{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T20:16:43Z","timestamp":1764793003303,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3345649","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"2231-2247","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["You Shall Not Join"],"prefix":"10.1145","author":[{"given":"Angelique Faye","family":"Loe","sequence":"first","affiliation":[{"name":"Royal Holloway, University of London, London, United Kingdom"}]},{"given":"Elizabeth Anne","family":"Quaglia","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.03.008"},{"volume-title":"8th USENIX Workshop on Offensive Technologies (WOOT 14)","year":"2014","author":"Adrian David","key":"e_1_3_2_2_2_1"},{"key":"e_1_3_2_2_3_1","unstructured":"Ana Alexandre. 2019. Brazilian Police Arrest Suspect for Money Laundering With Bitcoin. https:\/\/cointelegraph.com\/news\/brazilian-police-arrest-suspect-for-money-laundering-with-bitcoin.  Ana Alexandre. 2019. Brazilian Police Arrest Suspect for Money Laundering With Bitcoin. https:\/\/cointelegraph.com\/news\/brazilian-police-arrest-suspect-for-money-laundering-with-bitcoin."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2317307.2317311"},{"volume-title":"Mastering Bitcoin: Unlocking Digital Cryptocurrencies 2 ed.)","year":"2017","author":"Antonopoulos Andreas","key":"e_1_3_2_2_5_1"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.3386\/w24317"},{"key":"e_1_3_2_2_7_1","unstructured":"Anna Baydakova. 2019. Russian Opposition Leader Raises Three Million in Bitcoin. https:\/\/www.coindesk.com\/russian-opposition-leader-raises-3-million-in-bitcoin-donations.  Anna Baydakova. 2019. Russian Opposition Leader Raises Three Million in Bitcoin. https:\/\/www.coindesk.com\/russian-opposition-leader-raises-3-million-in-bitcoin-donations."},{"key":"e_1_3_2_2_8_1","unstructured":"Matthew Beedham. 2018. An American woman has been funding ISIS with Bitcoin. https:\/\/thenextweb.com\/hardfork\/2018\/11\/27\/american-funding-isis-bitcoin.  Matthew Beedham. 2018. An American woman has been funding ISIS with Bitcoin. https:\/\/thenextweb.com\/hardfork\/2018\/11\/27\/american-funding-isis-bitcoin."},{"volume-title":"Zerocash: Decentralized Anonymous Payments from Bitcoin(extended version)","year":"2014","author":"Ben-Sasson Eli","key":"e_1_3_2_2_9_1"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.15"},{"key":"e_1_3_2_2_11_1","unstructured":"Guy Bruneau. 2010. DNS Sinkhole. https:\/\/www.sans.org\/reading-room\/whitepapers\/dns\/dns-sinkhole-33523.  Guy Bruneau. 2010. DNS Sinkhole. https:\/\/www.sans.org\/reading-room\/whitepapers\/dns\/dns-sinkhole-33523."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_7"},{"volume-title":"Dash: A Payments-Focused Cryptocurrency. https:\/\/github.com\/dashpay\/dash\/wiki\/Whitepaper.","year":"2015","author":"Duffield Evan","key":"e_1_3_2_2_13_1"},{"key":"e_1_3_2_2_14_1","unstructured":"Jake Frankenfield. 2018. Off-Chain Transactions. https:\/\/www.investopedia.com\/terms\/o\/offchain-transactions-cryptocurrency.asp.  Jake Frankenfield. 2018. Off-Chain Transactions. https:\/\/www.investopedia.com\/terms\/o\/offchain-transactions-cryptocurrency.asp."},{"volume-title":"Proceedings of the International Symposium of Applications and the Internet (SAINT'08)","year":"2008","author":"GauthierDickey Chris","key":"e_1_3_2_2_15_1"},{"key":"e_1_3_2_2_16_1","unstructured":"Gearlog. 2010. LimeWire Napster The Pirate Bay: A Brief History of File Sharing. https:\/\/www.geek.com\/gadgets\/limewire-napster-the-pirate-bay-a-brief-history-of-file-sharing-1359473.  Gearlog. 2010. LimeWire Napster The Pirate Bay: A Brief History of File Sharing. https:\/\/www.geek.com\/gadgets\/limewire-napster-the-pirate-bay-a-brief-history-of-file-sharing-1359473."},{"key":"e_1_3_2_2_17_1","unstructured":"Tom Goldenberg. 2018. Watch Out Crypto Exchanges Decentralization Is Coming. https:\/\/www.coindesk.com\/future-crypto-exchanges-decentralization-coming.  Tom Goldenberg. 2018. Watch Out Crypto Exchanges Decentralization Is Coming. https:\/\/www.coindesk.com\/future-crypto-exchanges-decentralization-coming."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Benjamin Greschbach Tobias Pulls Laura M. Roberts Philipp Winter and Nick Feamster. 2016. The Effect of DNS on Tor's Anonymity. https:\/\/arxiv.org\/pdf\/1609.08187.pdf.  Benjamin Greschbach Tobias Pulls Laura M. Roberts Philipp Winter and Nick Feamster. 2016. The Effect of DNS on Tor's Anonymity. https:\/\/arxiv.org\/pdf\/1609.08187.pdf.","DOI":"10.14722\/ndss.2017.23311"},{"volume-title":"Griffin and Amin Shams","year":"2018","author":"John","key":"e_1_3_2_2_19_1"},{"volume-title":"Eclipse Attacks on Bitcoins Peer-to-Peer Network. In 24th USENIX Security Symposium (USENIX Security 15)","year":"2015","author":"Heilman Ethan","key":"e_1_3_2_2_20_1"},{"volume-title":"Worldwide broadband speed league","year":"2018","author":"Howdle Dan","key":"e_1_3_2_2_21_1"},{"key":"e_1_3_2_2_22_1","unstructured":"Esther Kim. 2019. Venezuela Bitcoin Trading Record Underscores Fiat Currency Hyperinflation. https:\/\/bitcoinist.com\/venezuela-bitcoin-trading-record-underscores-fiat-currency-hyperinflation\/.  Esther Kim. 2019. Venezuela Bitcoin Trading Record Underscores Fiat Currency Hyperinflation. https:\/\/bitcoinist.com\/venezuela-bitcoin-trading-record-underscores-fiat-currency-hyperinflation\/."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2009.40"},{"volume-title":"Bootstrapping in Peer-to-Peer Systems. In 14th IEEE International Conference on Parallel and Distributed Systems","year":"2008","author":"Knoll Mirko","key":"e_1_3_2_2_24_1"},{"key":"e_1_3_2_2_25_1","unstructured":"Richie Koch. 2018. Here are all the countries where the government is trying to ban VPNs. https:\/\/protonvpn.com\/blog\/are-vpns-illegal.  Richie Koch. 2018. Here are all the countries where the government is trying to ban VPNs. https:\/\/protonvpn.com\/blog\/are-vpns-illegal."},{"key":"e_1_3_2_2_26_1","unstructured":"Matthew Leising. 2017. The Ether Thief. https:\/\/www.bloomberg.com\/features\/2017-the-ether-thief.  Matthew Leising. 2017. The Ether Thief. https:\/\/www.bloomberg.com\/features\/2017-the-ether-thief."},{"volume-title":"DNS and BIND 5 ed.)","author":"Liu Cricket","key":"e_1_3_2_2_27_1"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","DOI":"10.1109\/COMST.2005.1610546","volume-title":"A Survey and Comparison of Peer-to-Peer Overlay Network Schemes","author":"Lua Eng Keong","year":"2005"},{"key":"e_1_3_2_2_29_1","unstructured":"Spandas Lui. 2018. How To Bypass ISP Blocking Of The Pirate Bay And Other Torrent Sites For Free [Updated]. https:\/\/www.lifehacker.com.au\/2018\/06\/how-to-bypass-isp-blocking-of-the-pirate-bay-and-other-torrent-sites-for-free.  Spandas Lui. 2018. How To Bypass ISP Blocking Of The Pirate Bay And Other Torrent Sites For Free [Updated]. https:\/\/www.lifehacker.com.au\/2018\/06\/how-to-bypass-isp-blocking-of-the-pirate-bay-and-other-torrent-sites-for-free."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1947940.1948065"},{"volume-title":"Dissecting Tor Bridges: A SecurityEvaluation of Their Private and PublicInfrastructures. In Network and Distributed Systems Security Symposium. The Internet Society","year":"2017","author":"Matic Srdjan","key":"e_1_3_2_2_31_1"},{"key":"e_1_3_2_2_32_1","unstructured":"Sam Meredith. 2019. Bitcoin trading in crisis-stricken Venezuela has just hit an all-time high. https:\/\/www.cnbc.com\/2019\/02\/14\/venezuela-crisis-bitcoin-trading-volumes-hit-an-all-time-high-.html.  Sam Meredith. 2019. Bitcoin trading in crisis-stricken Venezuela has just hit an all-time high. https:\/\/www.cnbc.com\/2019\/02\/14\/venezuela-crisis-bitcoin-trading-volumes-hit-an-all-time-high-.html."},{"key":"e_1_3_2_2_33_1","unstructured":"Ali Montag. 2018. Warren Buffett explains one thing people still don't understand about bitcoin. https:\/\/www.cnbc.com\/2018\/05\/01\/warren-buffett-bitcoin-isnt-an-investment.html.  Ali Montag. 2018. Warren Buffett explains one thing people still don't understand about bitcoin. https:\/\/www.cnbc.com\/2018\/05\/01\/warren-buffett-bitcoin-isnt-an-investment.html."},{"key":"e_1_3_2_2_34_1","unstructured":"Ali Montag. 2018. 'Wolf of Wall Street' Jordan Belfort on bitcoin: 'Get out if you don't want to lose all of your money'. https:\/\/www.cnbc.com\/2018\/06\/29\/wolf-of-wall-street-jordan-belfort-get-out-of-bitcoin.html.  Ali Montag. 2018. 'Wolf of Wall Street' Jordan Belfort on bitcoin: 'Get out if you don't want to lose all of your money'. https:\/\/www.cnbc.com\/2018\/06\/29\/wolf-of-wall-street-jordan-belfort-get-out-of-bitcoin.html."},{"key":"e_1_3_2_2_35_1","article-title":"Revisiting the Risks of Bitcoin Currency Exchange Closure","volume":"18","author":"Moore Tyler","year":"2017","journal-title":"ACM Transactions on Internet Technology"},{"key":"e_1_3_2_2_36_1","unstructured":"Peter Nagel. 2018. Psychological Effects during Cryptocurrency Trading. http:\/\/www.scriptiesonline.uba.uva.nl\/document\/659099.  Peter Nagel. 2018. Psychological Effects during Cryptocurrency Trading. http:\/\/www.scriptiesonline.uba.uva.nl\/document\/659099."},{"volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf.","year":"2008","author":"Nakamoto Satoshi","key":"e_1_3_2_2_37_1"},{"key":"e_1_3_2_2_38_1","unstructured":"Richard Nieva. 2013. Ashes to ashes peer to peer: An oral history of Napster. http:\/\/fortune.com\/2013\/09\/05\/ashes-to-ashes-peer-to-peer-an-oral-history-of-napster.  Richard Nieva. 2013. Ashes to ashes peer to peer: An oral history of Napster. http:\/\/fortune.com\/2013\/09\/05\/ashes-to-ashes-peer-to-peer-an-oral-history-of-napster."},{"key":"e_1_3_2_2_39_1","unstructured":"Helen Partz. 2019. Danish Man Faces Over 4 Years in Prison for Laundering 450K With Bitcoin. https:\/\/cointelegraph.com\/news\/danish-man-faces-over-4-years-in-prison-for-laundering-450k-with-bitcoin.  Helen Partz. 2019. Danish Man Faces Over 4 Years in Prison for Laundering 450K With Bitcoin. https:\/\/cointelegraph.com\/news\/danish-man-faces-over-4-years-in-prison-for-laundering-450k-with-bitcoin."},{"volume-title":"Global Measurement of DNS Manipulation. In 26th USENIX Security Symposium","year":"2017","author":"Pearce Paul","key":"e_1_3_2_2_40_1"},{"key":"e_1_3_2_2_41_1","unstructured":"Allen Scott. 2018. 11 Countries Where Bitcoin Is Still Illegal. https:\/\/bitcoinist.com\/11-countries-bitcoin-still-illegal.  Allen Scott. 2018. 11 Countries Where Bitcoin Is Still Illegal. https:\/\/bitcoinist.com\/11-countries-bitcoin-still-illegal."},{"key":"e_1_3_2_2_42_1","unstructured":"Brenna Smith. 2019. How To Track Illegal Funding Campaigns Via Cryptocurrency. https:\/\/www.bellingcat.com\/resources\/how-tos\/2019\/03\/26\/how-to-track-illegal-funding-campaigns-via-cryptocurrency\/.  Brenna Smith. 2019. How To Track Illegal Funding Campaigns Via Cryptocurrency. https:\/\/www.bellingcat.com\/resources\/how-tos\/2019\/03\/26\/how-to-track-illegal-funding-campaigns-via-cryptocurrency\/."},{"key":"e_1_3_2_2_43_1","unstructured":"Andrea Tan and Yuji Nakamura. 2018. Cryptocurrency Markets Are Juicy Targets for Hackers: Timeline. https:\/\/www.bloomberg.com\/news\/articles\/2018-06--20\/cryptocurrency-markets-are-juicy-targets-for-hackers-timeline.  Andrea Tan and Yuji Nakamura. 2018. Cryptocurrency Markets Are Juicy Targets for Hackers: Timeline. https:\/\/www.bloomberg.com\/news\/articles\/2018-06--20\/cryptocurrency-markets-are-juicy-targets-for-hackers-timeline."},{"volume-title":"SoK: Towards Grounding Censorship Circumvention in Empiricism. In IEEE Symposium on Security and Privacy","year":"2016","author":"Tschantz Michael Carl","key":"e_1_3_2_2_44_1"},{"key":"e_1_3_2_2_45_1","unstructured":"Nicolas van Saberhagen. 2013. CryptoNote 2.0. https:\/\/github.com\/monero-project\/research-lab\/blob\/master\/whitepaper\/whitepaper.pdf.  Nicolas van Saberhagen. 2013. CryptoNote 2.0. https:\/\/github.com\/monero-project\/research-lab\/blob\/master\/whitepaper\/whitepaper.pdf."},{"key":"e_1_3_2_2_46_1","unstructured":"Aziz Zainuddin. 2017. Coins Tokens and Altcoins: What's the Difference? https:\/\/masterthecrypto.com\/differences-between-cryptocurrency-coins-and-tokens.  Aziz Zainuddin. 2017. Coins Tokens and Altcoins: What's the Difference? https:\/\/masterthecrypto.com\/differences-between-cryptocurrency-coins-and-tokens."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3345649","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3345649","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:01Z","timestamp":1750202641000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3345649"}},"subtitle":["A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":46,"alternative-id":["10.1145\/3319535.3345649","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3345649","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}