{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T08:08:58Z","timestamp":1770883738969,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T00:00:00Z","timestamp":1506297600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"PRA, Progetto di Ricerca di Ateneo, \u201cBig Data, Social Mining and Risk Management\u201d, University of Pisa"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Data Sci Anal"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s41060-017-0074-x","type":"journal-article","created":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T14:53:26Z","timestamp":1506351206000},"page":"63-80","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":76,"title":["Data-driven analysis of Bitcoin properties: exploiting the users graph"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1286-0596","authenticated-orcid":false,"given":"Damiano","family":"Di Francesco Maesa","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Marino","sequence":"additional","affiliation":[]},{"given":"Laura","family":"Ricci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,25]]},"reference":[{"issue":"6","key":"74_CR1","doi-asserted-by":"crossref","first-page":"e6017","DOI":"10.1371\/journal.pone.0006017","volume":"4","author":"K Komurov","year":"2009","unstructured":"Komurov, K., Gunes, M.H., White, M.A.: Fine-scale dissection of functional protein network organization by statistical network analysis. PLoS ONE 4(6), e6017 (2009)","journal-title":"PLoS ONE"},{"key":"74_CR2","doi-asserted-by":"crossref","unstructured":"Cheung, D., Gunes, M.H.: A complex network analysis of the united states air transportation. In: Proceedings IEEE\/ACM ASONAM, pp. 699\u2013701. Washington, DC (2012)","DOI":"10.1109\/ASONAM.2012.116"},{"key":"74_CR3","doi-asserted-by":"crossref","unstructured":"Kardes, H., Sevincer, A., Gunes, M., Yuksel, M.: Six degrees of separation among US researchers. In: Proceedings of IEEE\/ACM SONAM, pp. 654\u2013659 (2012)","DOI":"10.1109\/ASONAM.2012.109"},{"key":"74_CR4","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"74_CR5","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Financial Cryptography and Data Security\u201417th International Conference, FC, Okinawa, Japan, April 1\u20135, 2013. Revised Selected Papers 2013, pp. 6\u201324 (2013)"},{"key":"74_CR6","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Internet Measurement Conference, IMC 2013, Barcelona, Spain, 23\u201325 Oct 2013, pp. 127\u2013140 (2013)","DOI":"10.1145\/2504730.2504747"},{"issue":"2","key":"74_CR7","doi-asserted-by":"crossref","first-page":"237","DOI":"10.3390\/fi5020237","volume":"5","author":"M Ober","year":"2013","unstructured":"Ober, M., Katzenbeisser, S., Hamacher, K.: Structure and anonymity of the bitcoin transaction graph. Future Internet 5(2), 237\u2013250 (2013)","journal-title":"Future Internet"},{"key":"74_CR8","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Karame, G., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Financial Cryptography and Data Security\u201417th International Conference, FC, Okinawa, Japan, 1\u20135 Apr 2013. Revised Selected Papers 2013, pp. 34\u201351 (2013)","DOI":"10.1007\/978-3-642-39884-1_4"},{"issue":"2","key":"74_CR9","doi-asserted-by":"crossref","first-page":"e86197","DOI":"10.1371\/journal.pone.0086197","volume":"9","author":"D Kondor","year":"2014","unstructured":"Kondor, D., P\u00f3sfai, M., Csabai, I., Vattay, G.: Do the rich get richer? An empirical analysis of the bitcoin transaction network. PloS ONE 9(2), e86197 (2014)","journal-title":"PloS ONE"},{"issue":"1","key":"74_CR10","doi-asserted-by":"crossref","first-page":"7","DOI":"10.3390\/fi8010007","volume":"8","author":"M Lischke","year":"2016","unstructured":"Lischke, M., Fabian, B.: Analyzing the bitcoin network: the first four years. Future Internet 8(1), 7 (2016)","journal-title":"Future Internet"},{"key":"74_CR11","unstructured":"Block chain info charts. https:\/\/blockchain.info\/charts\/"},{"key":"74_CR12","doi-asserted-by":"crossref","unstructured":"Maesa, D.D.F., Marino, A., Ricci, L.: Uncovering the bitcoin blockchain: an analysis of the full users graph. In IEEE DSAA 2016, 3rd IEEE International Conference on Data Science and Advanced Analytics, Montreal, October (2016)","DOI":"10.1109\/DSAA.2016.52"},{"key":"74_CR13","unstructured":"Fergal, R., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Proceeding of 2011 PASSAT\/SocialCom 2011, pp. 1318\u20131326. IEEE (2011)"},{"key":"74_CR14","doi-asserted-by":"crossref","unstructured":"Ruffing, T., Moreno-Sanchez, P., Kate, A.: Coinshuffle: Practical decentralized coin mixing for bitcoin. In: Computer Security-ESORICS, pp. 345\u2013364. Springer (2014)","DOI":"10.1007\/978-3-319-11212-1_20"},{"key":"74_CR15","doi-asserted-by":"crossref","unstructured":"Harrigan, M., Fretter, C.: The unreasonable effectiveness of address clustering. In: 13th IEEE International Conference on Advanced and Trusted Computing (ATC16) (2016)","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0071"},{"key":"74_CR16","doi-asserted-by":"crossref","unstructured":"Popuri, M.K., Gunes, M.H.: Empirical analysis of crypto currencies. In: 7th Workshop on Complex Networks (CompleNet), Dijon, France, Mar 23\u201325 (2016)","DOI":"10.1007\/978-3-319-30569-1_21"},{"key":"74_CR17","unstructured":"Maesa, D.D.F., Marino, A., Ricci, L.: An analysis of the bitcoin users graph: inferring unusual behaviours. In: Proceedings of the 5-th International Workshop on Complex Networks and their Applications, Milan (2016)"},{"key":"74_CR18","unstructured":"US NIST: Descriptions of sha-256, sha-384 and sha-512 (2001)"},{"issue":"2","key":"74_CR19","first-page":"9","volume":"3","author":"B Preneel","year":"1997","unstructured":"Preneel, B., Bosselaers, A., Dobbertin, H.: The cryptographic hash function RIPEMD-160. CryptoBytes 3(2), 9\u201314 (1997)","journal-title":"CryptoBytes"},{"issue":"1","key":"74_CR20","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36\u201363 (2001)","journal-title":"Int. J. Inf. Secur."},{"key":"74_CR21","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: A digital signature based on a conventional encryption function. In: Proceedings of Advances in Cryptology\u2014CRYPTO \u201987, Santa Barbara, California, USA, 16\u201320 Aug 1987, pp. 369\u2013378 (1987)","DOI":"10.1007\/3-540-48184-2_32"},{"key":"74_CR22","doi-asserted-by":"crossref","unstructured":"Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Advances in Cryptology-CRYPTO92, pp. 139\u2013147. Springer (1992)","DOI":"10.1007\/3-540-48071-4_10"},{"key":"74_CR23","doi-asserted-by":"crossref","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: Analysis and applications. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 281\u2013310. Springer (2015)","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"74_CR24","unstructured":"Miller, A., LaViola Jr., J.J.: Anonymous byzantine consensus from moderately-hard puzzles: a model for bitcoin. http:\/\/nakamotoinstitute.org\/research\/anonymous-byzantine-consensus (2014)"},{"key":"74_CR25","unstructured":"Back, A., et al.: Hashcash\u2014a denial of service counter-measure (2002). http:\/\/www.hashcash.org\/papers\/hashcash.pdf"},{"key":"74_CR26","unstructured":"Protocolbuffers. https:\/\/developers.google.com\/protocol-buffers\/"},{"key":"74_CR27","unstructured":"Block chain info tags. https:\/\/blockchain.info\/tags"},{"key":"74_CR28","unstructured":"Wallet explorer. https:\/\/www.walletexplorer.com\/"},{"key":"74_CR29","unstructured":"Boldi, P., Vigna, S.: Axioms for centrality. Internet Math. 10(3\u20134):222\u2013262 (2014). http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/15427951.2013.865686"},{"key":"74_CR30","doi-asserted-by":"crossref","unstructured":"Boldi, P., Vigna, S.: The webgraph framework I: compression techniques. In: Proceedings of the 13th International Conference on World Wide Web, ser. WWW \u201904, pp. 595\u2013602. ACM (2004)","DOI":"10.1145\/988672.988752"},{"key":"74_CR31","doi-asserted-by":"crossref","unstructured":"Boldi, P., Rosa, M., and Vigna, S.: Hyperanf: Approximating the neighbourhood function of very large graphs on a budget. In: Proceedings of the 20th International Conference on World Wide Web, pp. 625\u2013634. ACM (2011)","DOI":"10.1145\/1963405.1963493"},{"key":"74_CR32","doi-asserted-by":"crossref","unstructured":"Borassi, M., Crescenzi, P., Habib, M., Kosters, W.A., Marino, A., Takes, F.W.: On the solvability of the six degrees of Kevin Bacon game\u2014a faster graph diameter and radius computation method. In: Fun with Algorithms\u20147th International Conference, FUN 2014, Lipari Island, Sicily, Italy, 1\u20133 July 2014. Proceedings, pp. 52\u201363 (2014)","DOI":"10.1007\/978-3-319-07890-8_5"},{"key":"74_CR33","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Kleinberg, J., Faloutsos, C.: Graphs over time: densification laws, shrinking diameters and possible explanations. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 177\u2013187. ACM (2005)","DOI":"10.1145\/1081870.1081893"},{"key":"74_CR34","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Boldi, P., Rosa, M., Ugander, J., Vigna, S.: Four degrees of separation. In: Proceedings of the 4th Annual ACM Web Science Conference, pp. 33\u201342. ACM (2012)","DOI":"10.1145\/2380718.2380723"},{"issue":"4","key":"74_CR35","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1137\/0207033","volume":"7","author":"A Itai","year":"1978","unstructured":"Itai, A., Rodeh, M.: Finding a minimum circuit in a graph. SIAM J. Comput. 7(4), 413\u2013423 (1978)","journal-title":"SIAM J. Comput."},{"issue":"1","key":"74_CR36","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1137\/0214017","volume":"14","author":"N Chiba","year":"1985","unstructured":"Chiba, N., Nishizeki, T.: Arboricity and subgraph listing algorithms. SIAM J. Comput. 14(1), 210\u2013223 (1985)","journal-title":"SIAM J. Comput."},{"key":"74_CR37","doi-asserted-by":"crossref","unstructured":"Becchetti, L., Boldi, P., Castillo, C., Gionis, A.: Efficient semi-streaming algorithms for local triangle counting in massive graphs. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 16\u201324. ACM (2008)","DOI":"10.1145\/1401890.1401898"},{"issue":"6684","key":"74_CR38","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts, D.J., Strogatz, S.H.: Collective dynamics of small-world networks. Nature 393(6684), 440\u2013442 (1998)","journal-title":"Nature"},{"key":"74_CR39","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","volume":"74","author":"R Albert","year":"2002","unstructured":"Albert, R., Barabsi, A.L.: Statistical mechanics of complex networks. Rev. Mod. Phys. 74, 47 (2002)","journal-title":"Rev. Mod. Phys."},{"key":"74_CR40","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: bringing order to the web (1999)"},{"key":"74_CR41","unstructured":"Berman, A., Plemmons, R.: Nonnegative matrices in the mathematical sciences. Soc. Ind. Appl. Math. (1994). http:\/\/epubs.siam.org\/doi\/abs\/10.1137\/1.9781611971262"},{"key":"74_CR42","doi-asserted-by":"crossref","unstructured":"Boldi, P., Vigna, S.: In-core computation of geometric centralities with hyperball: a hundred billion nodes and beyond. In: Proceedings of the 13th IEEE International Conference on Data Mining Workshops (ICDM), pp. 621\u2013628 (2013)","DOI":"10.1109\/ICDMW.2013.10"},{"key":"74_CR43","unstructured":"Current standard for dust limit. https:\/\/github.com\/bitcoin\/bitcoin\/blob\/v0.10.0rc3\/src\/primitives\/transaction.h#L137"},{"issue":"2","key":"74_CR44","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/S003614450342480","volume":"45","author":"ME Newman","year":"2003","unstructured":"Newman, M.E.: The structure and function of complex networks. SIAM Rev. 45(2), 167\u2013256 (2003)","journal-title":"SIAM Rev."},{"key":"74_CR45","doi-asserted-by":"crossref","unstructured":"Borassi, M., Coudert, D., Crescenzi, P., Marino, A.: On computing the hyperbolicity of real-world graphs. In: Algorithms\u2014ESA 2015\u201423rd Annual European Symposium, Patras, Greece, 14\u201316 Sept 2015, Proceedings, pp. 215\u2013226 (2015)","DOI":"10.1007\/978-3-662-48350-3_19"}],"container-title":["International Journal of Data Science and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41060-017-0074-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-017-0074-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-017-0074-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T19:23:08Z","timestamp":1570130588000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41060-017-0074-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,25]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["74"],"URL":"https:\/\/doi.org\/10.1007\/s41060-017-0074-x","relation":{},"ISSN":["2364-415X","2364-4168"],"issn-type":[{"value":"2364-415X","type":"print"},{"value":"2364-4168","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,25]]}}}