{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:36:52Z","timestamp":1730342212895,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,8]],"date-time":"2021-09-08T00:00:00Z","timestamp":1631059200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,8]],"date-time":"2021-09-08T00:00:00Z","timestamp":1631059200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,8]]},"DOI":"10.23919\/apnoms52696.2021.9562685","type":"proceedings-article","created":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T14:05:34Z","timestamp":1634306734000},"page":"57-60","source":"Crossref","is-referenced-by-count":4,"title":["A survey on public blockchain-based networks: structural differences and address clustering methods"],"prefix":"10.23919","author":[{"given":"Hye-Yeong","family":"Shin","sequence":"first","affiliation":[{"name":"Keimyung University,dep. of computer engineering,Daegu,Republic of Korea"}]},{"given":"Meryam","family":"Essaid","sequence":"additional","affiliation":[{"name":"Keimyung University,dep. of computer engineering,Daegu,Republic of Korea"}]},{"given":"Sejin","family":"Park","sequence":"additional","affiliation":[{"name":"Keimyung University,dep. of computer engineering,Daegu,Republic of Korea"}]},{"given":"Hongtaek","family":"Ju","sequence":"additional","affiliation":[{"name":"Keimyung University,dep. of computer engineering,Daegu,Republic of Korea"}]}],"member":"263","reference":[{"key":"ref33","first-page":"457","article-title":"Bitiodine: Extracting intelligence from the bitcoin network","author":"spagnuolo","year":"2014","journal-title":"International Conference on Financial Cryptography and Data Security"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"ref31","article-title":"Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users","author":"b\u00e9res","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM46954.2019.9012681"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN48656.2020.9016617"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS50412.2020.9237018"},{"journal-title":"A study on Transaction Tracking and Analysis through Bitcoin Transaction Data","year":"2021","author":"shin","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101684"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.101030"},{"journal-title":"Zero to monero","year":"2020","author":"alonso","key":"ref14"},{"journal-title":"Monero","year":"0","key":"ref15"},{"key":"ref16","first-page":"455","article-title":"Floodxmr: Low-cost transaction flooding attack with monero's bulletproof protocol","volume":"2019","author":"chervinkski","year":"2019","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref17","article-title":"An empirical analysis of traceability in the monero blockchain","author":"m\u00f6ser","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref18","article-title":"Traceable monero: Anonymous cryptocurrency with enhanced accountability","author":"li","year":"2019","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"journal-title":"ZCash","year":"0","key":"ref19"},{"key":"ref28","article-title":"Accelerating bitcoin's transaction processing","author":"sompolinsky","year":"2013","journal-title":"Fast money grows on trees not chains"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"journal-title":"ECDSA Algorithms","year":"0","key":"ref27"},{"key":"ref3","article-title":"Ransomware payments in the bitcoin ecosystem","volume":"5","author":"paquet-clouston","year":"2019","journal-title":"Cybersecurity"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_2"},{"journal-title":"Deanonymisation in ethereum using existing methods for bitcoin","year":"2018","author":"klusman","key":"ref29"},{"key":"ref5","first-page":"197","article-title":"An analysis of anonymity in the bitcoin system","author":"reid","year":"2012","journal-title":"Security and Privacy in Social Networks"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751391"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/hhz015"},{"key":"ref9","first-page":"717","article-title":"A Study of Bitcoin Transaction Tracking Method through Illegal Community","volume":"28","author":"jeong","year":"2018","journal-title":"Journal of the Korea Institute of Information Security & Cryptology"},{"journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System","year":"2008","author":"nakamoto","key":"ref1"},{"key":"ref20","article-title":"Deanonymization of hidden transactions in zcash","author":"biryukov","year":"2018","journal-title":"University of Luxembourg"},{"journal-title":"Ping and reject The impact of side-channels on zcash privacy","year":"2019","author":"tramer","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345663"},{"journal-title":"Ethereum A next-generation smart contract and decentralized application platform","year":"2014","author":"buterin","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973291"},{"journal-title":"Nakamoto Satoshi's Bitcoin Wallet address","year":"0","key":"ref26"},{"journal-title":"SEC2 ver2","year":"0","key":"ref25"}],"event":{"name":"2021 22nd Asia-Pacific Network Operations and Management Symposium (APNOMS)","start":{"date-parts":[[2021,9,8]]},"location":"Tainan, Taiwan","end":{"date-parts":[[2021,9,10]]}},"container-title":["2021 22nd Asia-Pacific Network Operations and Management Symposium (APNOMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9562493\/9562494\/09562685.pdf?arnumber=9562685","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T19:59:10Z","timestamp":1659470350000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9562685\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,8]]},"references-count":34,"URL":"https:\/\/doi.org\/10.23919\/apnoms52696.2021.9562685","relation":{},"subject":[],"published":{"date-parts":[[2021,9,8]]}}}