{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T11:15:07Z","timestamp":1722942907486},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry of Education and Research (BMBF)","award":["16KIS0443"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2989059","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"Roman","family":"Matzutt","sequence":"first","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany"}]},{"given":"Oliver","family":"Hohlfeld","sequence":"additional","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany"}]},{"given":"Martin","family":"Henze","sequence":"additional","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany"}]},{"given":"Robin","family":"Rawiel","sequence":"additional","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany"}]},{"given":"Jan Henrik","family":"Ziegeldorf","sequence":"additional","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany"}]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[{"name":"Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USENIX ATC","author":"Ali M.","year":"2016","unstructured":"M. Ali , J. Nelson , R. Shea , and M. J. Freedman . Blockstack: A Global Naming and Storage System Secured by Blockchains . In USENIX ATC , 2016 . M. Ali, J. Nelson, R. Shea, and M. J. Freedman. Blockstack: A Global Naming and Storage System Secured by Blockchains. In USENIX ATC, 2016."},{"key":"e_1_3_2_1_2_1","unstructured":"Bitcoin Wiki. Illegal content in the block chain. rhttps:\/\/en.bitcoin.it\/wiki\/Weaknesses. Bitcoin Wiki. Illegal content in the block chain. rhttps:\/\/en.bitcoin.it\/wiki\/Weaknesses."},{"key":"e_1_3_2_1_3_1","author":"Bitcoin","unstructured":"Bitcoin Wiki. Transaction. rhttps:\/\/en.bitcoin.it\/wiki\/Transaction. Bitcoin Wiki. Transaction. rhttps:\/\/en.bitcoin.it\/wiki\/Transaction.","journal-title":"Wiki. Transaction. rhttps:\/\/en.bitcoin.it\/wiki\/Transaction."},{"key":"e_1_3_2_1_4_1","unstructured":"Bitnodes. Global Bitcoin Nodes Distribution. rhttps:\/\/bitnodes.21.co. Bitnodes. Global Bitcoin Nodes Distribution. rhttps:\/\/bitnodes.21.co."},{"key":"e_1_3_2_1_5_1","unstructured":"Blockchain.info. Bitcoin Charts. rhttps:\/\/blockchain.info\/charts. Blockchain.info. Bitcoin Charts. rhttps:\/\/blockchain.info\/charts."},{"key":"e_1_3_2_1_6_1","unstructured":"CoinMarketCap. Crypto-Currency Market Capitalizations. rhttps:\/\/coinmarketcap.com. CoinMarketCap. Crypto-Currency Market Capitalizations. rhttps:\/\/coinmarketcap.com."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_8"},{"key":"e_1_3_2_1_9_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto . Bitcoin: A peer-to-peer electronic cash system , 2008 . S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system, 2008."},{"key":"e_1_3_2_1_10_1","unstructured":"Pseudonymous \"Hyena\". Bitcointalk Forum.sloppyrhttps:\/\/bitcointalk.org\/index.php?topic=524877.msg9173767. Pseudonymous \"Hyena\". Bitcointalk Forum.sloppyrhttps:\/\/bitcointalk.org\/index.php?topic=524877.msg9173767."},{"key":"e_1_3_2_1_11_1","unstructured":"K. Shirriff. Hidden surprises in the Bitcoin blockchain and how they are stored: Nelson Mandela Wikileaks photos and Python software. rhttp:\/\/www.righto.com\/2014\/02\/ascii-bernanke-wikileaks-photographs.html. K. Shirriff. Hidden surprises in the Bitcoin blockchain and how they are stored: Nelson Mandela Wikileaks photos and Python software. rhttp:\/\/www.righto.com\/2014\/02\/ascii-bernanke-wikileaks-photographs.html."},{"key":"e_1_3_2_1_12_1","volume-title":"rhttps:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0001.mediawiki","author":"Taaki A.","year":"2011","unstructured":"A. Taaki . Bitcoin BIP 1. rhttps:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0001.mediawiki , 2011 . A. Taaki. Bitcoin BIP 1. rhttps:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0001.mediawiki, 2011."},{"key":"e_1_3_2_1_13_1","volume-title":"Ethereum Project Yellow Paper","author":"Wood G.","year":"2016","unstructured":"G. Wood . Ethereum : A Secure Decentralised Generalised Transaction Ledger . Ethereum Project Yellow Paper , 2016 . G. Wood. Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum Project Yellow Paper, 2016."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699100"},{"key":"e_1_3_2_1_15_1","volume-title":"Future Generation Computer Systems","author":"Ziegeldorf J. H.","year":"2016","unstructured":"J. H. Ziegeldorf , R. Matzutt , M. Henze , F. Grossmann , and K. Wehrle . Secure and anonymous decentralized Bitcoin mixing . Future Generation Computer Systems , 2016 . J. H. Ziegeldorf, R. Matzutt, M. Henze, F. Grossmann, and K. Wehrle. Secure and anonymous decentralized Bitcoin mixing. Future Generation Computer Systems, 2016."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2989059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T02:03:04Z","timestamp":1673316184000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2989059"}},"subtitle":["I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":15,"alternative-id":["10.1145\/2976749.2989059","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2989059","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}