{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:09:38Z","timestamp":1764238178346},"reference-count":6,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/gcce46687.2019.9015245","type":"proceedings-article","created":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T05:21:46Z","timestamp":1582867306000},"page":"71-73","source":"Crossref","is-referenced-by-count":6,"title":["Multiple Layered Security Analyses Method for Cryptocurrency Exchange Servicers"],"prefix":"10.1109","author":[{"given":"Hironao","family":"Takahashi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Uzair","family":"Lakhani","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref4","article-title":"Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk","author":"tyler","year":"2013","journal-title":"Proceedings of Financial Cryptography 2013"},{"key":"ref3","article-title":"A Large-Scale Study of Mobile Web App Security","author":"patrick","year":"2015","journal-title":"Mobile Security Technologies Workshop (MoST)"},{"key":"ref6","article-title":"Securing Bitcoin wallets via a new DSA\/ECDSA threshold signature scheme","author":"steven","year":"2015","journal-title":"Manuscript"},{"key":"ref5","article-title":"Foundation of Semantic Rule Engine To Protect Web Application Attacks","author":"abdul","year":"0","journal-title":"2011 10th International Symposium on Autonomous Decentralized Systems (ISADS)"},{"year":"2019","key":"ref2"},{"key":"ref1","article-title":"Secure Sharing for Cryptocurrency Wallet in Autonomous Decentralized Multi Layered Cache System","author":"hironao","year":"2019","journal-title":"ISADS"}],"event":{"name":"2019 IEEE 8th Global Conference on Consumer Electronics (GCCE)","start":{"date-parts":[[2019,10,15]]},"location":"Osaka, Japan","end":{"date-parts":[[2019,10,18]]}},"container-title":["2019 IEEE 8th Global Conference on Consumer Electronics (GCCE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8977397\/9014630\/09015245.pdf?arnumber=9015245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:50:50Z","timestamp":1658080250000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9015245\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/gcce46687.2019.9015245","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}