{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:23:01Z","timestamp":1730272981344,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,9]]},"DOI":"10.1109\/iscisc51277.2020.9261905","type":"proceedings-article","created":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T19:02:15Z","timestamp":1606158135000},"page":"54-59","source":"Crossref","is-referenced-by-count":1,"title":["Improvements on Easypaysy: The Bitcoin\u2019s Layer-2 Accounts Protocol"],"prefix":"10.1109","author":[{"given":"Elnaz","family":"Ebadi","sequence":"first","affiliation":[]},{"given":"Habib","family":"Yajam","sequence":"additional","affiliation":[]},{"given":"MohammadAli","family":"Akhaee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813713"},{"article-title":"Bitcoin beacon","year":"2016","author":"bentov","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2018.8661008"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23086"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180454"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813616"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.27"},{"journal-title":"Simplifying OTR deniability","year":"2013","author":"moxie","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36178-2_34"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_17"},{"journal-title":"Brave New Coin","year":"2016","author":"luke","key":"ref4"},{"journal-title":"Report 2 3 Million Bitcoin Addresses Targeted by Malware That &#x2018;Hijacks&#x2019; Windows Clipboard","year":"2018","author":"suberg","key":"ref3"},{"key":"ref6","first-page":"352","article-title":"Sok: A taxonomy for layer-2 scalability related protocols for cryptocurrencies","volume":"2019","author":"jourenko","year":"2019","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref5","article-title":"Improving bitcoin&#x2019;s ux by replacing addresses with account ids","author":"ca\u00f1uelo","year":"2019","journal-title":"easypaysy org"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07536-5_6"},{"article-title":"The bitcoin lightning network: Scalable off-chain instant payments","year":"2016","author":"poon","key":"ref7"},{"journal-title":"Address Bitcoin Wiki","year":"0","key":"ref2"},{"key":"ref1","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2019","journal-title":"Manubot Tech Rep"},{"key":"ref9","first-page":"1","article-title":"Plasma: Scalable autonomous smart contracts","author":"poon","year":"2017","journal-title":"White Paper"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_26"},{"key":"ref21","article-title":"Pairing-Friendly Curves","author":"sakemi","year":"2019","journal-title":"Internet Engineering Task Force Internet-Draft draft-irtf-cfrg-pairing-friendly-curves-00"}],"event":{"name":"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2020,9,9]]},"location":"Tehran, Iran","end":{"date-parts":[[2020,9,10]]}},"container-title":["2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9261900\/9261901\/09261905.pdf?arnumber=9261905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:54:35Z","timestamp":1656438875000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9261905\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iscisc51277.2020.9261905","relation":{},"subject":[],"published":{"date-parts":[[2020,9,9]]}}}