Fig. 13From: Evicting and filling attack for linking multiple network addresses of Bitcoin nodesComplete deanonymization process for evicting-filling attack combined with transaction traceability technologyBack to article page