{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:12Z","timestamp":1750220532366,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,2,24]],"date-time":"2021-02-24T00:00:00Z","timestamp":1614124800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100008473","name":"Bournemouth University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008473","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,2,24]]},"DOI":"10.1145\/3456126.3456127","type":"proceedings-article","created":{"date-parts":[[2021,6,29]],"date-time":"2021-06-29T16:39:49Z","timestamp":1624984789000},"page":"10-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["TheCoin: Privacy and security considerations within blockchain transactions"],"prefix":"10.1145","author":[{"given":"Mohamed","family":"Ikbal Nacer","sequence":"first","affiliation":[{"name":"Bournemouth University, UK"}]},{"given":"Simant","family":"Prakoonwit","sequence":"additional","affiliation":[{"name":"Bournemouth University, UK"}]},{"given":"Edmon","family":"Prakash","sequence":"additional","affiliation":[{"name":"Cardiff Metropolitan University, UK"}]}],"member":"320","published-online":{"date-parts":[[2021,6,29]]},"reference":[{"volume-title":"An experiment in distributed internet address management using blockchains. arXiv preprint arXiv:1807.10528","year":"2018","author":"Angieri Stefano","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Adam Back and others. 2002. Hashcash-a denial of service counter-measure. (2002). Adam Back and others. 2002. Hashcash-a denial of service counter-measure. (2002)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411564.3411579"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2014.20"},{"volume-title":"Clustering Methods for Big Data Analytics","author":"Chawathe Sudarshan S","key":"e_1_3_2_1_6_1"},{"volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 78\u201391","year":"2018","author":"Delgado-Segura Sergi","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354251"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699833"},{"volume-title":"Proof of Stake Made Simple with Casper. ICME","year":"2017","author":"Moindrot Olivier","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3409934.3409944"},{"volume-title":"Bitcoin: A peer-to-peer electronic cash system. Technical Report. Manubot.","year":"2019","author":"Nakamoto Satoshi","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337863"},{"key":"e_1_3_2_1_14_1","first-page":"7","article-title":"Blockchain Technology: Financial Sector Applications beyond Cryptocurrencies","volume":"28","author":"Polyviou Ariana","year":"2019","journal-title":"Multidisciplinary Digital Publishing Institute Proceedings"},{"volume-title":"The tangle. cit. on","year":"2016","author":"Popov Serguei","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","DOI":"10.1111\/j.1749-8198.2010.00337.x","volume-title":"Agent-based modeling of animal movement: a review. Geography Compass 4, 7","author":"Tang Wenwu","year":"2010"},{"key":"e_1_3_2_1_18_1","unstructured":"Pavel Vasin. 2014. Blackcoin's proof-of-stake protocol v2. URL: https:\/\/blackcoin.co\/blackcoin-pos-protocol-v2-whitepaper. pdf 71 Pavel Vasin. 2014. Blackcoin's proof-of-stake protocol v2. URL: https:\/\/blackcoin.co\/blackcoin-pos-protocol-v2-whitepaper. pdf 71"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1534862"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1525908.1525924"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSA.2018.00015"},{"key":"e_1_3_2_1_22_1","unstructured":"H. Zhou. 2019. Learning Blockchain in Java: A Step-By-step Approach. Independently Published. https:\/\/books.google.co.uk\/books?id=gzSyygEACAAJ H. Zhou. 2019. Learning Blockchain in Java: A Step-By-step Approach. Independently Published. https:\/\/books.google.co.uk\/books?id=gzSyygEACAAJ"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411564.3411579"}],"event":{"name":"ASSE '21: 2021 2nd Asia Service Sciences and Software Engineering Conference","acronym":"ASSE '21","location":"Macau Macao"},"container-title":["2021 2nd Asia Service Sciences and Software Engineering Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3456126.3456127","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3456126.3456127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:57Z","timestamp":1750195497000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3456126.3456127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,24]]},"references-count":22,"alternative-id":["10.1145\/3456126.3456127","10.1145\/3456126"],"URL":"https:\/\/doi.org\/10.1145\/3456126.3456127","relation":{},"subject":[],"published":{"date-parts":[[2021,2,24]]},"assertion":[{"value":"2021-06-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}