{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:33:13Z","timestamp":1772641993361,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662480502","type":"print"},{"value":"9783662480519","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-48051-9_10","type":"book-chapter","created":{"date-parts":[[2015,9,4]],"date-time":"2015-09-04T09:44:22Z","timestamp":1441359862000},"page":"127-141","source":"Crossref","is-referenced-by-count":74,"title":["Privacy-Enhancing Overlays in Bitcoin"],"prefix":"10.1007","author":[{"given":"Sarah","family":"Meiklejohn","sequence":"first","affiliation":[]},{"given":"Claudio","family":"Orlandi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,5]]},"reference":[{"key":"10_CR1","unstructured":"Darkcoin. \n                    https:\/\/www.darkcoin.io"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/978-3-642-39884-1_4","volume-title":"Financial Cryptography and Data Security","author":"E Androulaki","year":"2013","unstructured":"Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34\u201351. Springer, Heidelberg (2013)"},{"key":"10_CR3","unstructured":"Atlas, K.: Coinjoin Sudoku. \n                    http:\/\/www.coinjoinsudoku.com"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: decentralized anonymous payments from bitcoin. In: Proceedings of the IEEE Symposium on Security and Privacy (2014)","DOI":"10.1109\/SP.2014.36"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1007\/978-3-662-45472-5_31","volume-title":"Financial Cryptography and Data Security","author":"J Bonneau","year":"2014","unstructured":"Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J.A., Felten, E.W.: Mixcoin: anonymity for bitcoin with accountable mixes. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 486\u2013504. Springer, Heidelberg (2014)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Danezis, G., Fournet, C., Kohlweiss, M., Parno, B.: Pinocchio coin: building zerocoin from a succinct pairing-based proof system. In: Proceedings of PETShop 2013 (2013)","DOI":"10.1145\/2517872.2517878"},{"key":"10_CR7","unstructured":"European Central Bank. Virtual Currency Schemes. ECB Report, October 2012. \n                    www.ecb.europa.eu\/pub\/pdf\/other\/virtualcurrencyschemes201210en.pdf"},{"key":"10_CR8","unstructured":"Federal Bureau of Investigation. (U) Bitcoin Virtual Currency Unique Features Present Distinct Challenges for Deterring Illicit Activity. Intelligence Assessment, Cyber Intelligence and Criminal Intelligence Section, April 2012. \n                    http:\/\/cryptome.org\/2012\/05\/fbi-bitcoin.pdf"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Cryptography from anonymity. In: Proceedings of 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2006), Berkeley, California, USA, pp. 239\u2013248, 21\u201324 October 2006","DOI":"10.1109\/FOCS.2006.25"},{"key":"10_CR10","unstructured":"Maxwell, G.: CoinJoin: Bitcoin privacy for the real world. Post on bitcointalk.org. \n                    https:\/\/bitcointalk.org\/index.php?topic=279249"},{"key":"10_CR11","unstructured":"Maxwell, G.: Really Really ultimate blockchain compression: CoinWitness. Post on bitcointalk.org. \n                    https:\/\/bitcointalk.org\/index.php?topic=277389"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of IMC 2013 (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed E-Cash from bitcoin. In: Proceedings of the IEEE Symposium on Security and Privacy (2013)","DOI":"10.1109\/SP.2013.34"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"M\u00f6ser, M.: An inquiry into money laundering tools in the bitcoin ecosystem. In: Proceedings of the IEEE 2013 eCrime Researchers Summit (2013)","DOI":"10.1109\/eCRS.2013.6805780"},{"key":"10_CR15","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/978-1-4614-4139-7_10","volume-title":"Security and Privacy in Social Networks","author":"F Reid","year":"2013","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A.B., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197\u2013223. Springer, New York (2013)"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013)"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/978-3-319-11212-1_20","volume-title":"Computer Security - ESORICS 2014","author":"T Ruffing","year":"2014","unstructured":"Ruffing, T., Moreno-Sanchez, P., Kate, A.: Coinshuffle: practical decentralized coin mixing for bitcoin. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ICAIS 2014, Part II. LNCS, vol. 8713, pp. 345\u2013364. Springer, Heidelberg (2014)"},{"key":"10_CR18","unstructured":"Securities and Exchange Commission. SEC Charges Texas Man With Running Bitcoin-Denominated Ponzi Scheme, July 2013. \n                    www.sec.gov\/News\/PressRelease\/Detail\/PressRelease\/1370539730583"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/978-3-662-45472-5_29","volume-title":"Financial Cryptography and Data Security","author":"M Spagnuolo","year":"2014","unstructured":"Spagnuolo, M., Maggi, F., Zanero, S.: BitIodine: extracting intelligence from the bitcoin network. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 457\u2013468. Springer, Heidelberg (2014)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-48051-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T17:47:58Z","timestamp":1559238478000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-48051-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662480502","9783662480519"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-48051-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}