References
8. References
[1] Stuart Haber & W. Scott Stornetta. (1991). How to time-stamp a digital document. Journal of Cryptology volume 3, pages99–111.
[2] Karamitsos, I. , Papadaki, M. & Barghuthi, N. (2018). Design of the Blockchain Smart Contract: A Use Case for Real Estate. Journal of Information Security, 9, 177-190.
[3] Bo Liu, Fan Qiu, Yanchuan Cao, Bin Chang, Yi Cui & Yuan Xue. (2011). Maximizing Resilient Throughput in Peer-to-Peer Network. Communications and Network, Vol. 3 No. 3, pp. 168-183.
[4] Ioanna Roussou, Emmanouil Stiakakis & Chaido Dritsaki. (2019). The Bitcoin’s Network Effects Paradox—A Time Series Analysis. Theoretical Economics Letters, 9, 1981-2001.
[5] Satoshi Nakamoto. (2008). Bitcoin: A peer-to-peer electronic cash system. bitcoin.org.
[6] Gao, X. (2015). Design and Implementation of Peer-to-Peer Service Routing Algorithm. Journal of Software Engineering and Applications, 8, 575-580.
[7] Lim, I.K., Kim, Y.H., Lee, J.G., Lee, J.P., Nam-Gung, H. & Lee, J.K. (2014). The Analysis and Countermeasures on Security Breach of Bitcoin. In: International Conference on Computational Science and Its Applications, Springer International Publishing, Berlin, 720-732.
[8] Sunny King & Scott Nadal. (2012). PeerCoin: http://peercoin.net/assets/paper/peercoinpaper.
pdf.
[9] Pavel Vasin. (2013). Proof of Stake 3.0: http://bravenewcoin.com/assets/Whitepapers/black
coin-pos-protocol-v2-whitepaper.pdf.
[10] Kourosh Davarpanah, Dan Kaufman & Ophelie Pubellier. (2015). NeuCoin: the First Secure, Cost-efficient and Decentralized Cryptocurrency: http://www.neucoin.org/en/whitepaper/down
load.
Last updated