{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:13:15Z","timestamp":1763968395820,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_45","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"661-675","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Transaction Deanonymization in Large-Scale Bitcoin Systems via Propagation Pattern Analysis"],"prefix":"10.1007","author":[{"given":"Meng","family":"Shen","sequence":"first","affiliation":[]},{"given":"Junxian","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"key":"45_CR1","unstructured":"Bitcoin: A peer-to-peer electronic cash system\u2014satoshi nakamoto institute. https:\/\/nakamotoinstitute.org\/bitcoin\/. Accessed 15 Sept 2019"},{"key":"45_CR2","unstructured":"Black ops of TCP\/IP 2011\u2014dan kaminsky\u2019s blog. https:\/\/dankaminsky.com\/2011\/08\/05\/bo2k11\/. Accessed 8 Oct 2019"},{"key":"45_CR3","doi-asserted-by":"publisher","unstructured":"Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin P2P network. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 15\u201329. ACM, New York (2014). https:\/\/doi.org\/10.1145\/2660267.2660379","DOI":"10.1145\/2660267.2660379"},{"key":"45_CR4","doi-asserted-by":"publisher","unstructured":"Biryukov, A., Pustogarov, I.: Bitcoin over tor isn\u2019t a good idea. In: 2015 IEEE Symposium on Security and Privacy, pp. 122\u2013134, May 2015. https:\/\/doi.org\/10.1109\/SP.2015.15","DOI":"10.1109\/SP.2015.15"},{"key":"45_CR5","doi-asserted-by":"publisher","unstructured":"DuPont, J., Squicciarini, A.C.: Toward de-anonymizing bitcoin by mapping users location. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, pp. 139\u2013141. ACM, New York (2015). https:\/\/doi.org\/10.1145\/2699026.2699128","DOI":"10.1145\/2699026.2699128"},{"key":"45_CR6","doi-asserted-by":"publisher","unstructured":"Ermilov, D., Panov, M., Yanovich, Y.: Automatic bitcoin address clustering. In: 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 461\u2013466, December 2017. https:\/\/doi.org\/10.1109\/ICMLA.2017.0-118","DOI":"10.1109\/ICMLA.2017.0-118"},{"issue":"6","key":"45_CR7","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/MNET.2018.1700269","volume":"32","author":"F Gao","year":"2018","unstructured":"Gao, F., Zhu, L., Shen, M., Sharif, K., Wan, Z., Ren, K.: A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. IEEE Netw. 32(6), 184\u2013192 (2018)","journal-title":"IEEE Netw."},{"key":"45_CR8","unstructured":"Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin\u2019s peer-to-peer network. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 129\u2013144. USENIX Association, Washington, D.C. (2015)"},{"key":"45_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/978-3-662-45472-5_30","volume-title":"Financial Cryptography and Data Security","author":"P Koshy","year":"2014","unstructured":"Koshy, P., Koshy, D., McDaniel, P.: An analysis of anonymity in bitcoin using P2P network traffic. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 469\u2013485. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_30"},{"key":"45_CR10","doi-asserted-by":"publisher","unstructured":"Liao, K., Zhao, Z., Doupe, A., Ahn, G.J.: Behind closed doors: measurement and analysis of cryptolocker ransoms in bitcoin. In: 2016 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u201313, June 2016. https:\/\/doi.org\/10.1109\/ECRIME.2016.7487938","DOI":"10.1109\/ECRIME.2016.7487938"},{"key":"45_CR11","doi-asserted-by":"publisher","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: 2008 IEEE Symposium on Security and Privacy (SP 2008), pp. 111\u2013125, May 2008. https:\/\/doi.org\/10.1109\/SP.2008.33","DOI":"10.1109\/SP.2008.33"},{"issue":"2","key":"45_CR12","doi-asserted-by":"publisher","first-page":"237","DOI":"10.3390\/fi5020237","volume":"5","author":"M Ober","year":"2013","unstructured":"Ober, M., Katzenbeisser, S., Hamacher, K.: Structure and anonymity of the bitcoin transaction graph. Future Internet 5(2), 237\u2013250 (2013). https:\/\/doi.org\/10.3390\/fi5020237","journal-title":"Future Internet"},{"key":"45_CR13","doi-asserted-by":"publisher","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, pp. 1318\u20131326, October 2011. https:\/\/doi.org\/10.1109\/PASSAT\/SocialCom.2011.79","DOI":"10.1109\/PASSAT\/SocialCom.2011.79"},{"key":"45_CR14","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-319-72150-7_14","volume-title":"Complex Networks & Their Applications VI","author":"C Remy","year":"2018","unstructured":"Remy, C., Rym, B., Matthieu, L.: Tracking bitcoin users activity using community detection on a network of weak signals. In: Cherifi, C., Cherifi, H., Karsai, M., Musolesi, M. (eds.) COMPLEX NETWORKS 2017 2017. SCI, vol. 689, pp. 166\u2013177. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-72150-7_14"},{"issue":"5","key":"45_CR15","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MNET.001.1800503","volume":"33","author":"M Shen","year":"2019","unstructured":"Shen, M., Deng, Y., Zhu, L., Du, X., Guizani, N.: Privacy-preserving image retrieval for medical iot systems: a blockchain-based approach. IEEE Netw. 33(5), 27\u201333 (2019)","journal-title":"IEEE Netw."},{"issue":"6","key":"45_CR16","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/JSAC.2020.2986619","volume":"38","author":"M Shen","year":"2020","unstructured":"Shen, M., Duan, J., Zhu, L., Zhang, J., Du, X., Guizani, M.: Blockchain-based incentives for secure and collaborative data sharing in multiple clouds. IEEE J. Sel. Areas Commun. 38(6), 1229\u20131241 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"5","key":"45_CR17","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1109\/JSAC.2020.2980916","volume":"38","author":"M Shen","year":"2020","unstructured":"Shen, M., et al.: Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J. Sel. Areas Commun. 38(5), 942\u2013954 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"4","key":"45_CR18","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1109\/TIFS.2017.2774451","volume":"13","author":"M Shen","year":"2017","unstructured":"Shen, M., Ma, B., Zhu, L., Mijumbi, R., Du, X., Hu, J.: Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection. IEEE Trans. Inf. Forensics Secur. 13(4), 940\u2013953 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"45_CR19","doi-asserted-by":"crossref","unstructured":"Shen, M., Zhang, J., Zhu, L., Xu, K., Tang, X.: Secure svm training over vertically-partitioned datasets using consortium blockchain for vehicular social networks. IEEE Trans. Veh. Technol. (2019)","DOI":"10.1109\/TVT.2019.2957425"},{"key":"45_CR20","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.1109\/ACCESS.2016.2577036","volume":"4","author":"S Yu","year":"2016","unstructured":"Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751\u20132763 (2016)","journal-title":"IEEE Access"},{"issue":"1","key":"45_CR21","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/TKDE.2014.2320725","volume":"27","author":"S Yu","year":"2014","unstructured":"Yu, S., Gu, G., Barnawi, A., Guo, S., Stojmenovic, I.: Malware propagation in large-scale networks. IEEE Trans. Knowl. Data Eng. 27(1), 170\u2013179 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"45_CR22","doi-asserted-by":"publisher","first-page":"1381","DOI":"10.1109\/TIFS.2012.2197392","volume":"7","author":"S Yu","year":"2012","unstructured":"Yu, S., Zhao, G., Dou, W., James, S.: Predicted packet padding for anonymous web browsing against traffic analysis attacks. IEEE Trans. Inf. Forensics Secur. 7(4), 1381\u20131393 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"45_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2919517","author":"C Zhang","year":"2019","unstructured":"Zhang, C., Zhu, L., Xu, C., Liu, X., Sharif, K.: Reliable and privacy-preserving truth discovery for mobile crowdsensing systems. IEEE Trans. Dependable Secure Comput. (2019). https:\/\/doi.org\/10.1109\/TDSC.2019.2919517","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"45_CR24","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-24123-4_5","volume-title":"Advances in Digital Forensics XI","author":"C Zhao","year":"2015","unstructured":"Zhao, C., Guan, Y.: A graph-based investigation of bitcoin transactions. In: Peterson, G., Shenoi, S. (eds.) DigitalForensics 2015. IAICT, vol. 462, pp. 79\u201395. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24123-4_5"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:42:06Z","timestamp":1619318526000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_45","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}