{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:07:36Z","timestamp":1775815656422,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662447734","type":"print"},{"value":"9783662447741","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44774-1_2","type":"book-chapter","created":{"date-parts":[[2014,10,7]],"date-time":"2014-10-07T12:50:47Z","timestamp":1412686247000},"page":"16-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":65,"title":["Towards Risk Scoring of Bitcoin Transactions"],"prefix":"10.1007","author":[{"given":"Malte","family":"M\u00f6ser","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rainer","family":"B\u00f6hme","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dominic","family":"Breuker","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,10,8]]},"reference":[{"key":"2_CR1","unstructured":"BitPay. https:\/\/bitpay.com\/"},{"key":"2_CR2","unstructured":"Android Security Vulnerability (2013). http:\/\/bitcoin.org\/en\/alert\/2013-08-11-android"},{"key":"2_CR3","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-642-39498-0_7","volume-title":"The Economics of Information Security and Privacy","author":"J\u00f6rg Becker","year":"2013","unstructured":"Becker, J., Breuker, D., Heide, T., Holler, J., Rauer, H.P., B\u00f6hme, R.: Can we afford integrity by Proof-of-Work? Scenarios inspired by the bitcoin currency. In: B\u00f6hme, R. (ed.) The Economics of Information Security and Privacy, pp. 135\u2013156. Springer, Heidelberg (2013)"},{"key":"2_CR4","unstructured":"Bitcoin Forum. List of Major Bitcoin Heists, Thefts, Hacks, Scams, and Losses. https:\/\/bitcointalk.org\/index.php?topic=83794"},{"key":"2_CR5","unstructured":"Bitcoin Forum. CoinJoin: Bitcoin privacy for the real world (2013). https:\/\/bitcointalk.org\/index.php?topic=279249.0"},{"key":"2_CR6","unstructured":"Bitcoin Forum. Mike Hearn, Foundation\u2019s Law & Policy Chair, is pushing blacklists right now (2013). https:\/\/bitcointalk.org\/index.php?topic=333824.0"},{"key":"2_CR7","unstructured":"Bitcoin Forum. Namecoin was Stillborn, I Had to Switch Off Life-Support (2013). https:\/\/bitcointalk.org\/index.php?topic=310954"},{"key":"2_CR8","unstructured":"Blockchain.info. Double Spends. https:\/\/blockchain.info\/de\/double-spends"},{"key":"2_CR9","unstructured":"B\u00f6hme, R.: Internet protocol adoption: learning from Bitcoin. In: IAB Workshop on Internet Technology Adoption and Transition (ITAT) (2013)"},{"key":"2_CR10","unstructured":"Buterin, V.: Mt.Gox: what the largest exchange is doing about the Linode theft and the implications (2012). http:\/\/bitcoinmagazine.com\/mtgox-the-bitcoin-police-what-the-largest-exchange-is-doing-about-the-linode-theft-and-the-implications\/"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"D Chaum","year":"1990","unstructured":"Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319\u2013327. Springer, Heidelberg (1990)"},{"issue":"70","key":"2_CR12","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(70), 1030\u20131044 (1985)","journal-title":"Commun. ACM"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Christin, N.: Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd International World Wide Web Conference, Rio de Janeiro, pp. 213\u2013224 (2013)","DOI":"10.1145\/2488388.2488408"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"JR Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"key":"2_CR15","unstructured":"Goodin, D.: You\u2019re infected-if you want to see your data again, pay us USD 300 in Bitcoins (2013). http:\/\/arstechnica.com\/security\/2013\/10\/youre-infected-if-you-want-to-see-your-data-again-pay-us-300-in-bitcoins\/"},{"key":"2_CR16","unstructured":"Hill, K.: Sanitizing Bitcoin: This Company Wants To Track \u2018Clean\u2019 Bitcoin Accounts (2013). http:\/\/www.forbes.com\/sites\/kashmirhill\/2013\/11\/13\/sanitizing-bitcoin-coin-validation\/"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Karame, G.O., Androulaki, E., Capkun, S.: Two bitcoins at the price of one? Double-spending attacks on fast payments in bitcoin. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2012)","DOI":"10.1145\/2382196.2382292"},{"key":"2_CR18","unstructured":"Karpeles, M.: Clarification of Mt. Gox Compromised Accounts and Major Bitcoin Sell-Off (2011). https:\/\/www.mtgox.com\/press_release_20110630.html"},{"key":"2_CR19","unstructured":"Levin, D., Schulman, A., LaCurts, K., Spring, N., Bhattacharjee, B.: Making currency inexpensive with iOwe. In: Proceedings of the Workshop on the Economics of Networks, Systems, and Computation (NetEcon), San Jose (2011)"},{"key":"2_CR20","unstructured":"McLeod, A.S.: Thailand Bans The Bitcoin! National Foreign Exchange Department Rules Bitcoin Illegal, Trading Suspended (2013). http:\/\/forexmagnates.com\/bitcoin-binned-thailands-foreign-exchange-department-rules-bitcoin-illegal-trading-suspended\/"},{"key":"2_CR21","unstructured":"McMillan, R.: USD 1.2M Hack Shows Why You Should Never Store Bitcoins on the Internet (2013). http:\/\/www.wired.com\/wiredenterprise\/2013\/11\/inputs\/"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the ACM Internet Measurement Conference (IMC), pp. 127\u2013140. ACM, New York (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed e-cash from bitcoin. In: IEEE Symposium on Security and Privacy, San Francisco, pp. 397\u2013411. IEEE (2013)","DOI":"10.1109\/SP.2013.34"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-39884-1_3","volume-title":"Financial Cryptography and Data Security","author":"T Moore","year":"2013","unstructured":"Moore, T., Christin, N.: Beware the middleman: empirical analysis of bitcoin-exchange risk. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 25\u201333. Springer, Heidelberg (2013)"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"M\u00f6ser, M., B\u00f6hme, R., Breuker, D.: An inquiry into money laundering tools in the bitcoin ecosystem. In: Proceedings of the APWG E-Crime Researchers Summit (2013)","DOI":"10.1109\/eCRS.2013.6805780"},{"key":"2_CR26","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)"},{"key":"2_CR27","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-1-4614-4139-7_10","volume-title":"Security and Privacy in Social Networks","author":"F Reid","year":"2013","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A.B., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197\u2013223. Springer, New York (2013)"},{"key":"2_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013)"},{"key":"2_CR29","unstructured":"Meni Rosenfeld. Overview of colored coins, December 2012. http:\/\/bitcoil.co.il\/BitcoinX.pdf"},{"key":"2_CR30","unstructured":"Wikipedia. Kimberley process certification scheme (2013). http:\/\/en.wikipedia.org\/wiki\/Kimberley_Process_Certification_Scheme"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44774-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T02:44:38Z","timestamp":1674269078000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-44774-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662447734","9783662447741"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44774-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}