. In: B\u00f6hme, R. (ed.) The Economics of Information Security and Privacy, pp. 135\u2013156. Springer, Heidelberg (2013)"},{"key":"22_CR15","unstructured":"Bitcoinwiki: Bitcoin difficulty. https:\/\/en.bitcoin.it\/wiki\/Difficulty. Accessed 10 September 2014"},{"key":"22_CR16","unstructured":"bitcoin.cz: World\u2019s first mining pool celebrates 3rd year with 0% fee. https:\/\/mining.bitcoin.cz\/news\/2013-12-16-pool-celebrates-3rd-anniversary. Accessed 10 September 2014"},{"key":"22_CR17","unstructured":"blockchain.info: an estimation of hashrate distribution amongst the largest mining pools. https:\/\/blockchain.info\/pools\/. Accessed 10 September 2014"},{"key":"22_CR18","unstructured":"statista.com: Felectricity prices in selected countries in 2013 (in u.s. dollar cents per kilowatt hour). http:\/\/www.statista.com\/statistics\/263492\/electricity-prices-in-selected-countries\/. Accessed 10 September 2014"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15509-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T21:37:21Z","timestamp":1676583441000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15509-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319155081","9783319155098"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15509-8_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"4 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}