scispace - formally typeset
Search or ask a question

Showing papers by "Hannes Hartenstein published in 2017"


Book ChapterDOI
03 Apr 2017
TL;DR: This paper applies all applicable clustering heuristics that are known to us to current blockchain information and associates the resulting clusters with IP address information extracted from observing the message flooding process of the bitcoin network.
Abstract: Address clustering tries to break the privacy of bitcoin users by linking all addresses created by an individual user, based on information available from the blockchain. As an alternative information source, observations of the underlying peer-to-peer network have also been used to attack the privacy of users. In this paper, we assess whether combining blockchain and network information may facilitate the clustering process. For this purpose, we apply all applicable clustering heuristics that are known to us to current blockchain information and associate the resulting clusters with IP address information extracted from observing the message flooding process of the bitcoin network. The results indicate that only a small share of clusters (less than 8%) were conspicuously associated with a single IP address. Also, only a small number of IP addresses showed a conspicuous association with a single cluster.

57 citations


BookDOI
01 Jan 2017
TL;DR: This book constitutes the refereed conference proceedings of the 14th International Workshop on Data Privacy Management, DPM 2019, and the Third International workshop on Cryptocurrencies and Blockchain Technology, CBT 2019, held in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019,held in Luxembourg in September 2019.
Abstract: This book constitutes the refereed conference proceedings of the 14th International Workshop on Data Privacy Management, DPM 2019, and the Third International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2019, held in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019, held in Luxembourg in September 2019. For the CBT Workshop 10 full and 8 short papers were accepted out of 39 submissions. The selected papers are organized in the following topical headings: lightning networks and level 2; smart contracts and applications; and payment systems, privacy and mining. The DPM Workshop received 26 submissions from which 8 full and 2 short papers were selected for presentation. The papers focus on privacy preserving data analysis; field/lab studies; and privacy by design and data anonymization. Chapter 2, “Integral Privacy Compliant Statistics Computation,” and Chapter 8, “Graph Perturbation as Noise Graph Addition: a New Perspective for Graph Anonymization,” of this book are available open access under a CC BY 4.0 license at link.springer.com.

17 citations