{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T11:19:49Z","timestamp":1775042389162,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/icbc56567.2023.10174959","type":"proceedings-article","created":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T17:20:50Z","timestamp":1689182450000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Crypto Assets Custody: Taxonomy, Components, and Open Challenges"],"prefix":"10.1109","author":[{"given":"Zakwan","family":"Jaroucheh","sequence":"first","affiliation":[{"name":"School of Computing, Engineering and Built Environment, Edinburgh Napier University"}]},{"given":"Baraq","family":"Ghaleb","sequence":"additional","affiliation":[{"name":"School of Computing, Engineering and Built Environment, Edinburgh Napier University"}]}],"member":"263","reference":[{"key":"ref13","year":"0","journal-title":"Ledger Hardware wallet and cold wallet"},{"key":"ref12","year":"0","journal-title":"Trezor hardware wallet"},{"key":"ref15","year":"0","journal-title":"Qredo crypto infrastructure"},{"key":"ref14","year":"0","journal-title":"Zengo crypto wallet"},{"key":"ref31","article-title":"Bandwidth-efficient threshold ec-dsa revisited: Online\/offline extensions, identifiable aborts, proactivity and adaptive security","author":"castagnos","year":"2021","journal-title":"Cryptology ePrint Archive"},{"key":"ref30","article-title":"Uc non-interactive, proactive, threshold ecdsa","author":"canetti","year":"2020","journal-title":"Cryptology ePrint Archive"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1108\/978-1-80455-320-620221016"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/math8101773"},{"key":"ref32","article-title":"Threshold ecdsa for decentralized asset custody","author":"gagol","year":"2020","journal-title":"Cryptology ePrint Archive"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.najef.2021.101499"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.econlet.2022.110856"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCSP49186.2020.9315193"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICIC48496.2019.8966739"},{"key":"ref19","year":"0","journal-title":"Gemini Cryptocurrency exchange"},{"key":"ref18","year":"0","journal-title":"Bitgo securely access crypto"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3412841.3441910"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16168-1_7"},{"key":"ref25","author":"ebrahimi","year":"2021","journal-title":"Enhancing cold wallet security with native multi-signature schemes in centralized exchanges"},{"key":"ref20","year":"0","journal-title":"Coinbase custody"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014007"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3217815"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_22"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243788"},{"key":"ref29","author":"gennaro","year":"2020","journal-title":"One round threshold ecdsa with identifiable abort"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"150","DOI":"10.69554\/KXEK5506","article-title":"The unique and complex considerations of digital asset custody","volume":"13","author":"walker","year":"2021","journal-title":"J of Securities Operations & Custody"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/math8101773"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66433-6_12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243788"},{"key":"ref3","year":"2021","journal-title":"Deloitte's 2021 global blockchain survey"},{"key":"ref6","article-title":"A survey of ecdsa threshold signing","author":"aumasson","year":"2020","journal-title":"Cryptology ePrint Archive"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2022.100569"}],"event":{"name":"2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Dubai, United Arab Emirates","start":{"date-parts":[[2023,5,1]]},"end":{"date-parts":[[2023,5,5]]}},"container-title":["2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10174862\/10174863\/10174959.pdf?arnumber=10174959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,24]],"date-time":"2024-10-24T01:07:48Z","timestamp":1729732068000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10174959\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icbc56567.2023.10174959","relation":{},"subject":[],"published":{"date-parts":[[2023,5,1]]}}}