{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T08:20:16Z","timestamp":1772526016372,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T00:00:00Z","timestamp":1565740800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T00:00:00Z","timestamp":1565740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s41109-019-0163-y","type":"journal-article","created":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T12:03:29Z","timestamp":1565784209000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["The bow tie structure of the Bitcoin users graph"],"prefix":"10.1007","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1286-0596","authenticated-orcid":false,"given":"Damiano Di Francesco","family":"Maesa","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Marino","sequence":"additional","affiliation":[]},{"given":"Laura","family":"Ricci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,14]]},"reference":[{"key":"163_CR1","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-39884-1_4","volume-title":"International Conference on Financial Cryptography and Data Security","author":"E Androulaki","year":"2013","unstructured":"Androulaki, E, Karame GO, Roeschlin M, Scherer T, Capkun S (2013) Evaluating user privacy in bitcoin In: International Conference on Financial Cryptography and Data Security, 34\u201351.. Springer, Berlin."},{"key":"163_CR2","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-319-70278-0_14","volume-title":"International Conference on Financial Cryptography and Data Security","author":"M Bartoletti","year":"2017","unstructured":"Bartoletti, M, Pompianu L (2017) An analysis of Bitcoin OP_RETURN metadata In: International Conference on Financial Cryptography and Data Security, 218\u2013230.. Springer, Cham."},{"key":"163_CR3","unstructured":"Blockchain Info Tags (2019). \n                    https:\/\/blockchain.info\/tags\n                    \n                  . Accessed 14 Mar 2019."},{"key":"163_CR4","doi-asserted-by":"crossref","unstructured":"Bonneau, J, Miller A, Clark J, Narayanan A, Kroll JA, Felten EW (2015) Sok: Research perspectives and challenges for bitcoin and cryptocurrencies In: 2015 IEEE Symposium on Security and Privacy, 104\u2013121.. IEEE.","DOI":"10.1109\/SP.2015.14"},{"issue":"1-6","key":"163_CR5","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/S1389-1286(00)00083-9","volume":"33","author":"A Broder","year":"2000","unstructured":"Broder, A, Kumar R, Maghoul F, Raghavan P, Rajagopalan S, Stata R, Tomkins A, Wiener J (2000) Graph structure in the web. Comput Netw 33(1-6):309\u2013320.","journal-title":"Comput Netw"},{"key":"163_CR6","doi-asserted-by":"crossref","unstructured":"Di Francesco Maesa, D, Marino A, Ricci L (2016a) An analysis of the bitcoin users graph: inferring unusual behaviours In: International Workshop on Complex Networks and their Applications, 749\u2013760.. Springer, Cham.","DOI":"10.1007\/978-3-319-50901-3_59"},{"key":"163_CR7","doi-asserted-by":"crossref","unstructured":"Di Francesco Maesa D, Marino A, Ricci L (2016b) Uncovering the bitcoin blockchain: an analysis of the full users graph In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), 537\u2013546.. IEEE.","DOI":"10.1109\/DSAA.2016.52"},{"key":"163_CR8","doi-asserted-by":"crossref","unstructured":"Di Francesco Maesa, D, Marino A, Ricci L (2018a) Data-driven analysis of bitcoin properties: exploiting the users graph. Int J Data Sci Anal 6(1):63\u201380.","DOI":"10.1007\/s41060-017-0074-x"},{"key":"163_CR9","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.osnem.2017.10.006","volume":"3","author":"A Marino","year":"2017","unstructured":"Di Francesco Maesa D, Marino A, Ricci L (2017) Detecting artificial behaviours in the bitcoin users graph. Online Soc Netw Media 3:63\u201374.","journal-title":"Online Soc Netw Media"},{"key":"163_CR10","doi-asserted-by":"crossref","unstructured":"Di Francesco Maesa, D, Marino A, Ricci L (2018b) The graph structure of bitcoin In: International Conference on Complex Networks and Their Applications, 547\u2013558.. Springer, Cham.","DOI":"10.1007\/978-3-030-05414-4_44"},{"issue":"22","key":"163_CR11","doi-asserted-by":"publisher","first-page":"224017","DOI":"10.1088\/1751-8113\/41\/22\/224017","volume":"41","author":"D Donato","year":"2008","unstructured":"Donato, D, Leonardi S, Millozzi S, Tsaparas P (2008) Mining the inner structure of the web graph. J Phys A Math Theor 41(22):224017.","journal-title":"J Phys A Math Theor"},{"key":"163_CR12","first-page":"197","volume-title":"Security and privacy in social networks","author":"R Fergal","year":"2013","unstructured":"Fergal, R, Harrigan M (2013) An analysis of anonymity in the bitcoin system In: Security and privacy in social networks, 197\u2013223.. Springer, New York."},{"key":"163_CR13","doi-asserted-by":"crossref","unstructured":"Harrigan, M, Fretter C (2016) The unreasonable effectiveness of address clustering In: 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld, 368\u2013373.. IEEE.","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0071"},{"issue":"2","key":"163_CR14","doi-asserted-by":"publisher","first-page":"86197","DOI":"10.1371\/journal.pone.0086197","volume":"9","author":"D Kondor","year":"2014","unstructured":"Kondor, D, P\u00f3sfai M, Csabai I, Vattay G (2014) Do the rich get richer? An empirical analysis of the bitcoin transaction network. PloS ONE 9(2):86197.","journal-title":"PloS ONE"},{"issue":"1","key":"163_CR15","doi-asserted-by":"publisher","first-page":"7","DOI":"10.3390\/fi8010007","volume":"8","author":"M Lischke","year":"2016","unstructured":"Lischke, M, Fabian B (2016) Analyzing the bitcoin network: The first four years. Futur Internet 8(1):7. \n                    https:\/\/doi.org\/10.3390\/fi8010007\n                    \n                  .","journal-title":"Futur Internet"},{"issue":"2","key":"163_CR16","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1089\/big.2015.0056","volume":"4","author":"D McGinn","year":"2016","unstructured":"McGinn, D, Birch D, Akroyd D, Molina-Solana M, Guo Y, Knottenbelt WJ (2016) Visualizing dynamic bitcoin transaction patterns. Big Data 4(2):109\u2013119.","journal-title":"Big Data"},{"key":"163_CR17","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker GM, Savage S (2013) A fistful of bitcoins: characterizing payments among men with no names In: Proceedings of the 2013 conference on Internet measurement conference, 127\u2013140.. ACM.","DOI":"10.1145\/2504730.2504747"},{"key":"163_CR18","doi-asserted-by":"crossref","unstructured":"Meusel, R, Vigna S, Lehmberg O, Bizer C (2014) Graph structure in the web\u2014revisited: a trick of the heavy tail In: Proceedings of the 23rd International Conference on World Wide Web, 427\u2013432.. ACM.","DOI":"10.1145\/2567948.2576928"},{"key":"163_CR19","unstructured":"Nakamoto, S (2008) Bitcoin: A Peer-to-Peer Electronic Cash System."},{"key":"163_CR20","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-319-30569-1_21","volume-title":"Complex Networks VII","author":"MK Popuri","year":"2016","unstructured":"Popuri, MK, Gunes MH (2016) Empirical analysis of crypto currencies In: Complex Networks VII, 281\u2013292.. Springer, Cham."},{"key":"163_CR21","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"International Conference on Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D, Shamir A (2013) Quantitative analysis of the full bitcoin transaction graph In: International Conference on Financial Cryptography and Data Security, 6\u201324.. Springer, Berlin."}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-019-0163-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41109-019-0163-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-019-0163-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T23:18:48Z","timestamp":1597274328000},"score":1,"resource":{"primary":{"URL":"https:\/\/appliednetsci.springeropen.com\/articles\/10.1007\/s41109-019-0163-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,14]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["163"],"URL":"https:\/\/doi.org\/10.1007\/s41109-019-0163-y","relation":{},"ISSN":["2364-8228"],"issn-type":[{"value":"2364-8228","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,14]]},"assertion":[{"value":"14 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"56"}}