- Avizheh, S., Safavi-Naini, R., Shahandashti, S.F. A new look at the refund mechanism in the Bitcoin payment protocol. In Proceedings of Financial Cryptography and Data Security, 2018; https://arxiv.org/abs/1807.01793.Google Scholar
- Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., Danezis, G. SoK: Consensus in the age of blockchains. In Proceedings of ACM Advances in Financial Technology, 2019; https://arxiv.org/pdf/1711.03936.pdf.Google Scholar
- Corbin, J., Strauss, A. Grounded theory research: Procedures, canons and evaluative criteria. Zeitschrift für Soziologie 19, 6 (1990), 418--427.Google Scholar
- Digiconomist. Bitcoin energy consumption index, 2019; https://digiconomist.net/bitcoin-energy-consumption.Google Scholar
- Garay J., Kiayias, A. SoK: A consensus taxonomy in the blockchain era. Cryptology ePrint Archive, Report 2018/754; https://eprint.iacr.org/2018/754.Google Scholar
- Goldfeder, S., Kalodner, H.A., Reisman, D., Narayanan, A. When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies. Privacy Enhancing Technologies 179--199; https://www.petsymposium.org/2018/files/papers/issue4/popets-2018-0038.pdf.Google Scholar
- Kosba, A.E., Miller, A., Shi, E., Wen, A., Papamanthou, C. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In Proceedings of IEEE Symp. Security and Privacy, 2016, 839--858; https://ieeexplore.ieee.org/document/7546538.Google ScholarCross Ref
- Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system, 2008; https://bitcoin.org/bitcoin.pdf.Google Scholar
- Narayanan, A., and Jeremy Clark, J. Bitcoin's academic pedigree. acmqueue 15, 4 (2017); https://queue.acm.org/detail.cfm?id=3136559.Google Scholar
- Ruoti, S. et al. A usability study of four secure email tools using paired participants. ACM Trans. Privacy and Security 22, 2 (2019), 13:1--13:33; https://dl.acm.org/citation.cfm?id=3313761&preflayout=tabs.Google ScholarDigital Library
- Ruoti, S., Kaiser, B., Yerukhimovich, A., Clark, J., Cunningham, R. SoK: Blockchain technology and its potential use cases. Technical report, 2019; https://arxiv.org/abs/1909.12454Google Scholar
- Schneier, B. There's no good reason to trust blockchain technology. Wired, 2019; https://www.wired.com/story/theres-no-good-reason-to-trust-blockchain-technology/.Google Scholar
- Siegel, D. Understanding the DAO hack. Coindesk, 2017; https://www.coindesk.com/understanding-dao-hack-journalists.Google Scholar
- Tamassia, R. Authenticated data structures. In Proceedings of European Symposium on Algorithms, 2003, 2--5. Springer; https://link.springer.com/chapter/10.1007/978-3-540-39658-1_2.Google ScholarCross Ref
- Wolfswinkel, J.F., Furtmueller, E., Wilderom, C.P.M. Using grounded theory as a method for rigorously reviewing literature. European J. Information Systems 22, 1 (2013), 45--55; https://link.springer.com/article/10.1057/ejis.2011.51.Google ScholarCross Ref
Index Terms
- Blockchain technology: what is it good for?
Comments