{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:30:36Z","timestamp":1742934636347,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819723027"},{"type":"electronic","value":"9789819723034"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-2303-4_31","type":"book-chapter","created":{"date-parts":[[2024,5,28]],"date-time":"2024-05-28T08:02:03Z","timestamp":1716883323000},"page":"466-480","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CCBTC: A Blockchain-Based Covert Communication Scheme over\u00a0Bitcoin Transactions"],"prefix":"10.1007","author":[{"given":"Rundong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Bohao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Jie","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,29]]},"reference":[{"key":"31_CR1","unstructured":"Nakamoto S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Bus. Rev. (2008)"},{"key":"31_CR2","unstructured":"Zhang, T., Wu, Q., Tang, Z.: Research on steganographic information transmission based on bitcoin blockchain. J. Netw. Inf. Secur. 7(01), 84\u201392 (2021)"},{"issue":"2","key":"31_CR3","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1109\/TC.2022.3157996","volume":"72","author":"Y Liu","year":"2022","unstructured":"Liu, Y., Hao, X., Ren, W., et al.: A blockchain-based decentralized, fair and authenticated information sharing scheme in zero trust internet-of-things. IEEE Trans. Comput. 72(2), 501\u2013512 (2022)","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"31_CR4","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MNET.001.1900225","volume":"34","author":"F Gao","year":"2020","unstructured":"Gao, F., Zhu, L., Gai, K., et al.: Achieving a covert channel over an open blockchain network. IEEE Netw. 34(2), 6\u201313 (2020)","journal-title":"IEEE Netw."},{"key":"31_CR5","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.ins.2019.09.011","volume":"509","author":"L Li","year":"2020","unstructured":"Li, L., Liu, J., Chang, X., et al.: Toward conditionally anonymous Bitcoin transactions: a lightweight-script approach. Inf. Sci. 509, 290\u2013303 (2020)","journal-title":"Inf. Sci."},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Han, J., Woo, J., Hong, J.W.K.: Oversampling techniques for detecting bitcoin illegal transactions. In: 2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 330\u2013333. IEEE (2020)","DOI":"10.23919\/APNOMS50412.2020.9236780"},{"key":"31_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101684","volume":"89","author":"H Al Jawaheri","year":"2020","unstructured":"Al Jawaheri, H., Al Sabah, M., Boshmaf, Y., et al.: Deanonymizing Tor hidden service users through Bitcoin transactions analysis. Comput. Secur. 89, 101684 (2020)","journal-title":"Comput. Secur."},{"issue":"11","key":"31_CR8","doi-asserted-by":"publisher","first-page":"7026","DOI":"10.1109\/TWC.2021.3080382","volume":"20","author":"TX Zheng","year":"2021","unstructured":"Zheng, T.X., Yang, Z., Wang, C., et al.: Wireless covert communications aided by distributed cooperative jamming over slow fading channels. IEEE Trans. Wireless Commun. 20(11), 7026\u20137039 (2021)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"31_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-319-70278-0_14","volume-title":"Financial Cryptography and Data Security","author":"M Bartoletti","year":"2017","unstructured":"Bartoletti, M., Pompianu, L.: An analysis of bitcoin OP_RETURN metadata. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 218\u2013230. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_14"},{"key":"31_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1007\/978-3-030-41579-2_47","volume-title":"Information and Communications Security","author":"J Tian","year":"2020","unstructured":"Tian, J., Gou, G., Liu, C., Chen, Y., Xiong, G., Li, Z.: DLchain: a covert channel over blockchain based on dynamic labels. In: Zhou, J., Luo, X., Shen, Q., Xu, Z. (eds.) ICICS 2019. LNCS, vol. 11999, pp. 814\u2013830. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-41579-2_47"},{"issue":"3","key":"31_CR11","doi-asserted-by":"publisher","first-page":"18","DOI":"10.3390\/cryptography2030018","volume":"2","author":"J Partala","year":"2018","unstructured":"Partala, J.: Provably secure covert communication on blockchain. Cryptography 2(3), 18 (2018)","journal-title":"Cryptography"},{"issue":"5","key":"31_CR12","first-page":"67","volume":"40","author":"Y Li","year":"2019","unstructured":"Li, Y., Ding, L., Wu, J., et al.: Research on a new network covert channel model in blockchain environment. J. Commun. 40(5), 67\u201379 (2019)","journal-title":"J. Commun."},{"issue":"2","key":"31_CR13","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.camwa.2011.07.068","volume":"63","author":"A Castiglione","year":"2012","unstructured":"Castiglione, A., De Santis, A., Fiore, U., et al.: An asynchronous covert channel using spam. Comput. Math. Appl. 63(2), 437\u2013447 (2012)","journal-title":"Comput. Math. Appl."},{"issue":"16","key":"31_CR14","doi-asserted-by":"publisher","first-page":"14699","DOI":"10.1109\/JIOT.2020.3040389","volume":"9","author":"H Cao","year":"2020","unstructured":"Cao, H., Yin, H., Gao, F., et al.: Chain-based covert data embedding schemes in blockchain. IEEE Internet Things J. 9(16), 14699\u201314707 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"31_CR15","first-page":"1793","volume":"18","author":"R Xiao","year":"2019","unstructured":"Xiao, R., Ren, W., Zhu, T., et al.: A mixing scheme using a decentralized signature protocol for privacy protection in bitcoin blockchain. IEEE Trans. Dependable Secure Comput. 18(4), 1793\u20131803 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Miers, I., Garman, C., Green, M., et al.: Zerocoin: Anonymous distributed E-Cash from Bitcoin. In: 2013 IEEE Symposium on Security and Privacy, pp. 397\u2013411. IEEE (2013)","DOI":"10.1109\/SP.2013.34"},{"key":"31_CR17","unstructured":"Sasson, E.B., Chiesa, A., Garman, C., et al.: Zerocash: decentralized anonymous payments from Bitcoin. 2014 IEEE Symposium on Security and Privacy, pp. 459\u2013474. IEEE (2014)"},{"key":"31_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-662-53357-4_4","volume-title":"Financial Cryptography and Data Security","author":"E Heilman","year":"2016","unstructured":"Heilman, E., Baldimtsi, F., Goldberg, S.: Blindly signed contracts: anonymous on-blockchain and off-blockchain bitcoin transactions. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 43\u201360. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_4"}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-2303-4_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,28]],"date-time":"2024-05-28T08:07:14Z","timestamp":1716883634000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-2303-4_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819723027","9789819723034"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-2303-4_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APWeb-WAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apwebwaim2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.apweb-waim2023.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}