{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T13:56:52Z","timestamp":1762610212888,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1109\/icbc59979.2024.10634478","type":"proceedings-article","created":{"date-parts":[[2024,8,21]],"date-time":"2024-08-21T22:53:39Z","timestamp":1724280819000},"page":"225-229","source":"Crossref","is-referenced-by-count":0,"title":["Shared Send Mixers Untangling in Bitcoin Clustering Heuristics Adjustment"],"prefix":"10.1109","author":[{"given":"Nikolay","family":"Larionov","sequence":"first","affiliation":[{"name":"Moscow Institute of Physics and Technology,Blockchain Department,Moscow,Russia"}]},{"given":"Yury","family":"Yanovich","sequence":"additional","affiliation":[{"name":"Moscow Institute of Physics and Technology,Blockchain Department,Moscow,Russia"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"Nakamoto","year":"2008"},{"key":"ref2","article-title":"Weak Privacy Guarantees for SharedCoin Mixing Service","volume-title":"Tech. Rep","author":"Atlas","year":"2014"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3238412"},{"key":"ref4","first-page":"1","article-title":"Shared Send Untangling in Bitcoin","volume":"2016","author":"Yanovich","year":"2016","journal-title":"bitfury.com"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18283-9_19"},{"article-title":"Pay to Script Hash","year":"2012","author":"Andresen","key":"ref6"},{"article-title":"Segregated Witness (Consensus layer)","year":"2015","author":"Lombrozo","key":"ref7"},{"article-title":"(bip-0032) Hierarchical Deterministic Wallets","year":"2012","author":"Wuille","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/978-1-4614-4139-7_10","article-title":"An Analysis of Anonymity in the Bitcoin System","author":"Reid","year":"2013","journal-title":"in Security and Privacy in Social Networks"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"ref12","first-page":"461","article-title":"Automatic Bitcoin Address Clustering","volume-title":"IEEE International Conference on Machine Learning and Applications (ICMLA)","author":"Ermilov"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00047"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2023.3239031"},{"article-title":"CoinJoin: Bitcoin privacy for the real world","year":"2013","author":"Maxwell","key":"ref15"},{"article-title":"Internet organised crime threat assessment (IOCTA) 2020","volume-title":"Tech. Rep","year":"2020","key":"ref16"},{"article-title":"Internet Organised Crime Threat Assessment (IOCTA) 2021","volume-title":"Tech. Rep","year":"2021","key":"ref17"},{"key":"ref18","first-page":"388","article-title":"Diffusion: Analysis of Many-to-Many Transactions in Bitcoin","volume-title":"in 2021 IEEE International Conference on Blockchain (Blockchain)","author":"Eck"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3293651"},{"article-title":"Join Me on a Market for Anonymity","volume-title":"Workshop on the Economics of Information Security","author":"M\u00a8oser","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0038"},{"key":"ref22","first-page":"2721","article-title":"BlockSci: Design and applications of a blockchain analysis platform","volume-title":"in 29th USENIX Security Symposium (USENIX Security 20). USENIX Association","author":"Kalodner"}],"event":{"name":"2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","start":{"date-parts":[[2024,5,27]]},"location":"Dublin, Ireland","end":{"date-parts":[[2024,5,31]]}},"container-title":["2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10634319\/10634334\/10634478.pdf?arnumber=10634478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T05:17:18Z","timestamp":1725340638000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10634478\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icbc59979.2024.10634478","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]}}}