{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T05:07:59Z","timestamp":1745471279791,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319672076"},{"type":"electronic","value":"9783319672083"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67208-3_8","type":"book-chapter","created":{"date-parts":[[2017,8,30]],"date-time":"2017-08-30T12:21:00Z","timestamp":1504095660000},"page":"133-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Digital Forensic Implications of Collusion Attacks on the Lightning Network"],"prefix":"10.1007","author":[{"given":"Dmytro","family":"Piatkivskyi","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Axelsson","sequence":"additional","affiliation":[]},{"given":"Mariusz","family":"Nowostawski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,31]]},"reference":[{"issue":"5","key":"8_CR1","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D Boneh","year":"1998","unstructured":"Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory 44(5), 1897\u20131905 (1998)","journal-title":"IEEE Transactions on Information Theory"},{"key":"8_CR2","unstructured":"Bugiel, S., Davi, L., Dmitrienko, R., Fischer, T., Sadeghi, A., Shastry, B.: Towards taming privilege-escalation attacks on Android. In: Proceedings of the Nineteenth Annual Network and Distributed System Security Symposium (2012)"},{"key":"8_CR3","unstructured":"Gerhardt, I., Hanke, T.: Homomorphic Payment Addresses and the Pay-to-Contract Protocol, [cs.CR], Cornell University Library, Cornell University, Ithaca, New York (2012). arxiv:1212.3257v1, arxiv.org\/pdf\/1212.3257v1.pdf"},{"issue":"2","key":"8_CR4","first-page":"387","volume":"70","author":"B Hay","year":"2005","unstructured":"Hay, B.: Sting operations, undercover agents and entrapment. Missouri Law Review 70(2), 387\u2013432 (2005)","journal-title":"Missouri Law Review"},{"issue":"7","key":"8_CR5","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1002\/wcm.435","volume":"6","author":"M Moharrum","year":"2006","unstructured":"Moharrum, M., Eltoweissy, M., Mukkamala, R.: Dynamic combinatorial key management scheme for sensor networks. Wireless Communications and Mobile Computing 6(7), 1017\u20131035 (2006)","journal-title":"Wireless Communications and Mobile Computing"},{"key":"8_CR6","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). bitcoin.org\/bitcoin.pdf"},{"key":"8_CR7","unstructured":"Nowostawski, M., Frantz, C.: Blockchain: the emergence of distributed autonomous institutions. In: Proceedings of the Sixth International Conference on Social Media Technologies, Communication and Informatics, pp. 29\u201335 (2016)"},{"key":"8_CR8","unstructured":"Pacia, C.: Lightning Network skepticism, December 23, 2015. chrispacia.wordpress.com\/2015\/12\/23\/lightning-network-skepticism"},{"key":"8_CR9","unstructured":"Poon, J., Dryja, T.: The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments, Draft Version 0.5.9.2 (2016). lightning.network\/lightning-network-paper.pdf"},{"key":"8_CR10","unstructured":"Prihodko, P., Zhigulin, S., Sahno, M., Ostrovskiy, A., Osuntokun, O.: Flare: An Approach to Routing in the Lightning Network, White Paper (2016). bitfury.com\/content\/5-white-papers-research\/whitepaper_flare_an_approach_to_routing_in_lightning_network_7_7_2016.pdf"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the Bitcoin system. In: Proceedings of the Third IEEE International Conference on Privacy, Security, Risk and Trust\/Social Computing\/Workshop on Security and Privacy in Social Networks, pp. 1318\u20131326 (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.79"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XIII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67208-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T00:05:12Z","timestamp":1630368312000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-67208-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319672076","9783319672083"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67208-3_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"31 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 January 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 February 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/ConferenceProgram2017.pdf","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}