{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:43:16Z","timestamp":1774719796670,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819611478","type":"print"},{"value":"9789819611485","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1148-5_3","type":"book-chapter","created":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T13:44:40Z","timestamp":1737121480000},"page":"27-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Anti-side-channel Attack Mechanisms in\u00a0Blockchain Payment Channels"],"prefix":"10.1007","author":[{"given":"Yijia","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xinqi","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Jingxin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lianjin","family":"He","sequence":"additional","affiliation":[]},{"given":"Mingyue","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yilei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,18]]},"reference":[{"key":"3_CR1","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)"},{"key":"3_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2023.109006","volume":"265","author":"C Dong","year":"2023","unstructured":"Dong, C., Huang, Q., Fang, D.: Channel selection and pricing strategy with supply chain finance and blockchain. Int. J. Prod. Econ. 265, 109006 (2023)","journal-title":"Int. J. Prod. Econ."},{"issue":"2","key":"3_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3376915","volume":"53","author":"EJ De Aguiar","year":"2020","unstructured":"De Aguiar, E.J., Fai\u00e7al, B.S., Krishnamachari, B., Ueyama, J.: A survey of blockchain-based strategies for healthcare. ACM Comput. Surv. 53(2), 1\u201327 (2020)","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"3_CR4","doi-asserted-by":"publisher","first-page":"3338","DOI":"10.1109\/JIOT.2020.2967119","volume":"7","author":"P Koshy","year":"2020","unstructured":"Koshy, P., Babu, S., Manoj, B.S.: Sliding window blockchain architecture for Internet of Things. IEEE Internet Things J. 7(4), 3338\u20133348 (2020)","journal-title":"IEEE Internet Things J."},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Dziembowski, S., Eckey, L., Faust, S., Malinowski, D.: Perun: virtual payment hubs over cryptocurrencies. In: 2019 IEEE Symposium on Security and Privacy, pp. 106\u2013123. (2019)","DOI":"10.1109\/SP.2019.00020"},{"key":"3_CR6","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer Science & Business Media 31 (2007)"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"3401","DOI":"10.1109\/TIFS.2023.3281064","volume":"18","author":"X Jia","year":"2023","unstructured":"Jia, X., Yu, Z., Shao, J., Lu, R., Wei, G., Liu, Z.: Cross-chain virtual payment channels. IEEE Trans. Inf. Forensics Secur. 18, 3401\u20133413 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3_CR8","doi-asserted-by":"publisher","unstructured":"Standaert, F. X.: Introduction to side-channel attacks. In: Verbauwhede, I. (eds), pp. 27\u201342. Springer, Boston, MA (2010). https:\/\/doi.org\/10.1007\/978-0-387-71829-3_2","DOI":"10.1007\/978-0-387-71829-3_2"},{"key":"3_CR9","unstructured":"Poon, J., Dryja, T.: The bitcoin lightning network: Scalable off-chain instant payments (2016)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Malavolta, G., Moreno-Sanchez, P., Schneidewind, C., Kate, A., Maffei, M.: Anonymous multi-hop locks for blockchain scalability and interoperability. In: Network and Distributed System Security Symposium (2019)","DOI":"10.14722\/ndss.2019.23330"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Kocher, P.: Differential power analysis. In: Proceeding Advances in Cryptology (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"4","key":"3_CR12","doi-asserted-by":"publisher","first-page":"3416","DOI":"10.1109\/COMST.2018.2842460","volume":"20","author":"M Conti","year":"2018","unstructured":"Conti, M., Kumar, E.S., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. IEEE Commun. Surv. Tutorials 20(4), 3416\u20133452 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"3_CR13","doi-asserted-by":"publisher","unstructured":"Author, F.: SoK: communication across distributed ledgers. In: Borisov, N., Diaz, C. (eds) FC 2021, LNCS, vol. 12675, pp. 3\u201336. Springer, Berlin, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-64331-0_1","DOI":"10.1007\/978-3-662-64331-0_1"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Aumayr, L., Moreno-Sanchez, P., Kate, A., Maffei, M.: Breaking and fixing virtual channels: Domino attack and donner. In: Network and Distributed System Security Symposium (2023)","DOI":"10.14722\/ndss.2023.24370"},{"issue":"4","key":"3_CR15","first-page":"54","volume":"1","author":"G Joy Persial","year":"2011","unstructured":"Joy Persial, G., Prabhu, M., Shanmugalakshmi, R.: Side channel attack-survey. Int. J. Adv. Sci. Res. Rev 1(4), 54\u201357 (2011)","journal-title":"Int. J. Adv. Sci. Res. Rev"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1148-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T13:45:16Z","timestamp":1737121516000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1148-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819611478","9789819611485"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1148-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"18 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIS&P","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ais&p2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}