{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T23:00:09Z","timestamp":1775343609369,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662447734","type":"print"},{"value":"9783662447741","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44774-1_7","type":"book-chapter","created":{"date-parts":[[2014,10,7]],"date-time":"2014-10-07T12:50:47Z","timestamp":1412686247000},"page":"87-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":118,"title":["The Bitcoin P2P Network"],"prefix":"10.1007","author":[{"given":"Joan Antoni","family":"Donet Donet","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cristina","family":"P\u00e9rez-Sol\u00e0","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jordi","family":"Herrera-Joancomart\u00ed","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,10,8]]},"reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-39884-1_4","volume-title":"Financial Cryptography and Data Security","author":"E Androulaki","year":"2013","unstructured":"Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34\u201351. Springer, Heidelberg (2013). http:\/\/dx.doi.org\/10.1007\/978-3-642-39884-1_4"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Babaioff, M., Dobzinski, S., Oren, S., Zohar, A.: On bitcoin and red balloons. In: Proceedings of the 13th Association for Computing Machinery (ACM) Conference on Electronic Commerce, EC 2012, pp. 56\u201373. ACM, New York (2012). http:\/\/doi.acm.org\/10.1145\/2229012.2229022","DOI":"10.1145\/2229012.2229022"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Bamert, T., Decker, C., Elsen, L., Wattenhofer, R., Welten, S.: Have a snack, pay with bitcoins. In: Proceedings of the IEEE International Conference on Peer-to-Peer Computing (P2P) 2013, Trento, Italy (2013)","DOI":"10.1109\/P2P.2013.6688717"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-642-32946-3_29","volume-title":"Financial Cryptography and Data Security","author":"S Barber","year":"2012","unstructured":"Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better\u2013how to make bitcoin a better currency. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 399\u2013414. Springer, Heidelberg (2012). http:\/\/dx.doi.org\/10.1007\/978-3-642-32946-3_29"},{"key":"7_CR5","unstructured":"Castro, S.: Bitcoin P2P network sniffer. https:\/\/github.com\/sebicas\/bitcoin-sniffer"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: Proceedings of the IEEE International Conference on Peer-to-Peer Computing (P2P) 2013, Trento, Italy, (2013)","DOI":"10.1109\/P2P.2013.6688704"},{"key":"7_CR7","unstructured":"Geoplugin development team: Geoplugin. http:\/\/www.geoplugin.com\/"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Karame, G.O., Androulaki, E., Capkun, S.: Double-spending fast payments in bitcoin. In: Proceedings of the 2012 Association for Computing Machinery (ACM) Conference on Computer and Communications Security, CCS 2012, pp. 906\u2013917. ACM, New York (2012). http:\/\/doi.acm.org\/10.1145\/2382196.2382292","DOI":"10.1145\/2382196.2382292"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: Characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, IMC 2013, pp. 127\u2013140. ACM, New York (2013). http:\/\/doi.acm.org\/10.1145\/2504730.2504747","DOI":"10.1145\/2504730.2504747"},{"key":"7_CR10","unstructured":"Nakamoto, S., Andresen, G.e.a.: Bitcoin standard client. https:\/\/github.com\/bitcoin\/bitcoin\/"},{"issue":"2","key":"7_CR11","doi-asserted-by":"publisher","first-page":"237","DOI":"10.3390\/fi5020237","volume":"5","author":"M Ober","year":"2013","unstructured":"Ober, M., Katzenbeisser, S., Hamacher, K.: Structure and anonymity of the bitcoin transaction graph. Future Internet 5(2), 237\u2013250 (2013). http:\/\/www.mdpi.com\/1999-5903\/5\/2\/237","journal-title":"Future Internet"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-1-4614-4139-7_10","volume-title":"Security and Privacy in Social Networks","author":"F Reid","year":"2013","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A.B., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197\u2013223. Springer, New York (2013). http:\/\/dx.doi.org\/10.1007\/978-1-4614-4139-7_10"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013). http:\/\/dx.doi.org\/10.1007\/978-3-642-39884-1_2"},{"key":"7_CR14","unstructured":"The Bitcoin Wiki: Bitcoin protocol rules. https:\/\/en.bitcoin.it\/wiki\/Protocol_rules"},{"key":"7_CR15","unstructured":"International Telecommunications Union: Percentage of individuals using the internet 2000\u20132012, June 2013. http:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Documents\/statistics\/2013\/Individuals_Internet_2000-2012.xls"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44774-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T11:05:00Z","timestamp":1676891100000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-44774-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662447734","9783662447741"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44774-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}