{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:56:49Z","timestamp":1771700209524,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319702773","type":"print"},{"value":"9783319702780","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-70278-0_9","type":"book-chapter","created":{"date-parts":[[2017,11,18]],"date-time":"2017-11-18T02:03:19Z","timestamp":1510970599000},"page":"155-169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["Could Network Information Facilitate Address Clustering in Bitcoin?"],"prefix":"10.1007","author":[{"given":"Till","family":"Neudecker","sequence":"first","affiliation":[]},{"given":"Hannes","family":"Hartenstein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,19]]},"reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-39884-1_4","volume-title":"Financial Cryptography and Data Security","author":"E Androulaki","year":"2013","unstructured":"Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34\u201351. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_4"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin P2P network. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM (2014)","DOI":"10.1145\/2660267.2660379"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Pustogarov, I.: Bitcoin over tor isn\u2019t a good idea. arXiv preprint arXiv:1410.6079 (2014)","DOI":"10.1109\/SP.2015.15"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"DuPont, J., Squicciarini, A.C.: Toward de-anonymizing bitcoin by mapping users location. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 139\u2013141. ACM (2015)","DOI":"10.1145\/2699026.2699128"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Harrigan, M., Fretter, C.: The unreasonable effectiveness of address clustering. arXiv preprint arXiv:1605.06369 (2016)","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0071"},{"key":"9_CR6","unstructured":"Kaminsky, D.: Black ops of TCP\/IP. Black Hat USA (2011)"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/978-3-662-45472-5_30","volume-title":"Financial Cryptography and Data Security","author":"P Koshy","year":"2014","unstructured":"Koshy, P., Koshy, D., McDaniel, P.: An analysis of anonymity in bitcoin using P2P network traffic. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 469\u2013485. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_30"},{"issue":"4","key":"9_CR8","doi-asserted-by":"crossref","first-page":"906","DOI":"10.1287\/isre.2013.0480","volume":"24","author":"M Lin","year":"2013","unstructured":"Lin, M., Lucas Jr., H.C., Shmueli, G.: Research commentary-too big to fail: large samples and the p-value problem. Inf. Syst. Res. 24(4), 906\u2013917 (2013)","journal-title":"Inf. Syst. Res."},{"key":"9_CR9","unstructured":"Maxwell, G.: Coinjoin: Bitcoin privacy for the real world (2013). https:\/\/bitcointalk.org\/index.php?topic=279249 . Accessed 27 Sep 2016"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127\u2013140. ACM (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"9_CR11","unstructured":"Mendenhall, W., Beaver, R.J., Beaver, B.M.: Introduction to Probability and Statistics. Cengage Learning (2012)"},{"key":"9_CR12","unstructured":"Miller, A., Litton, J., Pachulski, A., Gupta, N., Levin, D., Spring, N., Bhattacharjee, B.: Discovering Bitcoin\u2019s Public Topology and Influential Nodes (2015)"},{"key":"9_CR13","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system, p. 1 (2012), p. 28 (2008)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Neudecker, T., Andelfinger, P., Hartenstein, H.: Timing analysis for inferring the topology of the bitcoin peer-to-peer network. In: 2016 International IEEE Conference on Advanced and Trusted Computing (ATC), pp. 358\u2013367, July 2016","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0070"},{"key":"9_CR15","unstructured":"Nick, J.D.: Data-Driven De-Anonymization in Bitcoin. Master\u2019s thesis, ETH-Z\u00fcrich (2015)"},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-1-4614-4139-7_10","volume-title":"Security and Privacy in Social Networks","author":"F Reid","year":"2013","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197\u2013223. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-1-4614-4139-7_10"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_2"},{"key":"9_CR18","volume-title":"The Practice of Statistics","author":"D Yates","year":"1996","unstructured":"Yates, D., Moore, D., McCabe, G.: The Practice of Statistics. WH Freeman and Company, New York (1996)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70278-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,7]],"date-time":"2022-08-07T16:31:22Z","timestamp":1659889882000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-70278-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319702773","9783319702780"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70278-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}