{"id":"https://openalex.org/W101293573","doi":"https://doi.org/10.1007/978-3-319-15087-1_3","title":"A Simple Yet Efficient Approach to Combat Transaction Malleability in Bitcoin","display_name":"A Simple Yet Efficient Approach to Combat Transaction Malleability in Bitcoin","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W101293573","doi":"https://doi.org/10.1007/978-3-319-15087-1_3","mag":"101293573"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-15087-1_3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-15087-1_3","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017839273","display_name":"Ubaidullah Rajput","orcid":null},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Ubaidullah Rajput","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045719969","display_name":"Fizza Abbas","orcid":"https://orcid.org/0000-0002-4398-3460"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Fizza Abbas","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090705977","display_name":"Rasheed Hussain","orcid":"https://orcid.org/0000-0002-3771-7537"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Rasheed Hussain","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077013640","display_name":"Hasoo Eun","orcid":null},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hasoo Eun","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102887306","display_name":"Heekuck Oh","orcid":"https://orcid.org/0000-0002-2989-8737"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Heekuck Oh","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea","institution_ids":["https://openalex.org/I4575257"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5017839273"],"corresponding_institution_ids":["https://openalex.org/I4575257"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.7141,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.83505421,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"27","last_page":"37"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8137305378913879},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7342774868011475},{"id":"https://openalex.org/keywords/malleability","display_name":"Malleability","score":0.7047827243804932},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.7034191489219666},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.6224377751350403},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.5752203464508057},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.5345031023025513},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.4932672381401062},{"id":"https://openalex.org/keywords/currency","display_name":"Currency","score":0.4724056124687195},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4314126968383789},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.36283689737319946},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.24076500535011292},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1459866166114807},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.11274805665016174},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.09737378358840942},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.0817767083644867},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.06914931535720825}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8137305378913879},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7342774868011475},{"id":"https://openalex.org/C100980136","wikidata":"https://www.wikidata.org/wiki/Q4668956","display_name":"Malleability","level":4,"score":0.7047827243804932},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.7034191489219666},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6224377751350403},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.5752203464508057},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.5345031023025513},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.4932672381401062},{"id":"https://openalex.org/C141121606","wikidata":"https://www.wikidata.org/wiki/Q8142","display_name":"Currency","level":2,"score":0.4724056124687195},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4314126968383789},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.36283689737319946},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.24076500535011292},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1459866166114807},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11274805665016174},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.09737378358840942},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0817767083644867},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.06914931535720825},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C556758197","wikidata":"https://www.wikidata.org/wiki/Q580018","display_name":"Monetary economics","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-319-15087-1_3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-15087-1_3","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/305e56be-cc93-4f97-b29d-c2ccf6723960","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/305e56be-cc93-4f97-b29d-c2ccf6723960","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Rajput, U, Abbas, F, Hussain, R, Eun, H & Oh, H 2015, A simple yet efficient approach to combat transaction malleability in bitcoin. in K-H Rhee & J H Yi (eds), Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8909, Springer Verlag, pp. 27-37. https://doi.org/10.1007/978-3-319-15087-1_3","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1454642304","https://openalex.org/W2022932831","https://openalex.org/W2143783692"],"related_works":["https://openalex.org/W4366411693","https://openalex.org/W3211641817","https://openalex.org/W3164717803","https://openalex.org/W4389915954","https://openalex.org/W3123387860","https://openalex.org/W4291291739","https://openalex.org/W2915579847","https://openalex.org/W4321377877","https://openalex.org/W2957710009","https://openalex.org/W3115531728"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
