{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:18:47Z","timestamp":1725794327047},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/pimrc.2017.8292537","type":"proceedings-article","created":{"date-parts":[[2018,2,15]],"date-time":"2018-02-15T21:31:53Z","timestamp":1518730313000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Design of privacy-preserving mobile Bitcoin client based on \u03b3-deniability enabled bloom filter"],"prefix":"10.1109","author":[{"given":"Kota","family":"Kanemura","sequence":"first","affiliation":[]},{"given":"Kentaroh","family":"Toyoda","sequence":"additional","affiliation":[]},{"given":"Tomoaki","family":"Ohtsuki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-3-642-33627-0_27"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/SP.1980.10006"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/2664243.2664267"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/978-3-662-45472-5_29"},{"year":"2008","author":"nakamoto","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1080\/00036846.2015.1109038"},{"year":"2016","author":"jarnie","journal-title":"The evolution of the bitcoin vending machine","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/P2P.2013.6688717"},{"year":"2012","author":"hearn","journal-title":"BIP37 Connection Bloom filtering","key":"ref8"},{"year":"0","journal-title":"Bitcoin","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/2594288"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1038\/srep03415"},{"year":"1970","author":"bloom","journal-title":"Space\/time Trade-offs in Hash Coding with Allowable Errors","key":"ref9"}],"event":{"name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","start":{"date-parts":[[2017,10,8]]},"location":"Montreal, QC","end":{"date-parts":[[2017,10,13]]}},"container-title":["2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8288420\/8292162\/08292537.pdf?arnumber=8292537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,19]],"date-time":"2018-03-19T21:53:59Z","timestamp":1521496439000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8292537\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/pimrc.2017.8292537","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}