{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:44:06Z","timestamp":1730288646734,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T00:00:00Z","timestamp":1647820800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T00:00:00Z","timestamp":1647820800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,3,21]]},"DOI":"10.1109\/percomworkshops53856.2022.9767441","type":"proceedings-article","created":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T20:05:32Z","timestamp":1651867532000},"page":"279-284","source":"Crossref","is-referenced-by-count":1,"title":["Should I Mine or Should I Break: On the Worthiness of Brute-Forcing Cryptocurrency Addresses"],"prefix":"10.1109","author":[{"given":"Alessandro","family":"Brighente","sequence":"first","affiliation":[{"name":"Universtiy of Padova,Department of Mathematics and HIT Research Center,Italy"}]},{"given":"Martina","family":"Camaioni","sequence":"additional","affiliation":[{"name":"Universtiy of Padova,Department of Mathematics and HIT Research Center,Italy"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"Universtiy of Padova,Department of Mathematics and HIT Research Center,Italy"}]},{"given":"Emilio","family":"Olivastri","sequence":"additional","affiliation":[{"name":"Universtiy of Padova,Department of Mathematics and HIT Research Center,Italy"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASID.2017.8285737"},{"year":"2021","key":"ref11","article-title":"Ethereum white paper"},{"year":"2021","key":"ref12","article-title":"Transactions documentation"},{"article-title":"A search for good pseudorandom number generators: Survey and empirical studies","year":"2018","author":"bhattacharjee","key":"ref13"},{"key":"ref14","first-page":"609","article-title":"The bitcoin brain drain: Examining the use and abuse of bitcoin brain wallets","author":"vasek","year":"2016","journal-title":"International Conference on Financial Cryptography and Data Security"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref16","article-title":"Lost passwords lock millionaires out of their bitcoin fortunes","author":"popper","year":"2021","journal-title":"NY Times"},{"year":"2021","key":"ref17","article-title":"Rich list"},{"year":"2021","key":"ref18","article-title":"Top 100 richest bitcoin addresses"},{"key":"ref19","first-page":"919","article-title":"Bitcoin mining pools: A cooperative game theoretic analysis","author":"lewenberg","year":"2015","journal-title":"Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems"},{"key":"ref4","first-page":"868","article-title":"Sok: A taxonomy of cryptocurrency wallets","author":"karantias","year":"2020","journal-title":"IACR Cryptol ePrint Arch"},{"journal-title":"Bitcoin and Cryptocurrency Technologies A Comprehensive Introduction","year":"2016","author":"narayanan","key":"ref3"},{"key":"ref6","first-page":"653","article-title":"A survey of blockchain security issues and challenges","volume":"19","author":"lin","year":"2017","journal-title":"Int J Netw Secur"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2842460"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.08.008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-017-0074-x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.33166\/AETiC.2020.01.002"},{"key":"ref1","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2008","journal-title":"Decentralized Bus Rev"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/math8101645"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2018.11.046"},{"year":"2021","key":"ref22","article-title":"Household electricity prices worldwide in september 2020"},{"article-title":"Hashrate flows: 2020 from the crypto miner&#x2019;s perspective","year":"2020","author":"playsted","key":"ref21"}],"event":{"name":"2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)","start":{"date-parts":[[2022,3,21]]},"location":"Pisa, Italy","end":{"date-parts":[[2022,3,25]]}},"container-title":["2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9766442\/9767206\/09767441.pdf?arnumber=9767441","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:10:31Z","timestamp":1656965431000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9767441\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,21]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/percomworkshops53856.2022.9767441","relation":{},"subject":[],"published":{"date-parts":[[2022,3,21]]}}}