{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T00:24:46Z","timestamp":1778372686248,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T00:00:00Z","timestamp":1512950400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Siemens Corporation, CT"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,11]]},"DOI":"10.1145\/3152824.3152827","type":"proceedings-article","created":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T17:01:06Z","timestamp":1512061266000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["On the design of communication and transaction anonymity in blockchain-based transactive microgrids"],"prefix":"10.1145","author":[{"given":"Jonatan","family":"Bergquist","sequence":"first","affiliation":[{"name":"Datarella GmbH"}]},{"given":"Aron","family":"Laszka","sequence":"additional","affiliation":[{"name":"Vanderbilt University"}]},{"given":"Monika","family":"Sturm","sequence":"additional","affiliation":[{"name":"Siemens Corporate Technology"}]},{"given":"Abhishek","family":"Dubey","sequence":"additional","affiliation":[{"name":"Vanderbilt University"}]}],"member":"320","published-online":{"date-parts":[[2017,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In 2017 IEEE Symposium on Security and Privacy (SP). 375--392","author":"Apostolaki M."},{"key":"e_1_3_2_1_2_1","volume-title":"International Conference on. IEEE, 25--30","author":"Azaria Asaph","year":"2016"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Simon Barber Xavier Boyen Elaine Shi and Ersin Uzun. 2012. Bitter to Better --- How to Make Bitcoin a Better Currency. Springer Berlin Heidelberg Berlin Heidelberg 399--414.  Simon Barber Xavier Boyen Elaine Shi and Ersin Uzun. 2012. Bitter to Better --- How to Make Bitcoin a Better Currency. Springer Berlin Heidelberg Berlin Heidelberg 399--414.","DOI":"10.1007\/978-3-642-32946-3_29"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.15"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665955"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62222"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"David Chaum and Eug\u00e8ne van Heyst. 1991. Group Signatures. Springer Berlin Heidelberg Berlin Heidelberg 257--265.   David Chaum and Eug\u00e8ne van Heyst. 1991. Group Signatures. Springer Berlin Heidelberg Berlin Heidelberg 257--265.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"e_1_3_2_1_8_1","volume-title":"Innovative Smart Grid Technologies (ISGT)","author":"Cox William","year":"2013"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. of 2016 Clemson University Power Systems Conference (PSC). 1--7.","author":"Dag O."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_22"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Eiichiro Fujisaki and Koutarou Suzuki. 2007. Traceable Ring Signature. Springer Berlin Heidelberg Berlin Heidelberg 181--200.   Eiichiro Fujisaki and Koutarou Suzuki. 2007. Traceable Ring Signature. Springer Berlin Heidelberg Berlin Heidelberg 181--200.","DOI":"10.1007\/978-3-540-71677-8_13"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Michael Herrmann and Christian Grothoff. 2011. Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P. Springer Berlin Heidelberg Berlin Heidelberg 155--174.   Michael Herrmann and Christian Grothoff. 2011. Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P. Springer Berlin Heidelberg Berlin Heidelberg 155--174.","DOI":"10.1007\/978-3-642-22263-4_9"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1698750.1698753"},{"key":"e_1_3_2_1_14_1","volume-title":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC). 365--370","author":"Jebri S."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2016.2524962"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 7th International Conference on the Internet of Things.","author":"Laszka A."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Brian N. Levine Michael K. Reiter Chenxi Wang and Matthew Wright. 2004. Timing Attacks in Low-Latency Mix Systems. Springer Berlin Heidelberg Berlin Heidelberg 251--265.  Brian N. Levine Michael K. Reiter Chenxi Wang and Matthew Wright. 2004. Timing Attacks in Low-Latency Mix Systems. Springer Berlin Heidelberg Berlin Heidelberg 251--265.","DOI":"10.1007\/978-3-540-27809-2_25"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.9.9.2269-2278"},{"key":"e_1_3_2_1_19_1","volume-title":"Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In Revised Papers from the First International Workshop on Peer-to-Peer Systems (IPTPS '01)","author":"Maymounkov Petar","year":"2002"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.34"},{"key":"e_1_3_2_1_22_1","unstructured":"Andrew Miller Malte M\u00f6ser Kevin Lee and Arvind Narayanan. 2017. An Empirical Analysis of Linkability in the Monero Blockchain. CoRR abs\/1704.04299 (2017). http:\/\/arxiv.org\/abs\/1704.04299  Andrew Miller Malte M\u00f6ser Kevin Lee and Arvind Narayanan. 2017. An Empirical Analysis of Linkability in the Monero Blockchain. CoRR abs\/1704.04299 (2017). http:\/\/arxiv.org\/abs\/1704.04299"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Fergal Reid and Martin Harrigan. 2013. An Analysis of Anonymity in the Bitcoin System. Springer New York New York NY 197--223.  Fergal Reid and Martin Harrigan. 2013. An Analysis of Anonymity in the Bitcoin System. Springer New York New York NY 197--223.","DOI":"10.1007\/978-1-4614-4139-7_10"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Ronald L. Rivest Adi Shamir and Yael Tauman. 2001. How to Leak a Secret. Springer Berlin Heidelberg Berlin Heidelberg 552--565.   Ronald L. Rivest Adi Shamir and Yael Tauman. 2001. How to Leak a Secret. Springer Berlin Heidelberg Berlin Heidelberg 552--565.","DOI":"10.1007\/3-540-45682-1_32"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_20"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_30_1","volume-title":"PET-CON","author":"Schimmer Lars","year":"2009"},{"key":"e_1_3_2_1_31_1","volume-title":"Report","author":"Shen Noether Sarang Noether","year":"2014"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005226600460055"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CMC.2009.18"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2016.7795984"},{"key":"e_1_3_2_1_36_1","first-page":"684","article-title":"Z-Channel: Scalable and Efficient Scheme in Zerocash","volume":"2017","author":"Zhang Yuncong","year":"2017","journal-title":"IACR Cryptology ePrint Archive"}],"event":{"name":"Middleware '17: 18th International Middleware Conference","location":"Las Vegas Nevada","acronym":"Middleware '17"},"container-title":["Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152824.3152827","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3152824.3152827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:19Z","timestamp":1750212679000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152824.3152827"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,11]]},"references-count":33,"alternative-id":["10.1145\/3152824.3152827","10.1145\/3152824"],"URL":"https:\/\/doi.org\/10.1145\/3152824.3152827","relation":{},"subject":[],"published":{"date-parts":[[2017,12,11]]},"assertion":[{"value":"2017-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}