{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T15:24:05Z","timestamp":1766676245730},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319260952"},{"type":"electronic","value":"9783319260969"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26096-9_29","type":"book-chapter","created":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T16:18:35Z","timestamp":1448381915000},"page":"283-293","source":"Crossref","is-referenced-by-count":22,"title":["Bitcoin: Perils of an Unregulated Global P2P Currency"],"prefix":"10.1007","author":[{"given":"Syed Taha","family":"Ali","sequence":"first","affiliation":[]},{"given":"Dylan","family":"Clarke","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"McCorry","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"29_CR1","unstructured":"Bustillos, M.: The bitcoin boom. The New Yorker, April 2013. \n                    http:\/\/www.newyorker.com\/tech\/elements\/the-bitcoin-boom"},{"key":"29_CR2","unstructured":"Kitco news. 2013: Year of the Bitcoin. Forbes, 10 December 2013. \n                    http:\/\/www.forbes.com\/sites\/kitconews\/2013\/12\/10\/2013-year-of-the-bitcoin\/"},{"key":"29_CR3","unstructured":"CoinMarketCap. Crypto-Currency Market Capitalizations. BitcoinTalk, 28 July 2014. \n                    https:\/\/coinmarketcap.com\/"},{"key":"29_CR4","unstructured":"Langley, H.: Bitcoin value surges as microsoft starts accepting cryptocurrency. TechRadar, 11 December 2014. \n                    http:\/\/www.techradar.com\/news\/internet\/bitcoin-value-surges-as-microsoft-starts-accepting-cryptocurrency-1276552"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Barratt, M.J.: Silk road: ebay for drugs. Addiction (2012)","DOI":"10.1111\/j.1360-0443.2011.03709.x"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM 2004, Berkeley. USENIX Association (2004)","DOI":"10.21236\/ADA465464"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Aldridge, J., D\u00e9cary-H\u00e9tu, D.: Not an \u2018Ebay for Drugs\u2019: the cryptomarket \u2018Silk Road\u2019 as a paradigm shifting criminal innovation. In: Social Science Research Network Working Paper Series, May 2014","DOI":"10.2139\/ssrn.2436643"},{"key":"29_CR8","unstructured":"Mail, D.: Mastermind behind \n                    \n                      \n                    \n                    $$\\$$$\n                  180M \u2018eBay of drugs\u2019 silk road convicted after jury deliberates just three hours, 4 February 2015"},{"key":"29_CR9","unstructured":"Stuff. Silk Road Drug Buyers in Court, 3 December 2014. \n                    http:\/\/www.stuff.co.nz\/auckland\/63779228\/Silk-Road-drug-buyers-in-court"},{"key":"29_CR10","unstructured":"FBI. Operator of Silk Road 2.0 Website Charged in Manhattan Federal Court, 6 November 2014. \n                    http:\/\/www.fbi.gov\/newyork\/press-releases\/2014\/operator-of-silk-road-2.0-website-charged-in-manhattan-federal-court"},{"key":"29_CR11","unstructured":"Wong, J.I.: Dark markets grow bigger and bolder in year since silk road bust. CoinDesk, 6 October 2014. \n                    http:\/\/www.coindesk.com\/dark-markets-grow-bigger-bolder-year-since-silk-road-bust\/"},{"key":"29_CR12","unstructured":"DeepDotWeb. Interview with Grams Search Engine Admin: Exciting Features Ahead!, 3 May 2014. \n                    http:\/\/www.deepdotweb.com\/2014\/05\/03\/interview-with-grams-search-engine-admin-exciting-features-ahead\/"},{"key":"29_CR13","volume-title":"Safe in the City","author":"M Macyoung","year":"1994","unstructured":"Macyoung, M., Pfouts, C.: Safe in the City. Paladin Press, USA (1994)"},{"key":"29_CR14","volume-title":"Violence, Blunders and Fractured Jaws: Advanced Awareness Techniques and Street Etiquette","author":"M Macyoung","year":"1992","unstructured":"Macyoung, M.: Violence, Blunders and Fractured Jaws: Advanced Awareness Techniques and Street Etiquette. Paladin Press, USA (1992)"},{"key":"29_CR15","unstructured":"Olson, P.: The man behind silk road - the internet\u2019s biggest market for illegal drugs. The Guardian, 10 November 2013. \n                    http:\/\/www.theguardian.com\/technology\/2013\/nov\/10\/silk-road-internet-market-illegal-drugs-ross-ulbricht"},{"key":"29_CR16","unstructured":"Infante, A.: Coin report: how many lives did silk road save. CoinReport, 26 June 2014. \n                    https:\/\/coinreport.net\/many-lives-silk-road-save\/"},{"key":"29_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/978-3-319-11212-1_18","volume-title":"Computer Security - ESORICS 2014","author":"Christian Decker","year":"2014","unstructured":"Decker, Christian, Wattenhofer, Roger: Bitcoin transaction malleability and MtGox. In: Kuty\u0142owski, Miros\u0142aw, Vaidya, Jaideep (eds.) ICAIS 2014, Part II. LNCS, vol. 8713, pp. 313\u2013326. Springer, Heidelberg (2014)"},{"key":"29_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-39884-1_3","volume-title":"Financial Cryptography and Data Security","author":"T Moore","year":"2013","unstructured":"Moore, T., Christin, N.: Beware the middleman: empirical analysis of bitcoin-exchange risk. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 25\u201333. Springer, Heidelberg (2013)"},{"key":"29_CR19","unstructured":"Higgins, S.: Bitstamp claims \n                    \n                      \n                    \n                    $$\\$$$\n                  5 million lost in hot wallet hack. CoinDesk, 5 January 2015. \n                    http:\/\/www.coindesk.com\/bitstamp-claims-roughly-19000-btc-lost-hot-wallet-hack\/"},{"key":"29_CR20","unstructured":"Greenberg, A.: Nearly 150 Breeds of Bitcoin-stealing Malware in The Wild, Researchers Say, Forbes, 26 February 2014. \n                    http:\/\/www.forbes.com\/sites\/andygreenberg\/2014\/02\/26\/nearly-150-breeds-of-bitcoin-stealing-malware-in-the-wild-researchers-say\/"},{"key":"29_CR21","unstructured":"Hern, A.: A history of bitcoin hacks. The Guardian, 18 March 2014. \n                    http:\/\/www.theguardian.com\/technology\/2014\/mar\/18\/history-of-bitcoin-hacks-alternative-currency"},{"key":"29_CR22","volume-title":"Malicious Cryptography: Exposing Cryptovirology","author":"A Young","year":"2004","unstructured":"Young, A., Yung, M.: Malicious Cryptography: Exposing Cryptovirology. Wiley, New York (2004)"},{"key":"29_CR23","unstructured":"Blue, V.: CryptoLocker\u2019s crimewave: a trail of millions in laundered bitcoin. ZDnet, 22 December 2013. \n                    http:\/\/www.zdnet.com\/article\/cryptolockers-crimewave-a-trail-of-millions-in-laundered-bitcoin\/"},{"key":"29_CR24","unstructured":"Goodin, D.: We \u201cwill be paying no ransom,\u201d vows town hit by Cryptowall ransom malware. Ars Technica, 7 June 2014. \n                    http:\/\/arstechnica.com\/security\/2014\/06\/we-will-be-paying-no-ransom-vows-town-hit-by-cryptowall-ransom-malware\/"},{"key":"29_CR25","unstructured":"Walter, J.: Meet \u2018Tox\u2019: ransomware for the rest of us. McAfee Labs - Blog Central, 23 May 2015. \n                    https:\/\/blogs.mcafee.com\/mcafee-labs\/meet-tox-ransomware-for-the-rest-of-us"},{"key":"29_CR26","doi-asserted-by":"crossref","unstructured":"Huang, D.Y., Dharmdasani, H., Meiklejohn, S., Dave, V., Grier, C., McCoy, D., Savage, S., Weaver, N., Snoeren, A.C., Levchenko, K.: Botcoin: monetizing stolen cycles. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2014)","DOI":"10.14722\/ndss.2014.23044"},{"key":"29_CR27","unstructured":"Tung, L.: NAS device botnet mined \n                    \n                      \n                    \n                    $$\\$$$\n                  600,000 in dogecoin over two months. ZDnet, 18 June 2014. \n                    http:\/\/www.zdnet.com\/article\/nas-device-botnet-mined-600000-in-dogecoin-over-two-months\/"},{"key":"29_CR28","unstructured":"Torpey, K.: Bitcoin and tax evasion: are the possibilities overstated? Inside Bitcoins, 28 October 2014. \n                    http:\/\/insidebitcoins.com\/news\/bitcoin-and-tax-evasion-are-the-possibilities-overstated\/25805"},{"key":"29_CR29","unstructured":"Surowiecki, J.: The underground recovery. The New Yorker, 29 April 2013. \n                    http:\/\/www.newyorker.com\/magazine\/2013\/04\/29\/the-underground-recovery"},{"key":"29_CR30","unstructured":"Wald, J.: How an exploding freelance economy will drive change in 2014. Forbes, 25 November 2013. \n                    http:\/\/www.forbes.com\/sites\/groupthink\/2013\/11\/25\/how-an-exploding-freelance-economy-will-drive-change-in-2014\/"},{"key":"29_CR31","unstructured":"Palmer, K.: FACTA: new federal law causes swiss banks to reject american investors. Watchdog Wire, 23 October 2012. \n                    http:\/\/watchdogwire.com\/blog\/2012\/10\/23\/facta-new-federal-law-causes-swiss-banks-to-reject-american-investors\/"},{"issue":"3","key":"29_CR32","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1080\/13600834.2012.744225","volume":"21","author":"R Stokes","year":"2012","unstructured":"Stokes, R.: Virtual money laundering: the case of bitcoin and the linden dollar. Inf. Commun. Technol. Law 21(3), 221\u2013236 (2012)","journal-title":"Inf. Commun. Technol. Law"},{"key":"29_CR33","doi-asserted-by":"crossref","unstructured":"Moser, M., Bohme, R., Breuker, D.: An inquiry into money laundering tools in the bitcoin ecosystem. In: eCrime Researchers Summit (eCRS). IEEE (2013)","DOI":"10.1109\/eCRS.2013.6805780"},{"key":"29_CR34","unstructured":"Sparshott, J.: Web money gets laundering rule. Wall Street J. 21 March 2013. \n                    http:\/\/www.wsj.com\/articles\/SB10001424127887324373204578374611351125202"},{"key":"29_CR35","unstructured":"McCallion, J.: Europol calls for greater bitcoin policing powers. ITPro, 25 March 2014. \n                    http:\/\/www.itpro.co.uk\/public-sector\/21903\/europol-calls-for-greater-bitcoin-policing-powers"},{"key":"29_CR36","unstructured":"Kirk, J.: Could the bitcoin network be used as an ultrasecure notary service? PCWorld, 24 May 2013. \n                    http:\/\/www.pcworld.com\/article\/2039705\/could-the-bitcoin-network-be-used-as-an-ultrasecure-notary-service.html"},{"key":"29_CR37","unstructured":"Bradbury, D.: BlockSign utilises block chain to verify signed contracts. CoinDesk, 27 August 2014. \n                    http:\/\/www.coindesk.com\/blocksign-utilises-block-chain-verify-signed-contracts\/"},{"key":"29_CR38","unstructured":"Counterparty: Pioneering Peer-to-Peer Finance. Accessed 22 July 2014"},{"key":"29_CR39","unstructured":"Fox-Brewster, T.: Bitcoin\u2019s blockchain offers safe haven for malware and child abuse, warns interpol. Forbes, 27 March 2015. \n                    http:\/\/www.forbes.com\/sites\/thomasbrewster\/2015\/03\/27\/bitcoin-blockchain-pollution-a-criminal-opportunity\/"},{"key":"29_CR40","doi-asserted-by":"crossref","unstructured":"Ali, S.T., McCorry, P., Lee, P.H.-J., Hao, F.: ZombieCoin: powering next-generation botnets with bitcoin. In: 2nd Workshop on Bitcoin Research (2015)","DOI":"10.1007\/978-3-662-48051-9_3"},{"issue":"3","key":"29_CR41","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2014.49","volume":"12","author":"A Gervais","year":"2014","unstructured":"Gervais, A., Karame, G.O., Capkun, V., Capkun, S.: Is bitcoin a decentralized currency? IEEE Secur. Priv. 12(3), 54\u201360 (2014)","journal-title":"IEEE Secur. Priv."},{"key":"29_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-662-44774-1_2","volume-title":"Financial Cryptography and Data Security","author":"M M\u00f6ser","year":"2014","unstructured":"M\u00f6ser, M., B\u00f6hme, R., Breuker, D.: Towards risk scoring of bitcoin transactions. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014 Workshops. LNCS, vol. 8438, pp. 16\u201332. Springer, Heidelberg (2014)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26096-9_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T17:20:28Z","timestamp":1559323228000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26096-9_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319260952","9783319260969"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26096-9_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}